Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 20:02
Static task
static1
General
-
Target
ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe
-
Size
924KB
-
MD5
8c8aebdb83319f472398a8a1caab2799
-
SHA1
de327b74dc41d9f3ddc12a6ae7690ea22caf6dd1
-
SHA256
ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f
-
SHA512
fd19dadf54c3bf2b3a96d24659940ed10fb4abe2d9e505d56579fd6eccf66e5c1881dee454642e954fed92db891630ba885bb435602ae178eb1f39dbc108343c
-
SSDEEP
24576:uyV/IJGs+wxFrPikoswKH8H3FTtbblryIj1yrQ/oyq:9Cgs+yFrKkB9H8VT1bdj1yw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pr052412.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr052412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr052412.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr052412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr052412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr052412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr052412.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2872-198-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-199-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-201-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-203-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-205-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-207-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-209-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-211-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-213-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-215-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-217-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-219-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-221-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-223-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-225-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-229-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-227-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-231-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2872-1114-0x0000000000780000-0x0000000000790000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exesi078735.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si078735.exe -
Executes dropped EXE 8 IoCs
Processes:
un650676.exeun366046.exepr052412.exequ806887.exerk476534.exesi078735.exeoneetx.exeoneetx.exepid process 4876 un650676.exe 2732 un366046.exe 1792 pr052412.exe 2872 qu806887.exe 1544 rk476534.exe 1944 si078735.exe 4124 oneetx.exe 3312 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4928 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr052412.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr052412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr052412.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exeun650676.exeun366046.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un650676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un650676.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un366046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un366046.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1688 1792 WerFault.exe pr052412.exe 1876 2872 WerFault.exe qu806887.exe 3752 1944 WerFault.exe si078735.exe 1832 1944 WerFault.exe si078735.exe 2624 1944 WerFault.exe si078735.exe 1900 1944 WerFault.exe si078735.exe 4288 1944 WerFault.exe si078735.exe 2100 1944 WerFault.exe si078735.exe 1976 1944 WerFault.exe si078735.exe 3428 1944 WerFault.exe si078735.exe 3064 1944 WerFault.exe si078735.exe 716 1944 WerFault.exe si078735.exe 4116 4124 WerFault.exe oneetx.exe 4912 4124 WerFault.exe oneetx.exe 4424 4124 WerFault.exe oneetx.exe 3836 4124 WerFault.exe oneetx.exe 3788 4124 WerFault.exe oneetx.exe 4872 4124 WerFault.exe oneetx.exe 1284 4124 WerFault.exe oneetx.exe 3656 4124 WerFault.exe oneetx.exe 1876 4124 WerFault.exe oneetx.exe 2976 4124 WerFault.exe oneetx.exe 1556 4124 WerFault.exe oneetx.exe 2336 4124 WerFault.exe oneetx.exe 4484 4124 WerFault.exe oneetx.exe 5056 4124 WerFault.exe oneetx.exe 944 3312 WerFault.exe oneetx.exe 2188 4124 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr052412.exequ806887.exerk476534.exepid process 1792 pr052412.exe 1792 pr052412.exe 2872 qu806887.exe 2872 qu806887.exe 1544 rk476534.exe 1544 rk476534.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr052412.exequ806887.exerk476534.exedescription pid process Token: SeDebugPrivilege 1792 pr052412.exe Token: SeDebugPrivilege 2872 qu806887.exe Token: SeDebugPrivilege 1544 rk476534.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si078735.exepid process 1944 si078735.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exeun650676.exeun366046.exesi078735.exeoneetx.exedescription pid process target process PID 1500 wrote to memory of 4876 1500 ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe un650676.exe PID 1500 wrote to memory of 4876 1500 ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe un650676.exe PID 1500 wrote to memory of 4876 1500 ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe un650676.exe PID 4876 wrote to memory of 2732 4876 un650676.exe un366046.exe PID 4876 wrote to memory of 2732 4876 un650676.exe un366046.exe PID 4876 wrote to memory of 2732 4876 un650676.exe un366046.exe PID 2732 wrote to memory of 1792 2732 un366046.exe pr052412.exe PID 2732 wrote to memory of 1792 2732 un366046.exe pr052412.exe PID 2732 wrote to memory of 1792 2732 un366046.exe pr052412.exe PID 2732 wrote to memory of 2872 2732 un366046.exe qu806887.exe PID 2732 wrote to memory of 2872 2732 un366046.exe qu806887.exe PID 2732 wrote to memory of 2872 2732 un366046.exe qu806887.exe PID 4876 wrote to memory of 1544 4876 un650676.exe rk476534.exe PID 4876 wrote to memory of 1544 4876 un650676.exe rk476534.exe PID 4876 wrote to memory of 1544 4876 un650676.exe rk476534.exe PID 1500 wrote to memory of 1944 1500 ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe si078735.exe PID 1500 wrote to memory of 1944 1500 ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe si078735.exe PID 1500 wrote to memory of 1944 1500 ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe si078735.exe PID 1944 wrote to memory of 4124 1944 si078735.exe oneetx.exe PID 1944 wrote to memory of 4124 1944 si078735.exe oneetx.exe PID 1944 wrote to memory of 4124 1944 si078735.exe oneetx.exe PID 4124 wrote to memory of 4616 4124 oneetx.exe schtasks.exe PID 4124 wrote to memory of 4616 4124 oneetx.exe schtasks.exe PID 4124 wrote to memory of 4616 4124 oneetx.exe schtasks.exe PID 4124 wrote to memory of 4928 4124 oneetx.exe rundll32.exe PID 4124 wrote to memory of 4928 4124 oneetx.exe rundll32.exe PID 4124 wrote to memory of 4928 4124 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe"C:\Users\Admin\AppData\Local\Temp\ca4c8c6446985fd239be59b4951ace8f25238ff0b6113620e08409d9d4baec1f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un366046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un366046.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr052412.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr052412.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 10645⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu806887.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu806887.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 15125⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk476534.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk476534.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078735.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 9763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 9603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 9643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 12163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 12443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 13163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 6284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 8324⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 9044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 11284⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 9924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 7524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 8164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 6284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 16124⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 15804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 16284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 8643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1792 -ip 17921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2872 -ip 28721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1944 -ip 19441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4124 -ip 41241⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 3202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3312 -ip 33121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4124 -ip 41241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078735.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078735.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650676.exeFilesize
661KB
MD54e27c1e03f7e193abbcff55621069b2e
SHA104e8560346259ddf8a87f6168f3e269d90081f57
SHA2564539e9e44bc7bf729af9919d1d1ee91061f509e1f1fac15b15e075bd9d020daa
SHA5126dd84a1b077a750cf8808f43da2086b81da4aef261990293c4c52aadd3a3d997ab6e5b6d61e6884e5e576138b137891cbcf722b8f449516ce3b1c85a5f0a59b9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650676.exeFilesize
661KB
MD54e27c1e03f7e193abbcff55621069b2e
SHA104e8560346259ddf8a87f6168f3e269d90081f57
SHA2564539e9e44bc7bf729af9919d1d1ee91061f509e1f1fac15b15e075bd9d020daa
SHA5126dd84a1b077a750cf8808f43da2086b81da4aef261990293c4c52aadd3a3d997ab6e5b6d61e6884e5e576138b137891cbcf722b8f449516ce3b1c85a5f0a59b9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk476534.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk476534.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un366046.exeFilesize
519KB
MD541a1e7a022b0d25411fc79fba146d2bd
SHA12a97b9b5d22dc4b96565770e123136b26607bab4
SHA2567d56cd3d61bd2444b9e95a67e99dfc29855bb647b2881b9d05418773e67024d8
SHA5121cb17f952c3e693f09862b8afc75b9e3f4e7dad830afabd31926d1d054b6ac56f4b9a27ed84189b50cc1440135f79a244e0c015a34de6b0bf006c76bf46ea27b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un366046.exeFilesize
519KB
MD541a1e7a022b0d25411fc79fba146d2bd
SHA12a97b9b5d22dc4b96565770e123136b26607bab4
SHA2567d56cd3d61bd2444b9e95a67e99dfc29855bb647b2881b9d05418773e67024d8
SHA5121cb17f952c3e693f09862b8afc75b9e3f4e7dad830afabd31926d1d054b6ac56f4b9a27ed84189b50cc1440135f79a244e0c015a34de6b0bf006c76bf46ea27b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr052412.exeFilesize
235KB
MD5eb5d8e1dd17892f609c5f5c35203b263
SHA1cf6e07df7333e7e6f9e3504730a8d275e568c875
SHA256c017dbb729e7606a4848c64ab0c12e6a644af19753f8249a6494d6b07e742b82
SHA512c89fead2baacc1cf82a30bf3a5aafce74ca3feec06835c2b5096b52fa002c0514dd277a3830d3ca2be2d8fc69b6baa460705d705314a910d81271d47538c54bc
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr052412.exeFilesize
235KB
MD5eb5d8e1dd17892f609c5f5c35203b263
SHA1cf6e07df7333e7e6f9e3504730a8d275e568c875
SHA256c017dbb729e7606a4848c64ab0c12e6a644af19753f8249a6494d6b07e742b82
SHA512c89fead2baacc1cf82a30bf3a5aafce74ca3feec06835c2b5096b52fa002c0514dd277a3830d3ca2be2d8fc69b6baa460705d705314a910d81271d47538c54bc
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu806887.exeFilesize
292KB
MD5ffe763be817867b2227f18b576d3b549
SHA101e4f3935b459d8fde28f7c190ca745b6035cb42
SHA2560abbe7b176d9ef126942fa54e8dc9cc01d4d2b4f396ab4057923c240e4ad5335
SHA51262307600771a45d5cc1593ad379e78e765a8ce5ea2ec9da55eca55d8e4b1a4cec2037d7db16ea895fe9d60f997908ddeef5ccfb17ff64a39cda4e763c8b81aa1
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu806887.exeFilesize
292KB
MD5ffe763be817867b2227f18b576d3b549
SHA101e4f3935b459d8fde28f7c190ca745b6035cb42
SHA2560abbe7b176d9ef126942fa54e8dc9cc01d4d2b4f396ab4057923c240e4ad5335
SHA51262307600771a45d5cc1593ad379e78e765a8ce5ea2ec9da55eca55d8e4b1a4cec2037d7db16ea895fe9d60f997908ddeef5ccfb17ff64a39cda4e763c8b81aa1
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/1544-1127-0x0000000004DF0000-0x0000000004E00000-memory.dmpFilesize
64KB
-
memory/1544-1126-0x00000000001B0000-0x00000000001E2000-memory.dmpFilesize
200KB
-
memory/1792-174-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-170-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-176-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-178-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-180-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-182-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-184-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-186-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-187-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1792-188-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1792-189-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1792-190-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1792-192-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1792-172-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-168-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-166-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-164-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-162-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-160-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-159-0x00000000023C0000-0x00000000023D2000-memory.dmpFilesize
72KB
-
memory/1792-158-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1792-155-0x00000000004B0000-0x00000000004DD000-memory.dmpFilesize
180KB
-
memory/1792-157-0x0000000004D00000-0x00000000052A4000-memory.dmpFilesize
5.6MB
-
memory/1792-156-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1944-1133-0x00000000004F0000-0x000000000052B000-memory.dmpFilesize
236KB
-
memory/2872-207-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-221-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-223-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-225-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-229-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-227-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-231-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-406-0x0000000000780000-0x0000000000790000-memory.dmpFilesize
64KB
-
memory/2872-408-0x0000000000780000-0x0000000000790000-memory.dmpFilesize
64KB
-
memory/2872-1106-0x0000000005210000-0x0000000005828000-memory.dmpFilesize
6.1MB
-
memory/2872-1107-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2872-1108-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2872-1109-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/2872-1110-0x0000000000780000-0x0000000000790000-memory.dmpFilesize
64KB
-
memory/2872-1112-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/2872-1113-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/2872-1114-0x0000000000780000-0x0000000000790000-memory.dmpFilesize
64KB
-
memory/2872-1115-0x0000000000780000-0x0000000000790000-memory.dmpFilesize
64KB
-
memory/2872-1116-0x00000000066D0000-0x0000000006746000-memory.dmpFilesize
472KB
-
memory/2872-1117-0x0000000006760000-0x00000000067B0000-memory.dmpFilesize
320KB
-
memory/2872-1118-0x0000000000780000-0x0000000000790000-memory.dmpFilesize
64KB
-
memory/2872-219-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-217-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-215-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-213-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-211-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-209-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-205-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-203-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-201-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-199-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-198-0x0000000002670000-0x00000000026AF000-memory.dmpFilesize
252KB
-
memory/2872-197-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/2872-1119-0x00000000067E0000-0x00000000069A2000-memory.dmpFilesize
1.8MB
-
memory/2872-1120-0x00000000069C0000-0x0000000006EEC000-memory.dmpFilesize
5.2MB