Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:19
Static task
static1
General
-
Target
a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe
-
Size
938KB
-
MD5
658d12b82c9074884d976ebd0e0b0bde
-
SHA1
400282505340d6057b04d0db3156a1bd0b772503
-
SHA256
a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a
-
SHA512
3c45bc9871ed1d8ccafaa3e1c2a0cfd374d6714cd20ef31de3ca46f47d97281b947cb4d1facd4c552db92721daaeb46f19e9e4929b3f2016e8d0157df7e1dc2c
-
SSDEEP
12288:8MrAy90qIZlu14+mTrnjDtgS6eYFk6WzCfIFJNE/OXtK7C20IMOegrjG8m31eRfh:kyaPudW3J6e9AfINs8tf20IM+jNmFEp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr899536.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr899536.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr899536.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr899536.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr899536.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr899536.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr899536.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/5112-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-218-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-222-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-224-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-226-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-228-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-230-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-232-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-234-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si860469.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si860469.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un631326.exeun791803.exepr899536.exequ369084.exerk991278.exesi860469.exeoneetx.exeoneetx.exeoneetx.exepid process 1268 un631326.exe 1312 un791803.exe 2372 pr899536.exe 5112 qu369084.exe 5088 rk991278.exe 3432 si860469.exe 3424 oneetx.exe 3608 oneetx.exe 2804 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5012 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr899536.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr899536.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr899536.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exeun631326.exeun791803.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un631326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un631326.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un791803.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un791803.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4316 2372 WerFault.exe pr899536.exe 2248 5112 WerFault.exe qu369084.exe 524 3432 WerFault.exe si860469.exe 1784 3432 WerFault.exe si860469.exe 4264 3432 WerFault.exe si860469.exe 1064 3432 WerFault.exe si860469.exe 2036 3432 WerFault.exe si860469.exe 2756 3432 WerFault.exe si860469.exe 772 3432 WerFault.exe si860469.exe 4592 3432 WerFault.exe si860469.exe 4316 3432 WerFault.exe si860469.exe 3216 3432 WerFault.exe si860469.exe 3540 3424 WerFault.exe oneetx.exe 3856 3424 WerFault.exe oneetx.exe 3296 3424 WerFault.exe oneetx.exe 4252 3424 WerFault.exe oneetx.exe 556 3424 WerFault.exe oneetx.exe 1420 3424 WerFault.exe oneetx.exe 1748 3424 WerFault.exe oneetx.exe 3804 3424 WerFault.exe oneetx.exe 3348 3424 WerFault.exe oneetx.exe 1100 3424 WerFault.exe oneetx.exe 4460 3424 WerFault.exe oneetx.exe 756 3608 WerFault.exe oneetx.exe 740 3424 WerFault.exe oneetx.exe 872 3424 WerFault.exe oneetx.exe 4348 3424 WerFault.exe oneetx.exe 1224 2804 WerFault.exe oneetx.exe 3344 3424 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr899536.exequ369084.exerk991278.exepid process 2372 pr899536.exe 2372 pr899536.exe 5112 qu369084.exe 5112 qu369084.exe 5088 rk991278.exe 5088 rk991278.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr899536.exequ369084.exerk991278.exedescription pid process Token: SeDebugPrivilege 2372 pr899536.exe Token: SeDebugPrivilege 5112 qu369084.exe Token: SeDebugPrivilege 5088 rk991278.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si860469.exepid process 3432 si860469.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exeun631326.exeun791803.exesi860469.exeoneetx.exedescription pid process target process PID 832 wrote to memory of 1268 832 a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe un631326.exe PID 832 wrote to memory of 1268 832 a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe un631326.exe PID 832 wrote to memory of 1268 832 a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe un631326.exe PID 1268 wrote to memory of 1312 1268 un631326.exe un791803.exe PID 1268 wrote to memory of 1312 1268 un631326.exe un791803.exe PID 1268 wrote to memory of 1312 1268 un631326.exe un791803.exe PID 1312 wrote to memory of 2372 1312 un791803.exe pr899536.exe PID 1312 wrote to memory of 2372 1312 un791803.exe pr899536.exe PID 1312 wrote to memory of 2372 1312 un791803.exe pr899536.exe PID 1312 wrote to memory of 5112 1312 un791803.exe qu369084.exe PID 1312 wrote to memory of 5112 1312 un791803.exe qu369084.exe PID 1312 wrote to memory of 5112 1312 un791803.exe qu369084.exe PID 1268 wrote to memory of 5088 1268 un631326.exe rk991278.exe PID 1268 wrote to memory of 5088 1268 un631326.exe rk991278.exe PID 1268 wrote to memory of 5088 1268 un631326.exe rk991278.exe PID 832 wrote to memory of 3432 832 a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe si860469.exe PID 832 wrote to memory of 3432 832 a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe si860469.exe PID 832 wrote to memory of 3432 832 a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe si860469.exe PID 3432 wrote to memory of 3424 3432 si860469.exe oneetx.exe PID 3432 wrote to memory of 3424 3432 si860469.exe oneetx.exe PID 3432 wrote to memory of 3424 3432 si860469.exe oneetx.exe PID 3424 wrote to memory of 2096 3424 oneetx.exe schtasks.exe PID 3424 wrote to memory of 2096 3424 oneetx.exe schtasks.exe PID 3424 wrote to memory of 2096 3424 oneetx.exe schtasks.exe PID 3424 wrote to memory of 5012 3424 oneetx.exe rundll32.exe PID 3424 wrote to memory of 5012 3424 oneetx.exe rundll32.exe PID 3424 wrote to memory of 5012 3424 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe"C:\Users\Admin\AppData\Local\Temp\a6bdb3a194d22538cfac0c50082b5dd68c302f55f5c683807465fd960dfca51a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un631326.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un631326.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un791803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un791803.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr899536.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr899536.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 10805⤵
- Program crash
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu369084.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu369084.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 13485⤵
- Program crash
PID:2248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk991278.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk991278.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860469.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860469.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 6963⤵
- Program crash
PID:524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 7723⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 8083⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 8683⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 9683⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 9723⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 11563⤵
- Program crash
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 12363⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 13203⤵
- Program crash
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6924⤵
- Program crash
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10044⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10124⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10964⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 11084⤵
- Program crash
PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10164⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 11124⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9924⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 7884⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 12644⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 8884⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10804⤵
- Program crash
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 16004⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10844⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 16164⤵
- Program crash
PID:3344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 9563⤵
- Program crash
PID:3216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2372 -ip 23721⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 5112 -ip 51121⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3432 -ip 34321⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3432 -ip 34321⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3432 -ip 34321⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3432 -ip 34321⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3432 -ip 34321⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3432 -ip 34321⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3432 -ip 34321⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3432 -ip 34321⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3432 -ip 34321⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3432 -ip 34321⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3424 -ip 34241⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3424 -ip 34241⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3424 -ip 34241⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3424 -ip 34241⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3424 -ip 34241⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3424 -ip 34241⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3424 -ip 34241⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3424 -ip 34241⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3424 -ip 34241⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3424 -ip 34241⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 3424 -ip 34241⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 3122⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3608 -ip 36081⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 3424 -ip 34241⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 3424 -ip 34241⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3424 -ip 34241⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 3122⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 2804 -ip 28041⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3424 -ip 34241⤵PID:3796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
674KB
MD50370f68862b0edbd43f62cecdc803ec4
SHA19ff76395d441dcee65406c7094ce5b3f2e7ecfd0
SHA2560d2dd7f4089adef3d51b3d63f2c2e67b2e1cd16a15146e7a1e1edc077fdf5bf0
SHA51224276cf321fdb884f252b01101fea82fd8828db2ba2d4f3ec2c3a7c822999b1368b6aaf16911e09356863dfe4af1082b6632cac545076cf275ed014664b08aa2
-
Filesize
674KB
MD50370f68862b0edbd43f62cecdc803ec4
SHA19ff76395d441dcee65406c7094ce5b3f2e7ecfd0
SHA2560d2dd7f4089adef3d51b3d63f2c2e67b2e1cd16a15146e7a1e1edc077fdf5bf0
SHA51224276cf321fdb884f252b01101fea82fd8828db2ba2d4f3ec2c3a7c822999b1368b6aaf16911e09356863dfe4af1082b6632cac545076cf275ed014664b08aa2
-
Filesize
168KB
MD5c4c8791cf5d4a9284617669f84b40d19
SHA1822d326f919c30662961bb6fc666225a86b89b8d
SHA256ed3fc7282453cf1b34617871faacc80f92078ab94609ceb8a8fae845c1eec125
SHA5122d2010acd664e980100ce281ba614662c9de3477acdedb09a60bc03439728a6f138ab367b239aeb6595c95673c559ec83e289f1e1fe4f181fa58c642db2d1770
-
Filesize
168KB
MD5c4c8791cf5d4a9284617669f84b40d19
SHA1822d326f919c30662961bb6fc666225a86b89b8d
SHA256ed3fc7282453cf1b34617871faacc80f92078ab94609ceb8a8fae845c1eec125
SHA5122d2010acd664e980100ce281ba614662c9de3477acdedb09a60bc03439728a6f138ab367b239aeb6595c95673c559ec83e289f1e1fe4f181fa58c642db2d1770
-
Filesize
521KB
MD591c457b7e11f58da30d23b8cc8e7feab
SHA1e230a2157d5b3e514f7789647ca9b17643b47bf0
SHA2566993d7562d3e947fda2f82b91d491ec31a438ac365f17395153394b22ba20b22
SHA512aeae9c50b20134509996fe00a6cc3fcdbe76e11a7dcdcc19b2153a7bb027c42e721db41112c2931a0252f8f147b410d4b3eb8d5a58dd3bc0fcd4751da3a1d08f
-
Filesize
521KB
MD591c457b7e11f58da30d23b8cc8e7feab
SHA1e230a2157d5b3e514f7789647ca9b17643b47bf0
SHA2566993d7562d3e947fda2f82b91d491ec31a438ac365f17395153394b22ba20b22
SHA512aeae9c50b20134509996fe00a6cc3fcdbe76e11a7dcdcc19b2153a7bb027c42e721db41112c2931a0252f8f147b410d4b3eb8d5a58dd3bc0fcd4751da3a1d08f
-
Filesize
239KB
MD51df63b59c667abe3c15d0e4fde60f71c
SHA181b7ea8d74ebf0d230eb6c80ae3566037865ce14
SHA256a91ee2a2dc053f6ad4b68626c080fc46f4c5e95f79d40f939bf62d64a16f09b8
SHA51279765e50de2f6e15e2bef2b47f19fda96befec3753e497f46e0748eeaf7b84136241d459b7a919ff55ea112243108296ed0ca13028739d2812773022b4568cd6
-
Filesize
239KB
MD51df63b59c667abe3c15d0e4fde60f71c
SHA181b7ea8d74ebf0d230eb6c80ae3566037865ce14
SHA256a91ee2a2dc053f6ad4b68626c080fc46f4c5e95f79d40f939bf62d64a16f09b8
SHA51279765e50de2f6e15e2bef2b47f19fda96befec3753e497f46e0748eeaf7b84136241d459b7a919ff55ea112243108296ed0ca13028739d2812773022b4568cd6
-
Filesize
297KB
MD5cae65c8e28b147a67964041ba1d55de4
SHA10d52cf7c8f6319cba4702270783e8a54a003da2c
SHA256d67fd21b657d1be597b1d4e48fbad28b5e1ad356c4cbf687c2a84ca020656101
SHA5121d4772b8aef4aabd1206e17259afe66ac3a004e6a83db197ba8ff3dfa617ddfa00987d943e2326b9e6d10f601969238cf901c6e22c31e415ae7b8ac930638cb6
-
Filesize
297KB
MD5cae65c8e28b147a67964041ba1d55de4
SHA10d52cf7c8f6319cba4702270783e8a54a003da2c
SHA256d67fd21b657d1be597b1d4e48fbad28b5e1ad356c4cbf687c2a84ca020656101
SHA5121d4772b8aef4aabd1206e17259afe66ac3a004e6a83db197ba8ff3dfa617ddfa00987d943e2326b9e6d10f601969238cf901c6e22c31e415ae7b8ac930638cb6
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5