Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 20:12
Static task
static1
General
-
Target
84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe
-
Size
785KB
-
MD5
68d6510d8170f6d4e268b3ce27412ec3
-
SHA1
37ab39d011340bd88faf7e49e5ea70a5d6201cb5
-
SHA256
84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60
-
SHA512
33f24f25ccd5aba2b887b779514ce67e06069866f230fa9cf8f1fc767dd6c0a630d35456d76c0530abc8ec95c413b5218234cebc35170c9024b0bf4e34ec2672
-
SSDEEP
12288:EMr8y90rfhUZ+Ab2tgU7BhJ8aIN+TKwniClZunrFzb0bjls9reP3By0GpaLi:IycgJ2/b8VoTKvyZuntb0mIRDJi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
it718465.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it718465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it718465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it718465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it718465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it718465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it718465.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1212-165-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-166-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-168-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-170-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-172-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-174-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-176-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-178-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-180-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-182-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-184-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-186-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-188-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-190-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-192-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-194-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-196-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-198-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-200-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-202-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-204-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-206-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-208-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-210-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-212-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-214-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-216-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-218-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-220-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-222-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-224-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-226-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1212-228-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr905910.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lr905910.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
Processes:
zivK0881.exezisI5607.exeit718465.exejr379725.exekp905685.exelr905910.exeoneetx.exeoneetx.exepid process 4028 zivK0881.exe 2908 zisI5607.exe 4436 it718465.exe 1212 jr379725.exe 1712 kp905685.exe 2304 lr905910.exe 1240 oneetx.exe 2908 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3840 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it718465.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it718465.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zisI5607.exe84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exezivK0881.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisI5607.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zisI5607.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivK0881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivK0881.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1540 1212 WerFault.exe jr379725.exe 1220 2304 WerFault.exe lr905910.exe 3860 2304 WerFault.exe lr905910.exe 1208 2304 WerFault.exe lr905910.exe 3316 2304 WerFault.exe lr905910.exe 1572 2304 WerFault.exe lr905910.exe 1316 2304 WerFault.exe lr905910.exe 3540 2304 WerFault.exe lr905910.exe 4972 2304 WerFault.exe lr905910.exe 1216 2304 WerFault.exe lr905910.exe 1644 2304 WerFault.exe lr905910.exe 3212 2304 WerFault.exe lr905910.exe 3892 1240 WerFault.exe oneetx.exe 3532 1240 WerFault.exe oneetx.exe 4936 1240 WerFault.exe oneetx.exe 4232 1240 WerFault.exe oneetx.exe 3772 1240 WerFault.exe oneetx.exe 1368 1240 WerFault.exe oneetx.exe 4616 1240 WerFault.exe oneetx.exe 4996 1240 WerFault.exe oneetx.exe 4708 1240 WerFault.exe oneetx.exe 3852 1240 WerFault.exe oneetx.exe 2580 1240 WerFault.exe oneetx.exe 1996 1240 WerFault.exe oneetx.exe 4752 2908 WerFault.exe oneetx.exe 4572 1240 WerFault.exe oneetx.exe 2996 1240 WerFault.exe oneetx.exe 1848 1240 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it718465.exejr379725.exekp905685.exepid process 4436 it718465.exe 4436 it718465.exe 1212 jr379725.exe 1212 jr379725.exe 1712 kp905685.exe 1712 kp905685.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it718465.exejr379725.exekp905685.exedescription pid process Token: SeDebugPrivilege 4436 it718465.exe Token: SeDebugPrivilege 1212 jr379725.exe Token: SeDebugPrivilege 1712 kp905685.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr905910.exepid process 2304 lr905910.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exezivK0881.exezisI5607.exelr905910.exeoneetx.exedescription pid process target process PID 2544 wrote to memory of 4028 2544 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe zivK0881.exe PID 2544 wrote to memory of 4028 2544 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe zivK0881.exe PID 2544 wrote to memory of 4028 2544 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe zivK0881.exe PID 4028 wrote to memory of 2908 4028 zivK0881.exe zisI5607.exe PID 4028 wrote to memory of 2908 4028 zivK0881.exe zisI5607.exe PID 4028 wrote to memory of 2908 4028 zivK0881.exe zisI5607.exe PID 2908 wrote to memory of 4436 2908 zisI5607.exe it718465.exe PID 2908 wrote to memory of 4436 2908 zisI5607.exe it718465.exe PID 2908 wrote to memory of 1212 2908 zisI5607.exe jr379725.exe PID 2908 wrote to memory of 1212 2908 zisI5607.exe jr379725.exe PID 2908 wrote to memory of 1212 2908 zisI5607.exe jr379725.exe PID 4028 wrote to memory of 1712 4028 zivK0881.exe kp905685.exe PID 4028 wrote to memory of 1712 4028 zivK0881.exe kp905685.exe PID 4028 wrote to memory of 1712 4028 zivK0881.exe kp905685.exe PID 2544 wrote to memory of 2304 2544 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe lr905910.exe PID 2544 wrote to memory of 2304 2544 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe lr905910.exe PID 2544 wrote to memory of 2304 2544 84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe lr905910.exe PID 2304 wrote to memory of 1240 2304 lr905910.exe oneetx.exe PID 2304 wrote to memory of 1240 2304 lr905910.exe oneetx.exe PID 2304 wrote to memory of 1240 2304 lr905910.exe oneetx.exe PID 1240 wrote to memory of 1568 1240 oneetx.exe schtasks.exe PID 1240 wrote to memory of 1568 1240 oneetx.exe schtasks.exe PID 1240 wrote to memory of 1568 1240 oneetx.exe schtasks.exe PID 1240 wrote to memory of 3840 1240 oneetx.exe rundll32.exe PID 1240 wrote to memory of 3840 1240 oneetx.exe rundll32.exe PID 1240 wrote to memory of 3840 1240 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe"C:\Users\Admin\AppData\Local\Temp\84e8917abb66b06ac7009b6c80a789fca7c84104dea0c6735205b9fb96dc8f60.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivK0881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivK0881.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisI5607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisI5607.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it718465.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it718465.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr379725.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr379725.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 13365⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp905685.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp905685.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905910.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905910.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 7643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 9723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 12243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 12563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 13043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 13123⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 6924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 8204⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 9084⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 10964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 10964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 9964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 7684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 7644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 8364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 11324⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 16084⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 15564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 16244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 14363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1212 -ip 12121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1240 -ip 12401⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2908 -ip 29081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1240 -ip 12401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1240 -ip 12401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905910.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905910.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivK0881.exeFilesize
522KB
MD512d8026c419eb08d51501908560aad31
SHA108d48447ff44074ba2a802e1deb266061b135f99
SHA2569195769b4489b7562ba96df13589b6462dda0b669140afd8fd3bca3cb3fd686e
SHA5127fe5da36b588a36028a351c6479e77e0df31ed2231df74ad46911d4ec0df51ee5a8d9ac1f7135e5be6d12eda8568c6b12ee5a8940a27b908119e09cfdc19e8a7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivK0881.exeFilesize
522KB
MD512d8026c419eb08d51501908560aad31
SHA108d48447ff44074ba2a802e1deb266061b135f99
SHA2569195769b4489b7562ba96df13589b6462dda0b669140afd8fd3bca3cb3fd686e
SHA5127fe5da36b588a36028a351c6479e77e0df31ed2231df74ad46911d4ec0df51ee5a8d9ac1f7135e5be6d12eda8568c6b12ee5a8940a27b908119e09cfdc19e8a7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp905685.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp905685.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisI5607.exeFilesize
379KB
MD5d71e2b39750b2a4369d2ec1a707b1365
SHA118a3b9f4ca55a95a9287303c7a02c41569e301eb
SHA256303d61c6c33d8635d925227706f979d68cbae4745a3638898fa71bd0f68f6f20
SHA512715bfc23a53c42ce230d30fef13aa1ad3a43ab30fe3f327ed51444ae2c825996ec6a577ab671917368ef9d47d8d25b50e91e831422f644250a886c54b6d844c4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisI5607.exeFilesize
379KB
MD5d71e2b39750b2a4369d2ec1a707b1365
SHA118a3b9f4ca55a95a9287303c7a02c41569e301eb
SHA256303d61c6c33d8635d925227706f979d68cbae4745a3638898fa71bd0f68f6f20
SHA512715bfc23a53c42ce230d30fef13aa1ad3a43ab30fe3f327ed51444ae2c825996ec6a577ab671917368ef9d47d8d25b50e91e831422f644250a886c54b6d844c4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it718465.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it718465.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr379725.exeFilesize
292KB
MD5bab2908274aa6e479c61dc179e85d1b1
SHA152a2a339694812b78cb52a10af07d697f520c7a3
SHA256d30472634b05cb825976d316ff9e5187a2bcccbef85edcbdaf3ecc823026a808
SHA5123305fde6f1da7d802010bd7443daf1684491b27dbecd787eca49245ad2692abe1a1e10b2ecb9efa4158d93425c349111120322989e15f194a5ea279adae3b9ab
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr379725.exeFilesize
292KB
MD5bab2908274aa6e479c61dc179e85d1b1
SHA152a2a339694812b78cb52a10af07d697f520c7a3
SHA256d30472634b05cb825976d316ff9e5187a2bcccbef85edcbdaf3ecc823026a808
SHA5123305fde6f1da7d802010bd7443daf1684491b27dbecd787eca49245ad2692abe1a1e10b2ecb9efa4158d93425c349111120322989e15f194a5ea279adae3b9ab
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/1212-206-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-228-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-174-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-176-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-178-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-180-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-182-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-184-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-186-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-188-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-190-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-192-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-194-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-196-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-198-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-200-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-202-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-204-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-170-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-208-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-210-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-212-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-214-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-216-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-218-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-220-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-222-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-224-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-226-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-172-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-1071-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/1212-1072-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/1212-1073-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/1212-1074-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/1212-1075-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-1077-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-1078-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-1079-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-1080-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/1212-1081-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/1212-1082-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-1083-0x0000000006830000-0x00000000069F2000-memory.dmpFilesize
1.8MB
-
memory/1212-1084-0x0000000006A50000-0x0000000006F7C000-memory.dmpFilesize
5.2MB
-
memory/1212-1085-0x0000000007070000-0x00000000070E6000-memory.dmpFilesize
472KB
-
memory/1212-1086-0x0000000007110000-0x0000000007160000-memory.dmpFilesize
320KB
-
memory/1212-160-0x0000000004BD0000-0x0000000005174000-memory.dmpFilesize
5.6MB
-
memory/1212-161-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/1212-163-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-168-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-166-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-165-0x00000000051C0000-0x00000000051FF000-memory.dmpFilesize
252KB
-
memory/1212-164-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1212-162-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1712-1093-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1712-1092-0x0000000000110000-0x0000000000142000-memory.dmpFilesize
200KB
-
memory/2304-1099-0x0000000000580000-0x00000000005BB000-memory.dmpFilesize
236KB
-
memory/4436-154-0x0000000000BD0000-0x0000000000BDA000-memory.dmpFilesize
40KB