Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 20:12
Static task
static1
General
-
Target
07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe
-
Size
923KB
-
MD5
6f035dfa803e652380254c6bcc516de4
-
SHA1
6ea369dee1e5b0b5a82e5640926dd16fdf0da2a2
-
SHA256
07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22
-
SHA512
04020929f80c2a01ad2e14838009d06aeabe9af825ab01c9c905d351399717a563ef8c97f6d0326c102f3761742ed2cd457a7b568ab1a8c79e17ab257b93f821
-
SSDEEP
24576:CydPDSuu56kuRnfukomuPR3Fdurbl1yH9CXa7omdbY7ue:pdfkmWkD0Td4bc9m3mxUu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pr877307.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr877307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr877307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr877307.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr877307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr877307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr877307.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4884-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-223-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-227-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-233-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-231-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4884-235-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exesi653289.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si653289.exe -
Executes dropped EXE 9 IoCs
Processes:
un358683.exeun540088.exepr877307.exequ629426.exerk874418.exesi653289.exeoneetx.exeoneetx.exeoneetx.exepid process 564 un358683.exe 1636 un540088.exe 3612 pr877307.exe 4884 qu629426.exe 4320 rk874418.exe 3440 si653289.exe 2904 oneetx.exe 756 oneetx.exe 1616 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3112 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr877307.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr877307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr877307.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exeun358683.exeun540088.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un358683.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un358683.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un540088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un540088.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1652 3612 WerFault.exe pr877307.exe 3120 4884 WerFault.exe qu629426.exe 844 3440 WerFault.exe si653289.exe 2456 3440 WerFault.exe si653289.exe 3112 3440 WerFault.exe si653289.exe 4080 3440 WerFault.exe si653289.exe 3960 3440 WerFault.exe si653289.exe 3988 3440 WerFault.exe si653289.exe 456 3440 WerFault.exe si653289.exe 548 3440 WerFault.exe si653289.exe 1976 3440 WerFault.exe si653289.exe 2352 3440 WerFault.exe si653289.exe 540 2904 WerFault.exe oneetx.exe 1552 2904 WerFault.exe oneetx.exe 2864 2904 WerFault.exe oneetx.exe 2436 2904 WerFault.exe oneetx.exe 2720 2904 WerFault.exe oneetx.exe 2076 2904 WerFault.exe oneetx.exe 3100 2904 WerFault.exe oneetx.exe 3776 2904 WerFault.exe oneetx.exe 4268 2904 WerFault.exe oneetx.exe 4064 2904 WerFault.exe oneetx.exe 4256 2904 WerFault.exe oneetx.exe 920 756 WerFault.exe oneetx.exe 2608 2904 WerFault.exe oneetx.exe 2680 2904 WerFault.exe oneetx.exe 1796 2904 WerFault.exe oneetx.exe 1740 1616 WerFault.exe oneetx.exe 2472 2904 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr877307.exequ629426.exerk874418.exepid process 3612 pr877307.exe 3612 pr877307.exe 4884 qu629426.exe 4884 qu629426.exe 4320 rk874418.exe 4320 rk874418.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr877307.exequ629426.exerk874418.exedescription pid process Token: SeDebugPrivilege 3612 pr877307.exe Token: SeDebugPrivilege 4884 qu629426.exe Token: SeDebugPrivilege 4320 rk874418.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si653289.exepid process 3440 si653289.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exeun358683.exeun540088.exesi653289.exeoneetx.exedescription pid process target process PID 2036 wrote to memory of 564 2036 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe un358683.exe PID 2036 wrote to memory of 564 2036 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe un358683.exe PID 2036 wrote to memory of 564 2036 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe un358683.exe PID 564 wrote to memory of 1636 564 un358683.exe un540088.exe PID 564 wrote to memory of 1636 564 un358683.exe un540088.exe PID 564 wrote to memory of 1636 564 un358683.exe un540088.exe PID 1636 wrote to memory of 3612 1636 un540088.exe pr877307.exe PID 1636 wrote to memory of 3612 1636 un540088.exe pr877307.exe PID 1636 wrote to memory of 3612 1636 un540088.exe pr877307.exe PID 1636 wrote to memory of 4884 1636 un540088.exe qu629426.exe PID 1636 wrote to memory of 4884 1636 un540088.exe qu629426.exe PID 1636 wrote to memory of 4884 1636 un540088.exe qu629426.exe PID 564 wrote to memory of 4320 564 un358683.exe rk874418.exe PID 564 wrote to memory of 4320 564 un358683.exe rk874418.exe PID 564 wrote to memory of 4320 564 un358683.exe rk874418.exe PID 2036 wrote to memory of 3440 2036 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe si653289.exe PID 2036 wrote to memory of 3440 2036 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe si653289.exe PID 2036 wrote to memory of 3440 2036 07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe si653289.exe PID 3440 wrote to memory of 2904 3440 si653289.exe oneetx.exe PID 3440 wrote to memory of 2904 3440 si653289.exe oneetx.exe PID 3440 wrote to memory of 2904 3440 si653289.exe oneetx.exe PID 2904 wrote to memory of 2288 2904 oneetx.exe schtasks.exe PID 2904 wrote to memory of 2288 2904 oneetx.exe schtasks.exe PID 2904 wrote to memory of 2288 2904 oneetx.exe schtasks.exe PID 2904 wrote to memory of 3112 2904 oneetx.exe rundll32.exe PID 2904 wrote to memory of 3112 2904 oneetx.exe rundll32.exe PID 2904 wrote to memory of 3112 2904 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe"C:\Users\Admin\AppData\Local\Temp\07a157f64289dcd1609978390685c1a873919b8cc8dc729bd518e5384a56ad22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358683.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358683.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un540088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un540088.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr877307.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr877307.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 10805⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu629426.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu629426.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 16765⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk874418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk874418.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653289.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 9803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 12163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 12483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 13163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 6924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 8444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 8884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 10604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 10844⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 9924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 6924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 8964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 7564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 11524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 15804⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 15924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 15684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 8643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3612 -ip 36121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4884 -ip 48841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3440 -ip 34401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2904 -ip 29041⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 756 -ip 7561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2904 -ip 29041⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 3322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1616 -ip 16161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2904 -ip 29041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653289.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653289.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358683.exeFilesize
661KB
MD5fcac17dfc64b8e888058dbd232563691
SHA1fedba2ff92f49efe6d7020910f6fe18a872ef465
SHA256dd91cf7ee01ce5cfdd1321a36131fa4c1a996363f50b12deb8623052ab2d962f
SHA5122b0acd9d7d65416b9f444f5ca19b11024981e43f5ff879f19708ee28ef417a898496591b08c5fe3e713f3447e4ff44bf4563325c6ec6e99a26f7105b2b2e4cc5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358683.exeFilesize
661KB
MD5fcac17dfc64b8e888058dbd232563691
SHA1fedba2ff92f49efe6d7020910f6fe18a872ef465
SHA256dd91cf7ee01ce5cfdd1321a36131fa4c1a996363f50b12deb8623052ab2d962f
SHA5122b0acd9d7d65416b9f444f5ca19b11024981e43f5ff879f19708ee28ef417a898496591b08c5fe3e713f3447e4ff44bf4563325c6ec6e99a26f7105b2b2e4cc5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk874418.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk874418.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un540088.exeFilesize
519KB
MD523e98727d22644daa76e91974f0e7a92
SHA169f73a38a7589cbe9b7fd438d839b130abe17b07
SHA256a263c346d08cd4a40ed3b2cf3aef04e9286af884b56442035dc0361002576fa5
SHA51262bca6f8d5088c4721bc2bb0f608c1fabbc02dfa5aa837ec90c3884c30edfb517c9a0e71ab808b0569caf53fcacee0203281ad273e8e5643f7f2fcb8e9b0e278
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un540088.exeFilesize
519KB
MD523e98727d22644daa76e91974f0e7a92
SHA169f73a38a7589cbe9b7fd438d839b130abe17b07
SHA256a263c346d08cd4a40ed3b2cf3aef04e9286af884b56442035dc0361002576fa5
SHA51262bca6f8d5088c4721bc2bb0f608c1fabbc02dfa5aa837ec90c3884c30edfb517c9a0e71ab808b0569caf53fcacee0203281ad273e8e5643f7f2fcb8e9b0e278
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr877307.exeFilesize
235KB
MD5734720eb084919ccbc489b860fc10596
SHA137be77ca034d39be7aa3e169cef4edb505d6fc8d
SHA25656ec28fbd58ef564c816463d23788e94d003af377dcfc29971f1591a74ac287b
SHA512223cbbc93f2a34cd4feb9ba8efc2000b0f508721181fb255ef3af03769495e127cd3104c82f1cfc2dad3cb69bd03c6aed8b9bc1429c3327af7a708907c972d28
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr877307.exeFilesize
235KB
MD5734720eb084919ccbc489b860fc10596
SHA137be77ca034d39be7aa3e169cef4edb505d6fc8d
SHA25656ec28fbd58ef564c816463d23788e94d003af377dcfc29971f1591a74ac287b
SHA512223cbbc93f2a34cd4feb9ba8efc2000b0f508721181fb255ef3af03769495e127cd3104c82f1cfc2dad3cb69bd03c6aed8b9bc1429c3327af7a708907c972d28
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu629426.exeFilesize
292KB
MD586f7343cdb9ad79e4f3eb6ace5900f71
SHA1e35a90a5672f65f0351ff1bdbf069a81a4714d16
SHA256cb2f9d41c2f4779b599f77da96e91a54760e5464387d9fd33f297423b9cc128e
SHA512d49dcb56780c4f758b8603efad65b5a8fe13b89da2147da3006e72a9d15f40cef217662cbf4b4db75436acded5dcedceeaa74d62904a716bffcb6987c667af1e
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu629426.exeFilesize
292KB
MD586f7343cdb9ad79e4f3eb6ace5900f71
SHA1e35a90a5672f65f0351ff1bdbf069a81a4714d16
SHA256cb2f9d41c2f4779b599f77da96e91a54760e5464387d9fd33f297423b9cc128e
SHA512d49dcb56780c4f758b8603efad65b5a8fe13b89da2147da3006e72a9d15f40cef217662cbf4b4db75436acded5dcedceeaa74d62904a716bffcb6987c667af1e
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/3440-1137-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/3612-157-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/3612-163-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-177-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-179-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-181-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-183-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-185-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-187-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-188-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/3612-189-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/3612-190-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/3612-191-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/3612-193-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/3612-155-0x00000000004B0000-0x00000000004DD000-memory.dmpFilesize
180KB
-
memory/3612-173-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-171-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-169-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-167-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-165-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-175-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-161-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-160-0x00000000026C0000-0x00000000026D2000-memory.dmpFilesize
72KB
-
memory/3612-159-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/3612-158-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/3612-156-0x0000000004BA0000-0x0000000005144000-memory.dmpFilesize
5.6MB
-
memory/4320-1130-0x0000000004FF0000-0x0000000005000000-memory.dmpFilesize
64KB
-
memory/4320-1129-0x0000000000690000-0x00000000006C2000-memory.dmpFilesize
200KB
-
memory/4320-1131-0x0000000004FF0000-0x0000000005000000-memory.dmpFilesize
64KB
-
memory/4884-209-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-228-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-227-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-226-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-230-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-233-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-231-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-235-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-1108-0x00000000052D0000-0x00000000058E8000-memory.dmpFilesize
6.1MB
-
memory/4884-1109-0x00000000058F0000-0x00000000059FA000-memory.dmpFilesize
1.0MB
-
memory/4884-1110-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/4884-1111-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4884-1112-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-1113-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4884-1114-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4884-1116-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-1117-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-1118-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4884-1119-0x0000000007760000-0x00000000077D6000-memory.dmpFilesize
472KB
-
memory/4884-1120-0x00000000077F0000-0x0000000007840000-memory.dmpFilesize
320KB
-
memory/4884-224-0x00000000005A0000-0x00000000005EB000-memory.dmpFilesize
300KB
-
memory/4884-223-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-221-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-219-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-217-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-215-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-213-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-211-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-207-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-205-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-203-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-201-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-198-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-199-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4884-1121-0x0000000007950000-0x0000000007B12000-memory.dmpFilesize
1.8MB
-
memory/4884-1122-0x0000000007B30000-0x000000000805C000-memory.dmpFilesize
5.2MB
-
memory/4884-1123-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB