Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 20:04
Static task
static1
General
-
Target
17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe
-
Size
784KB
-
MD5
95aa95ece99f7befeb9227ff17305b3d
-
SHA1
ae62ec46865e782cca6ec7eb304d95b7e9f32730
-
SHA256
17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603
-
SHA512
ce542dbd5a9207cb87e4491b383a6280cb95227cfc0f24b439b735b18b295b39c1d3edcf2bb96d40155e0f49fdf9725110b1d2ab5df431427d689731f0f36dad
-
SSDEEP
24576:py+6AlAxbXpe1HXayzyZwezRHVTjdDV+L:c+6IAdXM13a7webJD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
it676798.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it676798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it676798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it676798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it676798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it676798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it676798.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1348-163-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-164-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-166-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-168-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-170-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-172-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-174-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-176-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-178-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-180-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-182-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-184-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-186-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-188-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-190-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-192-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-194-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-196-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-198-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-200-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-202-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-204-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-206-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-208-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-210-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-212-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-214-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-216-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-218-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-220-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-222-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-224-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/1348-226-0x0000000002640000-0x000000000267F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr418029.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr418029.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
ziij6366.exeziJs6026.exeit676798.exejr840021.exekp578589.exelr418029.exeoneetx.exeoneetx.exeoneetx.exepid process 1256 ziij6366.exe 4208 ziJs6026.exe 1016 it676798.exe 1348 jr840021.exe 2544 kp578589.exe 588 lr418029.exe 4632 oneetx.exe 5036 oneetx.exe 2088 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4156 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it676798.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it676798.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exeziij6366.exeziJs6026.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziij6366.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziij6366.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJs6026.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziJs6026.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 620 1348 WerFault.exe jr840021.exe 1880 588 WerFault.exe lr418029.exe 848 588 WerFault.exe lr418029.exe 1584 588 WerFault.exe lr418029.exe 928 588 WerFault.exe lr418029.exe 232 588 WerFault.exe lr418029.exe 2040 588 WerFault.exe lr418029.exe 1680 588 WerFault.exe lr418029.exe 1840 588 WerFault.exe lr418029.exe 1544 588 WerFault.exe lr418029.exe 2612 588 WerFault.exe lr418029.exe 2472 4632 WerFault.exe oneetx.exe 3636 4632 WerFault.exe oneetx.exe 2340 4632 WerFault.exe oneetx.exe 4512 4632 WerFault.exe oneetx.exe 1208 4632 WerFault.exe oneetx.exe 2568 4632 WerFault.exe oneetx.exe 4348 4632 WerFault.exe oneetx.exe 5116 4632 WerFault.exe oneetx.exe 2132 4632 WerFault.exe oneetx.exe 3008 4632 WerFault.exe oneetx.exe 804 4632 WerFault.exe oneetx.exe 932 5036 WerFault.exe oneetx.exe 1676 4632 WerFault.exe oneetx.exe 3736 4632 WerFault.exe oneetx.exe 4560 4632 WerFault.exe oneetx.exe 3204 2088 WerFault.exe oneetx.exe 1976 4632 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it676798.exejr840021.exekp578589.exepid process 1016 it676798.exe 1016 it676798.exe 1348 jr840021.exe 1348 jr840021.exe 2544 kp578589.exe 2544 kp578589.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it676798.exejr840021.exekp578589.exedescription pid process Token: SeDebugPrivilege 1016 it676798.exe Token: SeDebugPrivilege 1348 jr840021.exe Token: SeDebugPrivilege 2544 kp578589.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr418029.exepid process 588 lr418029.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exeziij6366.exeziJs6026.exelr418029.exeoneetx.exedescription pid process target process PID 1280 wrote to memory of 1256 1280 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe ziij6366.exe PID 1280 wrote to memory of 1256 1280 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe ziij6366.exe PID 1280 wrote to memory of 1256 1280 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe ziij6366.exe PID 1256 wrote to memory of 4208 1256 ziij6366.exe ziJs6026.exe PID 1256 wrote to memory of 4208 1256 ziij6366.exe ziJs6026.exe PID 1256 wrote to memory of 4208 1256 ziij6366.exe ziJs6026.exe PID 4208 wrote to memory of 1016 4208 ziJs6026.exe it676798.exe PID 4208 wrote to memory of 1016 4208 ziJs6026.exe it676798.exe PID 4208 wrote to memory of 1348 4208 ziJs6026.exe jr840021.exe PID 4208 wrote to memory of 1348 4208 ziJs6026.exe jr840021.exe PID 4208 wrote to memory of 1348 4208 ziJs6026.exe jr840021.exe PID 1256 wrote to memory of 2544 1256 ziij6366.exe kp578589.exe PID 1256 wrote to memory of 2544 1256 ziij6366.exe kp578589.exe PID 1256 wrote to memory of 2544 1256 ziij6366.exe kp578589.exe PID 1280 wrote to memory of 588 1280 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe lr418029.exe PID 1280 wrote to memory of 588 1280 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe lr418029.exe PID 1280 wrote to memory of 588 1280 17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe lr418029.exe PID 588 wrote to memory of 4632 588 lr418029.exe oneetx.exe PID 588 wrote to memory of 4632 588 lr418029.exe oneetx.exe PID 588 wrote to memory of 4632 588 lr418029.exe oneetx.exe PID 4632 wrote to memory of 4072 4632 oneetx.exe schtasks.exe PID 4632 wrote to memory of 4072 4632 oneetx.exe schtasks.exe PID 4632 wrote to memory of 4072 4632 oneetx.exe schtasks.exe PID 4632 wrote to memory of 4156 4632 oneetx.exe rundll32.exe PID 4632 wrote to memory of 4156 4632 oneetx.exe rundll32.exe PID 4632 wrote to memory of 4156 4632 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe"C:\Users\Admin\AppData\Local\Temp\17362d6756dfa109bff7a0f4d48ca85bb51dd0a2a6082a6a2628be77bab6d603.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziij6366.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziij6366.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJs6026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJs6026.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it676798.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it676798.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr840021.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr840021.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 13285⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp578589.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp578589.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr418029.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr418029.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 6883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 7523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 8603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 8643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 9483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 9563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 12043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 12283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 13123⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 6924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 8284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 8364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 10924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 9924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 7964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 7884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 13124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 11124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 15604⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 10804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 16164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 7563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1348 -ip 13481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4632 -ip 46321⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 3202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5036 -ip 50361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4632 -ip 46321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4632 -ip 46321⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2088 -ip 20881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4632 -ip 46321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr418029.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr418029.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziij6366.exeFilesize
522KB
MD59be392ea8901a1c4a14230407cf19105
SHA17c4503d66ce517ce17f4d815cd8fb4c30a25e592
SHA25660858e782a6630f31a6a73bac721967d700500f9786db2de7b239fcc3d24716c
SHA51203fbc90dc128d6de295a8d21571c063a6d6113dbd5fbda603da99e2320bfb4e6230c490fc06992efe87d3883ae1bc420ac3be8b5ae84df2a0b149a7e414fc1b1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziij6366.exeFilesize
522KB
MD59be392ea8901a1c4a14230407cf19105
SHA17c4503d66ce517ce17f4d815cd8fb4c30a25e592
SHA25660858e782a6630f31a6a73bac721967d700500f9786db2de7b239fcc3d24716c
SHA51203fbc90dc128d6de295a8d21571c063a6d6113dbd5fbda603da99e2320bfb4e6230c490fc06992efe87d3883ae1bc420ac3be8b5ae84df2a0b149a7e414fc1b1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp578589.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp578589.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJs6026.exeFilesize
379KB
MD5100b76f82d069a867f38a0d01d00dd01
SHA11bae851c3c85197e4b3e681e2c6658deda1df8fd
SHA256fc1af70df582483a888894f03ca0a5a90074d93e353c8d04a16f88784c8aaed3
SHA512c7bad6f1c6c60ea5139a7d6fd9c661a4f135e250f551169ac442cc6db128c8d2ab7087e889cdb52c05d2c02bef246ddb8d595d74b92b198f72fdf834b6717d6d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJs6026.exeFilesize
379KB
MD5100b76f82d069a867f38a0d01d00dd01
SHA11bae851c3c85197e4b3e681e2c6658deda1df8fd
SHA256fc1af70df582483a888894f03ca0a5a90074d93e353c8d04a16f88784c8aaed3
SHA512c7bad6f1c6c60ea5139a7d6fd9c661a4f135e250f551169ac442cc6db128c8d2ab7087e889cdb52c05d2c02bef246ddb8d595d74b92b198f72fdf834b6717d6d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it676798.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it676798.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr840021.exeFilesize
292KB
MD51679f1aedab1418e9e7cf74b876041c2
SHA1305dad8ce88477f6e46d9aebe52b8cc97158344e
SHA256348d13ed154573f31168770e76e24167564228875fac7247a7f3d9adc8224cf7
SHA5129c8beb334143b7b2b9f4daaa89d32a8d0895326f9814b7b9944b127a767961e14e10d32dd62dfb80561075679b6716f12b0b100b92b6892259a462c06cff5568
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr840021.exeFilesize
292KB
MD51679f1aedab1418e9e7cf74b876041c2
SHA1305dad8ce88477f6e46d9aebe52b8cc97158344e
SHA256348d13ed154573f31168770e76e24167564228875fac7247a7f3d9adc8224cf7
SHA5129c8beb334143b7b2b9f4daaa89d32a8d0895326f9814b7b9944b127a767961e14e10d32dd62dfb80561075679b6716f12b0b100b92b6892259a462c06cff5568
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/588-1096-0x0000000000580000-0x00000000005BB000-memory.dmpFilesize
236KB
-
memory/588-1094-0x0000000000580000-0x00000000005BB000-memory.dmpFilesize
236KB
-
memory/1016-154-0x00000000008C0000-0x00000000008CA000-memory.dmpFilesize
40KB
-
memory/1348-204-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-1070-0x00000000058D0000-0x00000000059DA000-memory.dmpFilesize
1.0MB
-
memory/1348-184-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-186-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-188-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-190-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-192-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-194-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-196-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-198-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-200-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-202-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-180-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-206-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-208-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-210-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-212-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-214-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-216-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-218-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-220-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-222-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-224-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-226-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-1069-0x00000000052B0000-0x00000000058C8000-memory.dmpFilesize
6.1MB
-
memory/1348-182-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-1071-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/1348-1072-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/1348-1073-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1348-1075-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/1348-1076-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/1348-1077-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/1348-1078-0x0000000006690000-0x0000000006BBC000-memory.dmpFilesize
5.2MB
-
memory/1348-1079-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1348-1080-0x0000000006E00000-0x0000000006E76000-memory.dmpFilesize
472KB
-
memory/1348-1081-0x0000000006E90000-0x0000000006EE0000-memory.dmpFilesize
320KB
-
memory/1348-160-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/1348-178-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-176-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-174-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-172-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-170-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-168-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-166-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-164-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-163-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/1348-162-0x0000000004D00000-0x00000000052A4000-memory.dmpFilesize
5.6MB
-
memory/1348-161-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/2544-1087-0x0000000000D10000-0x0000000000D42000-memory.dmpFilesize
200KB
-
memory/2544-1088-0x00000000058C0000-0x00000000058D0000-memory.dmpFilesize
64KB