Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:21
Static task
static1
General
-
Target
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe
-
Size
940KB
-
MD5
c7aadcffaa200937e8f3c77866403f3a
-
SHA1
6bbf989ca68666115a9bd3902a5f413e2b90e04f
-
SHA256
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e
-
SHA512
107719e748f7e4f10ccdd6dff64406d0c7df5ef8b8683267dd39cf699d6e6c446b4a42b0c849847b270fceb28ee4c1f713e5dacc023a2799e973e5a72e189c24
-
SSDEEP
24576:WyxjsFtpOA9OwV0yLG4yyGTSIhDh2Ow00A8jW4Fo2e:lxqtKyLRyybr0AiC1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr929064.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr929064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr929064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr929064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr929064.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr929064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr929064.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/652-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-218-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-222-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-224-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-226-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-228-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-230-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-232-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/652-234-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exesi333974.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si333974.exe -
Executes dropped EXE 8 IoCs
Processes:
un367425.exeun545645.exepr929064.exequ247666.exerk179085.exesi333974.exeoneetx.exeoneetx.exepid process 4904 un367425.exe 4112 un545645.exe 3212 pr929064.exe 652 qu247666.exe 4388 rk179085.exe 4660 si333974.exe 932 oneetx.exe 3284 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2008 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr929064.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr929064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr929064.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un545645.exef0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exeun367425.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un545645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un545645.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un367425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367425.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2916 3212 WerFault.exe pr929064.exe 1164 652 WerFault.exe qu247666.exe 1412 4660 WerFault.exe si333974.exe 852 4660 WerFault.exe si333974.exe 4288 4660 WerFault.exe si333974.exe 2944 4660 WerFault.exe si333974.exe 2812 4660 WerFault.exe si333974.exe 3780 4660 WerFault.exe si333974.exe 3940 4660 WerFault.exe si333974.exe 5004 4660 WerFault.exe si333974.exe 4728 4660 WerFault.exe si333974.exe 1540 4660 WerFault.exe si333974.exe 2840 932 WerFault.exe oneetx.exe 4152 932 WerFault.exe oneetx.exe 3356 932 WerFault.exe oneetx.exe 2032 932 WerFault.exe oneetx.exe 1392 932 WerFault.exe oneetx.exe 5048 932 WerFault.exe oneetx.exe 3392 932 WerFault.exe oneetx.exe 1360 932 WerFault.exe oneetx.exe 2400 932 WerFault.exe oneetx.exe 1164 932 WerFault.exe oneetx.exe 4504 932 WerFault.exe oneetx.exe 848 932 WerFault.exe oneetx.exe 3496 932 WerFault.exe oneetx.exe 4516 3284 WerFault.exe oneetx.exe 3612 932 WerFault.exe oneetx.exe 3528 932 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr929064.exequ247666.exerk179085.exepid process 3212 pr929064.exe 3212 pr929064.exe 652 qu247666.exe 652 qu247666.exe 4388 rk179085.exe 4388 rk179085.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr929064.exequ247666.exerk179085.exedescription pid process Token: SeDebugPrivilege 3212 pr929064.exe Token: SeDebugPrivilege 652 qu247666.exe Token: SeDebugPrivilege 4388 rk179085.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si333974.exepid process 4660 si333974.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exeun367425.exeun545645.exesi333974.exeoneetx.exedescription pid process target process PID 1372 wrote to memory of 4904 1372 f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe un367425.exe PID 1372 wrote to memory of 4904 1372 f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe un367425.exe PID 1372 wrote to memory of 4904 1372 f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe un367425.exe PID 4904 wrote to memory of 4112 4904 un367425.exe un545645.exe PID 4904 wrote to memory of 4112 4904 un367425.exe un545645.exe PID 4904 wrote to memory of 4112 4904 un367425.exe un545645.exe PID 4112 wrote to memory of 3212 4112 un545645.exe pr929064.exe PID 4112 wrote to memory of 3212 4112 un545645.exe pr929064.exe PID 4112 wrote to memory of 3212 4112 un545645.exe pr929064.exe PID 4112 wrote to memory of 652 4112 un545645.exe qu247666.exe PID 4112 wrote to memory of 652 4112 un545645.exe qu247666.exe PID 4112 wrote to memory of 652 4112 un545645.exe qu247666.exe PID 4904 wrote to memory of 4388 4904 un367425.exe rk179085.exe PID 4904 wrote to memory of 4388 4904 un367425.exe rk179085.exe PID 4904 wrote to memory of 4388 4904 un367425.exe rk179085.exe PID 1372 wrote to memory of 4660 1372 f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe si333974.exe PID 1372 wrote to memory of 4660 1372 f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe si333974.exe PID 1372 wrote to memory of 4660 1372 f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe si333974.exe PID 4660 wrote to memory of 932 4660 si333974.exe oneetx.exe PID 4660 wrote to memory of 932 4660 si333974.exe oneetx.exe PID 4660 wrote to memory of 932 4660 si333974.exe oneetx.exe PID 932 wrote to memory of 3040 932 oneetx.exe schtasks.exe PID 932 wrote to memory of 3040 932 oneetx.exe schtasks.exe PID 932 wrote to memory of 3040 932 oneetx.exe schtasks.exe PID 932 wrote to memory of 2008 932 oneetx.exe rundll32.exe PID 932 wrote to memory of 2008 932 oneetx.exe rundll32.exe PID 932 wrote to memory of 2008 932 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe"C:\Users\Admin\AppData\Local\Temp\f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367425.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un545645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un545645.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr929064.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr929064.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 10805⤵
- Program crash
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu247666.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu247666.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 13285⤵
- Program crash
PID:1164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk179085.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk179085.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si333974.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 7043⤵
- Program crash
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 7643⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 7963⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 9603⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 9483⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 9923⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 12043⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 12523⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13123⤵
- Program crash
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6924⤵
- Program crash
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 8284⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 8764⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 9004⤵
- Program crash
PID:2032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10604⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10604⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10604⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10844⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 9924⤵
- Program crash
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 7684⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6924⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 7764⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 11204⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 16124⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 11204⤵
- Program crash
PID:3528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13803⤵
- Program crash
PID:1540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3212 -ip 32121⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 652 -ip 6521⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4660 -ip 46601⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4660 -ip 46601⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4660 -ip 46601⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4660 -ip 46601⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4660 -ip 46601⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4660 -ip 46601⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4660 -ip 46601⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4660 -ip 46601⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4660 -ip 46601⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4660 -ip 46601⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 932 -ip 9321⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 932 -ip 9321⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 932 -ip 9321⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 932 -ip 9321⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 932 -ip 9321⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 932 -ip 9321⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 932 -ip 9321⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 932 -ip 9321⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 932 -ip 9321⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 932 -ip 9321⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 932 -ip 9321⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 932 -ip 9321⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 932 -ip 9321⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 3162⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3284 -ip 32841⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 932 -ip 9321⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 932 -ip 9321⤵PID:3580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
675KB
MD570a6cbce7f791192de2aade92e1d6260
SHA10000a30d3fa35fe36e05c1299ab5ef220a14eb7a
SHA256323aef6f13acbb4a943f8475f3b1d3ac785bb9dc9bde5edcdc4ee74f6fc75a7b
SHA51227be1d77b5ec743f1a1fb7248391e8671bca368bd85d0077be93b71185f0062c80efbded6931dbfa1e8144a0d7134f0bc2516a8893ac1c580aee76be61896a5d
-
Filesize
675KB
MD570a6cbce7f791192de2aade92e1d6260
SHA10000a30d3fa35fe36e05c1299ab5ef220a14eb7a
SHA256323aef6f13acbb4a943f8475f3b1d3ac785bb9dc9bde5edcdc4ee74f6fc75a7b
SHA51227be1d77b5ec743f1a1fb7248391e8671bca368bd85d0077be93b71185f0062c80efbded6931dbfa1e8144a0d7134f0bc2516a8893ac1c580aee76be61896a5d
-
Filesize
168KB
MD5a2fb95ee0188d7855e0983b23f44dcc1
SHA1f32c32a136e08c0e7982d7bd028345278dc50166
SHA2563735b83f34aa6bc3eb6cd3b190faf99745a57302d2c9095d1d9b636dc46fe3b8
SHA512aeb2bd277c447f29bc8ace5b2ae0059647828104ccf8977a38d690ab50fe8ddc512b3500e2256b573e4aca955d94d728a6899ae126b6b094673481827539ecd6
-
Filesize
168KB
MD5a2fb95ee0188d7855e0983b23f44dcc1
SHA1f32c32a136e08c0e7982d7bd028345278dc50166
SHA2563735b83f34aa6bc3eb6cd3b190faf99745a57302d2c9095d1d9b636dc46fe3b8
SHA512aeb2bd277c447f29bc8ace5b2ae0059647828104ccf8977a38d690ab50fe8ddc512b3500e2256b573e4aca955d94d728a6899ae126b6b094673481827539ecd6
-
Filesize
521KB
MD528ce0d8ccd2ae74e9edd602a810837b1
SHA15eca515abd9c6d5e568d826cfc0745ca6d9ca1f6
SHA2565b212421a12d5bdab918c15d20abb67c40645c7cd8f82c0a08bdfa0bdc8d258f
SHA5126442b3abc254fca0cf34f0ddb0bc780a78c86410d9ebe99842a474ef1918b978aeafa204dfd1eceb3b5ff00637927c89baa5e33f59244d6854d8a6b4e8184c27
-
Filesize
521KB
MD528ce0d8ccd2ae74e9edd602a810837b1
SHA15eca515abd9c6d5e568d826cfc0745ca6d9ca1f6
SHA2565b212421a12d5bdab918c15d20abb67c40645c7cd8f82c0a08bdfa0bdc8d258f
SHA5126442b3abc254fca0cf34f0ddb0bc780a78c86410d9ebe99842a474ef1918b978aeafa204dfd1eceb3b5ff00637927c89baa5e33f59244d6854d8a6b4e8184c27
-
Filesize
239KB
MD568395cb66126165746450e3effc0ae2d
SHA1c8203f5e8c3c62fa4f243a78b1507dd8db56270a
SHA256ed222d62a54b9fcd281f9c19e1ae075dbb36c0644092720cebf048fa040c6543
SHA512d7ee1ad468edd427348dc2c696dab5c6e864541921e2dd3244263c3c30e2eabb172c501e40bb9eb0d7463c15eba0641efe289445271d028cc83838cf5c89a17e
-
Filesize
239KB
MD568395cb66126165746450e3effc0ae2d
SHA1c8203f5e8c3c62fa4f243a78b1507dd8db56270a
SHA256ed222d62a54b9fcd281f9c19e1ae075dbb36c0644092720cebf048fa040c6543
SHA512d7ee1ad468edd427348dc2c696dab5c6e864541921e2dd3244263c3c30e2eabb172c501e40bb9eb0d7463c15eba0641efe289445271d028cc83838cf5c89a17e
-
Filesize
297KB
MD5528dc0a435a1c1fdccb6a3fed3468270
SHA1650838cddb9781dd33794abb67fd3cead551556e
SHA2564bdcf9ae5b1bffdad7fd253b645dcf392075766374c2a18561f30151ad5f933e
SHA512427a9ecbdd3b2a7c33a893664b684a5303b2fd5bcfccbeb1ad06bfc9518c6bfbc05b75b4411b6f83c0c1733e114e6034a1955f46bf704c45a9ea513480c8a04c
-
Filesize
297KB
MD5528dc0a435a1c1fdccb6a3fed3468270
SHA1650838cddb9781dd33794abb67fd3cead551556e
SHA2564bdcf9ae5b1bffdad7fd253b645dcf392075766374c2a18561f30151ad5f933e
SHA512427a9ecbdd3b2a7c33a893664b684a5303b2fd5bcfccbeb1ad06bfc9518c6bfbc05b75b4411b6f83c0c1733e114e6034a1955f46bf704c45a9ea513480c8a04c
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5