Analysis
-
max time kernel
147s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:19
Static task
static1
General
-
Target
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe
-
Size
800KB
-
MD5
fcaed692a3bcad757e0cf2c60dcb225c
-
SHA1
7cdf18ad87ea4b1f00b92ded14217c1a1f894f37
-
SHA256
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57
-
SHA512
e70b53a82872ccc5f8815f5b02026a0ffb5620214bbca7efd5cfbb2c40ccb5db805e84ba7ae3b6a2a5742b8c253adffd190be7314fcb56af5035b35396230fef
-
SSDEEP
12288:BMrly90hR6S9WB31pZN/hxiSzboKxK7CjEo38LpFbI635Go6dejhKUCaZCt0p9W:kyqOBlpZzxznFxfjVmZvbUyhKV+z/W
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it413562.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it413562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it413562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it413562.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it413562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it413562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it413562.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/5052-165-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-166-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-168-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-170-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-172-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-174-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-176-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-178-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-180-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-182-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-184-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-186-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-188-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-190-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-192-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-194-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-196-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-198-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-200-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-202-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-204-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-206-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-208-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-210-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-212-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-214-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-216-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-218-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-220-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-222-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-224-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-226-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/5052-228-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr515154.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr515154.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
ziqm0572.exeziBt8254.exeit413562.exejr342908.exekp716401.exelr515154.exeoneetx.exeoneetx.exeoneetx.exepid process 2648 ziqm0572.exe 548 ziBt8254.exe 1796 it413562.exe 5052 jr342908.exe 4380 kp716401.exe 3208 lr515154.exe 2020 oneetx.exe 1936 oneetx.exe 4592 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5008 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it413562.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it413562.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziBt8254.exe181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exeziqm0572.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziBt8254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziBt8254.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziqm0572.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqm0572.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1848 5052 WerFault.exe jr342908.exe 2968 3208 WerFault.exe lr515154.exe 4192 3208 WerFault.exe lr515154.exe 4924 3208 WerFault.exe lr515154.exe 3144 3208 WerFault.exe lr515154.exe 5092 3208 WerFault.exe lr515154.exe 4476 3208 WerFault.exe lr515154.exe 2060 3208 WerFault.exe lr515154.exe 4684 3208 WerFault.exe lr515154.exe 1740 3208 WerFault.exe lr515154.exe 2848 3208 WerFault.exe lr515154.exe 1420 2020 WerFault.exe oneetx.exe 1804 2020 WerFault.exe oneetx.exe 4572 2020 WerFault.exe oneetx.exe 4652 2020 WerFault.exe oneetx.exe 3176 2020 WerFault.exe oneetx.exe 636 2020 WerFault.exe oneetx.exe 3756 2020 WerFault.exe oneetx.exe 1956 2020 WerFault.exe oneetx.exe 3156 2020 WerFault.exe oneetx.exe 4920 2020 WerFault.exe oneetx.exe 60 2020 WerFault.exe oneetx.exe 2236 2020 WerFault.exe oneetx.exe 2080 1936 WerFault.exe oneetx.exe 4752 2020 WerFault.exe oneetx.exe 3944 2020 WerFault.exe oneetx.exe 1708 2020 WerFault.exe oneetx.exe 1356 4592 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it413562.exejr342908.exekp716401.exepid process 1796 it413562.exe 1796 it413562.exe 5052 jr342908.exe 5052 jr342908.exe 4380 kp716401.exe 4380 kp716401.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it413562.exejr342908.exekp716401.exedescription pid process Token: SeDebugPrivilege 1796 it413562.exe Token: SeDebugPrivilege 5052 jr342908.exe Token: SeDebugPrivilege 4380 kp716401.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr515154.exepid process 3208 lr515154.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exeziqm0572.exeziBt8254.exelr515154.exeoneetx.exedescription pid process target process PID 2620 wrote to memory of 2648 2620 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe ziqm0572.exe PID 2620 wrote to memory of 2648 2620 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe ziqm0572.exe PID 2620 wrote to memory of 2648 2620 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe ziqm0572.exe PID 2648 wrote to memory of 548 2648 ziqm0572.exe ziBt8254.exe PID 2648 wrote to memory of 548 2648 ziqm0572.exe ziBt8254.exe PID 2648 wrote to memory of 548 2648 ziqm0572.exe ziBt8254.exe PID 548 wrote to memory of 1796 548 ziBt8254.exe it413562.exe PID 548 wrote to memory of 1796 548 ziBt8254.exe it413562.exe PID 548 wrote to memory of 5052 548 ziBt8254.exe jr342908.exe PID 548 wrote to memory of 5052 548 ziBt8254.exe jr342908.exe PID 548 wrote to memory of 5052 548 ziBt8254.exe jr342908.exe PID 2648 wrote to memory of 4380 2648 ziqm0572.exe kp716401.exe PID 2648 wrote to memory of 4380 2648 ziqm0572.exe kp716401.exe PID 2648 wrote to memory of 4380 2648 ziqm0572.exe kp716401.exe PID 2620 wrote to memory of 3208 2620 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe lr515154.exe PID 2620 wrote to memory of 3208 2620 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe lr515154.exe PID 2620 wrote to memory of 3208 2620 181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe lr515154.exe PID 3208 wrote to memory of 2020 3208 lr515154.exe oneetx.exe PID 3208 wrote to memory of 2020 3208 lr515154.exe oneetx.exe PID 3208 wrote to memory of 2020 3208 lr515154.exe oneetx.exe PID 2020 wrote to memory of 4524 2020 oneetx.exe schtasks.exe PID 2020 wrote to memory of 4524 2020 oneetx.exe schtasks.exe PID 2020 wrote to memory of 4524 2020 oneetx.exe schtasks.exe PID 2020 wrote to memory of 5008 2020 oneetx.exe rundll32.exe PID 2020 wrote to memory of 5008 2020 oneetx.exe rundll32.exe PID 2020 wrote to memory of 5008 2020 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe"C:\Users\Admin\AppData\Local\Temp\181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqm0572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqm0572.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziBt8254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziBt8254.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it413562.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it413562.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr342908.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr342908.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 13485⤵
- Program crash
PID:1848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp716401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp716401.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr515154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr515154.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 6963⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 7563⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 8563⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 9803⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 10083⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 10083⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 12163⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 12323⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 13163⤵
- Program crash
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 6924⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 8844⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 9524⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 10804⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 9524⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 9564⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 11284⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 9964⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 7644⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 7444⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 7564⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 11524⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 15324⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 11004⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 15604⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 13883⤵
- Program crash
PID:2848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5052 -ip 50521⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3208 -ip 32081⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3208 -ip 32081⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3208 -ip 32081⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3208 -ip 32081⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3208 -ip 32081⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3208 -ip 32081⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3208 -ip 32081⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3208 -ip 32081⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3208 -ip 32081⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3208 -ip 32081⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2020 -ip 20201⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2020 -ip 20201⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2020 -ip 20201⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2020 -ip 20201⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2020 -ip 20201⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2020 -ip 20201⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2020 -ip 20201⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2020 -ip 20201⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2020 -ip 20201⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2020 -ip 20201⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2020 -ip 20201⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2020 -ip 20201⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 3242⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1936 -ip 19361⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2020 -ip 20201⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 2020 -ip 20201⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 2020 -ip 20201⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 3202⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 4592 -ip 45921⤵PID:4780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
535KB
MD57013878b48dc6b7b244201126efa990c
SHA12bea70f3f4a8fbbe719e25054799679448229d8a
SHA256b00bc4b08c274ad8ce0fc47a01d74de57b9e984bd3fc80851f44eeca203f0bad
SHA5120a52c2ef736d87a1f6205f7271cd8c53820b1f42fd6469ca50e8d0176404c2b10c090e1698bc4eebaf09899809ffbb777cafeae5e1dded6151025105d594584c
-
Filesize
535KB
MD57013878b48dc6b7b244201126efa990c
SHA12bea70f3f4a8fbbe719e25054799679448229d8a
SHA256b00bc4b08c274ad8ce0fc47a01d74de57b9e984bd3fc80851f44eeca203f0bad
SHA5120a52c2ef736d87a1f6205f7271cd8c53820b1f42fd6469ca50e8d0176404c2b10c090e1698bc4eebaf09899809ffbb777cafeae5e1dded6151025105d594584c
-
Filesize
168KB
MD50ebd44a0b12d38b51caabb4ad2a282a4
SHA18038619aa30bc70ea1aa322c0f0519038fc0c749
SHA25688249b940fe3bb198a7227f111e2b628575a5f0a4b614fd1b2abc9e7d92d7fae
SHA512bdc0153138bcb76d00ad40261d0ec920c96690fa2f1cbb92575ffb352a732d98bd706a61f2a08e8bdc0b8c67fe6d112afff18b569703ddc1ad3686464cf791dc
-
Filesize
168KB
MD50ebd44a0b12d38b51caabb4ad2a282a4
SHA18038619aa30bc70ea1aa322c0f0519038fc0c749
SHA25688249b940fe3bb198a7227f111e2b628575a5f0a4b614fd1b2abc9e7d92d7fae
SHA512bdc0153138bcb76d00ad40261d0ec920c96690fa2f1cbb92575ffb352a732d98bd706a61f2a08e8bdc0b8c67fe6d112afff18b569703ddc1ad3686464cf791dc
-
Filesize
382KB
MD5b84e905f0c512ba39856ddabc4d4e443
SHA16684847105167064ec21d21b6e97913bebb0e22c
SHA256c1ea57ee949c91a0188fb440ce1b1d768822645ae571a47032b439df9c75787a
SHA5123b65b9c2eec73ed791f02a1b82caa120a7ef07d49f1fd7f1e13996e83c6e5fa772d6fcbe8390d8abb2874c5eb8f9f612aecbd2f627f513519e45f80a3928ea73
-
Filesize
382KB
MD5b84e905f0c512ba39856ddabc4d4e443
SHA16684847105167064ec21d21b6e97913bebb0e22c
SHA256c1ea57ee949c91a0188fb440ce1b1d768822645ae571a47032b439df9c75787a
SHA5123b65b9c2eec73ed791f02a1b82caa120a7ef07d49f1fd7f1e13996e83c6e5fa772d6fcbe8390d8abb2874c5eb8f9f612aecbd2f627f513519e45f80a3928ea73
-
Filesize
11KB
MD5d0d2ffa1c18e1d4d666aec1f4b7e3d4e
SHA13f17b695b9c9cccb7ceaf3ce7941365daf75ea4a
SHA256cadba2fbb1e5c0e634fb09e0500f582fa7f8fa05d764f26de8c3902c01838255
SHA5120ea98d830311403c5f4951e13a41dbfb354dc88db6db95356d1cb1ba2fce5e430de751acbb38bc821366952b1ae4b2caa32cc529751cb7c3f100cabaaa900da5
-
Filesize
11KB
MD5d0d2ffa1c18e1d4d666aec1f4b7e3d4e
SHA13f17b695b9c9cccb7ceaf3ce7941365daf75ea4a
SHA256cadba2fbb1e5c0e634fb09e0500f582fa7f8fa05d764f26de8c3902c01838255
SHA5120ea98d830311403c5f4951e13a41dbfb354dc88db6db95356d1cb1ba2fce5e430de751acbb38bc821366952b1ae4b2caa32cc529751cb7c3f100cabaaa900da5
-
Filesize
297KB
MD5b69d60608767206c2b949bcc16f3373e
SHA12a94dcaec52e3ac924eeaf3917f75e8660901de9
SHA25623178d67f5f0d99e5abeb0b7acc9ada0fe35eff99cb9f4d8eabd3108e50caac8
SHA512443ef65871a73c236cd659152619eadbc0b33e5acb45fad909185bce7871dbfcf471086e50addd708a765e7734e6b11c2f17e0bc7cf78b150122ab77ed1c2ae8
-
Filesize
297KB
MD5b69d60608767206c2b949bcc16f3373e
SHA12a94dcaec52e3ac924eeaf3917f75e8660901de9
SHA25623178d67f5f0d99e5abeb0b7acc9ada0fe35eff99cb9f4d8eabd3108e50caac8
SHA512443ef65871a73c236cd659152619eadbc0b33e5acb45fad909185bce7871dbfcf471086e50addd708a765e7734e6b11c2f17e0bc7cf78b150122ab77ed1c2ae8
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5