Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2023 20:13
Static task
static1
General
-
Target
772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe
-
Size
785KB
-
MD5
681ff937e66f1c1fcde994765721f8a8
-
SHA1
144128535bcba9c5587f4aee6d9b888b4b56c94e
-
SHA256
772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9
-
SHA512
631c91175e35aebe4be45a678e30184368fab7987b74408080a75891504377a0cd37a4e98739d49f03e09ec4f53eb2a9eb21b34d8f5f95ed13dcbd0844fc7f02
-
SSDEEP
24576:tyP/VH50zgKy9dsn411/RyZ63wAcDrdCcl9Pbf:IVHgnne10ZA8dl9
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
it096791.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it096791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it096791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it096791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it096791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it096791.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it096791.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4684-165-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-166-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-168-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-170-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-172-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-174-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-176-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-178-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-180-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-182-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-184-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-186-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-188-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-190-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-192-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-194-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-196-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-198-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-200-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-202-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-204-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-206-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-208-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-210-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-212-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-214-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-216-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-218-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-220-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-222-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-224-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-226-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4684-228-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr859397.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr859397.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
zidF5671.exeziWw0890.exeit096791.exejr179231.exekp110451.exelr859397.exeoneetx.exeoneetx.exeoneetx.exepid process 4272 zidF5671.exe 404 ziWw0890.exe 2800 it096791.exe 4684 jr179231.exe 3892 kp110451.exe 2492 lr859397.exe 2920 oneetx.exe 4684 oneetx.exe 1276 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2624 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it096791.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it096791.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zidF5671.exeziWw0890.exe772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidF5671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidF5671.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWw0890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziWw0890.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3044 4684 WerFault.exe jr179231.exe 5036 2492 WerFault.exe lr859397.exe 1868 2492 WerFault.exe lr859397.exe 3564 2492 WerFault.exe lr859397.exe 2176 2492 WerFault.exe lr859397.exe 2840 2492 WerFault.exe lr859397.exe 1716 2492 WerFault.exe lr859397.exe 4552 2492 WerFault.exe lr859397.exe 60 2492 WerFault.exe lr859397.exe 4404 2492 WerFault.exe lr859397.exe 2204 2492 WerFault.exe lr859397.exe 2568 2492 WerFault.exe lr859397.exe 4492 2920 WerFault.exe oneetx.exe 2156 2920 WerFault.exe oneetx.exe 2092 2920 WerFault.exe oneetx.exe 4308 2920 WerFault.exe oneetx.exe 4848 2920 WerFault.exe oneetx.exe 1448 2920 WerFault.exe oneetx.exe 1864 2920 WerFault.exe oneetx.exe 4100 2920 WerFault.exe oneetx.exe 564 2920 WerFault.exe oneetx.exe 824 2920 WerFault.exe oneetx.exe 4964 2920 WerFault.exe oneetx.exe 1432 2920 WerFault.exe oneetx.exe 2260 4684 WerFault.exe oneetx.exe 4484 2920 WerFault.exe oneetx.exe 2076 2920 WerFault.exe oneetx.exe 5068 2920 WerFault.exe oneetx.exe 3500 1276 WerFault.exe oneetx.exe 4636 2920 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it096791.exejr179231.exekp110451.exepid process 2800 it096791.exe 2800 it096791.exe 4684 jr179231.exe 4684 jr179231.exe 3892 kp110451.exe 3892 kp110451.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it096791.exejr179231.exekp110451.exedescription pid process Token: SeDebugPrivilege 2800 it096791.exe Token: SeDebugPrivilege 4684 jr179231.exe Token: SeDebugPrivilege 3892 kp110451.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr859397.exepid process 2492 lr859397.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exezidF5671.exeziWw0890.exelr859397.exeoneetx.exedescription pid process target process PID 444 wrote to memory of 4272 444 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe zidF5671.exe PID 444 wrote to memory of 4272 444 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe zidF5671.exe PID 444 wrote to memory of 4272 444 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe zidF5671.exe PID 4272 wrote to memory of 404 4272 zidF5671.exe ziWw0890.exe PID 4272 wrote to memory of 404 4272 zidF5671.exe ziWw0890.exe PID 4272 wrote to memory of 404 4272 zidF5671.exe ziWw0890.exe PID 404 wrote to memory of 2800 404 ziWw0890.exe it096791.exe PID 404 wrote to memory of 2800 404 ziWw0890.exe it096791.exe PID 404 wrote to memory of 4684 404 ziWw0890.exe jr179231.exe PID 404 wrote to memory of 4684 404 ziWw0890.exe jr179231.exe PID 404 wrote to memory of 4684 404 ziWw0890.exe jr179231.exe PID 4272 wrote to memory of 3892 4272 zidF5671.exe kp110451.exe PID 4272 wrote to memory of 3892 4272 zidF5671.exe kp110451.exe PID 4272 wrote to memory of 3892 4272 zidF5671.exe kp110451.exe PID 444 wrote to memory of 2492 444 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe lr859397.exe PID 444 wrote to memory of 2492 444 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe lr859397.exe PID 444 wrote to memory of 2492 444 772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe lr859397.exe PID 2492 wrote to memory of 2920 2492 lr859397.exe oneetx.exe PID 2492 wrote to memory of 2920 2492 lr859397.exe oneetx.exe PID 2492 wrote to memory of 2920 2492 lr859397.exe oneetx.exe PID 2920 wrote to memory of 4208 2920 oneetx.exe schtasks.exe PID 2920 wrote to memory of 4208 2920 oneetx.exe schtasks.exe PID 2920 wrote to memory of 4208 2920 oneetx.exe schtasks.exe PID 2920 wrote to memory of 2624 2920 oneetx.exe rundll32.exe PID 2920 wrote to memory of 2624 2920 oneetx.exe rundll32.exe PID 2920 wrote to memory of 2624 2920 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe"C:\Users\Admin\AppData\Local\Temp\772546599d68bfa47bad2113bc52c9e530fb4818f9618e78e6cf9bded03d84d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidF5671.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidF5671.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWw0890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWw0890.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it096791.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it096791.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr179231.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr179231.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 18165⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110451.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr859397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr859397.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 8123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 9523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 9803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 8603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 12203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 12083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 13003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 13403⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 6964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 8364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 8924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 10524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 11004⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 9924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 7444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 12604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 12764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 14444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 16284⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 11364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 16444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 8643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4684 -ip 46841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2492 -ip 24921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2920 -ip 29201⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 3282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4684 -ip 46841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2920 -ip 29201⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 3202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1276 -ip 12761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2920 -ip 29201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr859397.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr859397.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidF5671.exeFilesize
522KB
MD598343d5db72c918ee90bd9568eb751b5
SHA19e94eba8e500a789a055dde4a1ddc3c73f2a8c8b
SHA256bbc3b8f32bca83d9694ad92861817fc06b314d36c30521871a4e582ff1d54127
SHA512362d85b97902975e5816ab19d32d95fb506906b2b4ac308cbdc7719a60ce671b98b42fb807544138e450c46dcbf3cb8f52003f725cffb1af210572fe833b0d36
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidF5671.exeFilesize
522KB
MD598343d5db72c918ee90bd9568eb751b5
SHA19e94eba8e500a789a055dde4a1ddc3c73f2a8c8b
SHA256bbc3b8f32bca83d9694ad92861817fc06b314d36c30521871a4e582ff1d54127
SHA512362d85b97902975e5816ab19d32d95fb506906b2b4ac308cbdc7719a60ce671b98b42fb807544138e450c46dcbf3cb8f52003f725cffb1af210572fe833b0d36
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110451.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110451.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWw0890.exeFilesize
379KB
MD5efe0264e17067df6afa44db69db48fd9
SHA14c77166dcf888372b704a59e16a34e83e711db45
SHA256e3973e381af5510c73d523c22fbac278769f4836f47487276dc301892f3f9230
SHA512b0325af4d5bdc2c225044e6baa0f0ad25c7fbedff93cd1099869f544bd5fd1b673f044564d190dfb125ea7fc645d31d3494c1b78f7ac14a46fe044e7616bb0a4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWw0890.exeFilesize
379KB
MD5efe0264e17067df6afa44db69db48fd9
SHA14c77166dcf888372b704a59e16a34e83e711db45
SHA256e3973e381af5510c73d523c22fbac278769f4836f47487276dc301892f3f9230
SHA512b0325af4d5bdc2c225044e6baa0f0ad25c7fbedff93cd1099869f544bd5fd1b673f044564d190dfb125ea7fc645d31d3494c1b78f7ac14a46fe044e7616bb0a4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it096791.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it096791.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr179231.exeFilesize
292KB
MD5b9e361fef33f38350bb50d93c9200fa6
SHA17e5d1f2f09b41faa68ce679d76ad850e346d8f4c
SHA256dafe5ed94f1824df2fc3144313e1b1c66814661f2e336f0c8c53cc10448af528
SHA512bf3edeff14baecec2b2375cf39719c8008101b6e40cedebda2357ed53a007ea7e742d76aa07352a9fcd05be7d15e803dbf68123edab926a980d2bffc61376e25
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr179231.exeFilesize
292KB
MD5b9e361fef33f38350bb50d93c9200fa6
SHA17e5d1f2f09b41faa68ce679d76ad850e346d8f4c
SHA256dafe5ed94f1824df2fc3144313e1b1c66814661f2e336f0c8c53cc10448af528
SHA512bf3edeff14baecec2b2375cf39719c8008101b6e40cedebda2357ed53a007ea7e742d76aa07352a9fcd05be7d15e803dbf68123edab926a980d2bffc61376e25
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/2492-1099-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/2800-154-0x0000000000B20000-0x0000000000B2A000-memory.dmpFilesize
40KB
-
memory/3892-1092-0x00000000000F0000-0x0000000000122000-memory.dmpFilesize
200KB
-
memory/3892-1093-0x0000000004D10000-0x0000000004D20000-memory.dmpFilesize
64KB
-
memory/4684-206-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-1073-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4684-184-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-186-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-188-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-190-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-192-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-194-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-196-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-198-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-200-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-202-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-204-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-180-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-208-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-210-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-212-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-214-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-216-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-218-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-220-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-222-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-224-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-226-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-228-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-1071-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/4684-1072-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4684-182-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-1074-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-1075-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4684-1077-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-1078-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-1079-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-1080-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4684-1081-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4684-1082-0x00000000065C0000-0x0000000006782000-memory.dmpFilesize
1.8MB
-
memory/4684-1083-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/4684-178-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-176-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-174-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-172-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-170-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-168-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-166-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-165-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4684-164-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-163-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-162-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-161-0x00000000005E0000-0x000000000062B000-memory.dmpFilesize
300KB
-
memory/4684-160-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/4684-1084-0x00000000022F0000-0x0000000002300000-memory.dmpFilesize
64KB
-
memory/4684-1085-0x0000000006FF0000-0x0000000007066000-memory.dmpFilesize
472KB
-
memory/4684-1086-0x0000000007080000-0x00000000070D0000-memory.dmpFilesize
320KB