Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:26
Static task
static1
General
-
Target
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe
-
Size
801KB
-
MD5
4a2441ea92ca181c4cf039ef6a1cfa5d
-
SHA1
5ef4cd7ca3c99785d3613e9625fb2349fdcca596
-
SHA256
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08
-
SHA512
6c7ed523eedbac64eaa8dba600106467c0247535ec972c87a65551a9c4dad674eabbae6dd3d72cb735cf9f835fa3fcd7d2b3db6cf38333074c675da3faf7467c
-
SSDEEP
12288:vMrEy90XLVnJvDDUIR0S7Gi73TWiJAxK7CliYv/TImxzYGwMnmEZDwTw:vyELzvD4exH73CiWxflB7INMnow
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it859975.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it859975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it859975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it859975.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it859975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it859975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it859975.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/648-162-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-163-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-165-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-167-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-169-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-171-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-173-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-175-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-177-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-179-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-181-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-183-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-185-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-187-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-189-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-191-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-194-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-200-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-198-0x0000000002400000-0x0000000002410000-memory.dmp family_redline behavioral1/memory/648-202-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-197-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-204-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-206-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-208-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-210-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-212-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-214-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-216-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-218-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-220-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-222-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-224-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-226-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/648-228-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr885318.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr885318.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
ziPe5361.exezill7918.exeit859975.exejr555650.exekp110783.exelr885318.exeoneetx.exeoneetx.exeoneetx.exepid process 4620 ziPe5361.exe 4996 zill7918.exe 4448 it859975.exe 648 jr555650.exe 3400 kp110783.exe 4320 lr885318.exe 2588 oneetx.exe 2168 oneetx.exe 4996 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1988 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it859975.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it859975.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziPe5361.exezill7918.exe6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPe5361.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zill7918.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zill7918.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPe5361.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2120 648 WerFault.exe jr555650.exe 1612 4320 WerFault.exe lr885318.exe 540 4320 WerFault.exe lr885318.exe 4576 4320 WerFault.exe lr885318.exe 2344 4320 WerFault.exe lr885318.exe 3336 4320 WerFault.exe lr885318.exe 5108 4320 WerFault.exe lr885318.exe 960 4320 WerFault.exe lr885318.exe 1200 4320 WerFault.exe lr885318.exe 3640 4320 WerFault.exe lr885318.exe 3420 4320 WerFault.exe lr885318.exe 1500 2588 WerFault.exe oneetx.exe 4256 2588 WerFault.exe oneetx.exe 772 2588 WerFault.exe oneetx.exe 3612 2588 WerFault.exe oneetx.exe 804 2588 WerFault.exe oneetx.exe 2332 2588 WerFault.exe oneetx.exe 1524 2588 WerFault.exe oneetx.exe 3020 2588 WerFault.exe oneetx.exe 2836 2588 WerFault.exe oneetx.exe 3288 2588 WerFault.exe oneetx.exe 4872 2588 WerFault.exe oneetx.exe 3672 2168 WerFault.exe oneetx.exe 1640 2588 WerFault.exe oneetx.exe 2256 2588 WerFault.exe oneetx.exe 180 2588 WerFault.exe oneetx.exe 4064 4996 WerFault.exe oneetx.exe 1604 2588 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it859975.exejr555650.exekp110783.exepid process 4448 it859975.exe 4448 it859975.exe 648 jr555650.exe 648 jr555650.exe 3400 kp110783.exe 3400 kp110783.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it859975.exejr555650.exekp110783.exedescription pid process Token: SeDebugPrivilege 4448 it859975.exe Token: SeDebugPrivilege 648 jr555650.exe Token: SeDebugPrivilege 3400 kp110783.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr885318.exepid process 4320 lr885318.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exeziPe5361.exezill7918.exelr885318.exeoneetx.exedescription pid process target process PID 1504 wrote to memory of 4620 1504 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe ziPe5361.exe PID 1504 wrote to memory of 4620 1504 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe ziPe5361.exe PID 1504 wrote to memory of 4620 1504 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe ziPe5361.exe PID 4620 wrote to memory of 4996 4620 ziPe5361.exe zill7918.exe PID 4620 wrote to memory of 4996 4620 ziPe5361.exe zill7918.exe PID 4620 wrote to memory of 4996 4620 ziPe5361.exe zill7918.exe PID 4996 wrote to memory of 4448 4996 zill7918.exe it859975.exe PID 4996 wrote to memory of 4448 4996 zill7918.exe it859975.exe PID 4996 wrote to memory of 648 4996 zill7918.exe jr555650.exe PID 4996 wrote to memory of 648 4996 zill7918.exe jr555650.exe PID 4996 wrote to memory of 648 4996 zill7918.exe jr555650.exe PID 4620 wrote to memory of 3400 4620 ziPe5361.exe kp110783.exe PID 4620 wrote to memory of 3400 4620 ziPe5361.exe kp110783.exe PID 4620 wrote to memory of 3400 4620 ziPe5361.exe kp110783.exe PID 1504 wrote to memory of 4320 1504 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe lr885318.exe PID 1504 wrote to memory of 4320 1504 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe lr885318.exe PID 1504 wrote to memory of 4320 1504 6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe lr885318.exe PID 4320 wrote to memory of 2588 4320 lr885318.exe oneetx.exe PID 4320 wrote to memory of 2588 4320 lr885318.exe oneetx.exe PID 4320 wrote to memory of 2588 4320 lr885318.exe oneetx.exe PID 2588 wrote to memory of 1688 2588 oneetx.exe schtasks.exe PID 2588 wrote to memory of 1688 2588 oneetx.exe schtasks.exe PID 2588 wrote to memory of 1688 2588 oneetx.exe schtasks.exe PID 2588 wrote to memory of 1988 2588 oneetx.exe rundll32.exe PID 2588 wrote to memory of 1988 2588 oneetx.exe rundll32.exe PID 2588 wrote to memory of 1988 2588 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe"C:\Users\Admin\AppData\Local\Temp\6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPe5361.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPe5361.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zill7918.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zill7918.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it859975.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it859975.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr555650.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr555650.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 16645⤵
- Program crash
PID:2120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110783.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr885318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr885318.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 6963⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 7803⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 7963⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 8043⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 9803⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 9843⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 12203⤵
- Program crash
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 12363⤵
- Program crash
PID:1200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 13203⤵
- Program crash
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6924⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8564⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8764⤵
- Program crash
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10524⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10524⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10524⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 11164⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9924⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 12884⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 7444⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 7444⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 11364⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 16124⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 11604⤵
- Program crash
PID:180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 16284⤵
- Program crash
PID:1604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 9523⤵
- Program crash
PID:3420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 648 -ip 6481⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4320 -ip 43201⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4320 -ip 43201⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4320 -ip 43201⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4320 -ip 43201⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4320 -ip 43201⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4320 -ip 43201⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4320 -ip 43201⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4320 -ip 43201⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4320 -ip 43201⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4320 -ip 43201⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2588 -ip 25881⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2588 -ip 25881⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2588 -ip 25881⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2588 -ip 25881⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2588 -ip 25881⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2588 -ip 25881⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2588 -ip 25881⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2588 -ip 25881⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2588 -ip 25881⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2588 -ip 25881⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2588 -ip 25881⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 3162⤵
- Program crash
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2168 -ip 21681⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2588 -ip 25881⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2588 -ip 25881⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2588 -ip 25881⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 3322⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4996 -ip 49961⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2588 -ip 25881⤵PID:4216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
536KB
MD5093587fbce1393d58517ffc6a8563c68
SHA12120c0f0c81c1081752528db39edad02c9af4626
SHA256fabfe4fce1ce97852f6b792f7a9f067d43f7ffa77856206f6549a3f112c93b90
SHA512fe656f79e95368449ebbb8aed89d716a2cdb666339a95b357d3565e96030fe14ba3f01414a12339ed58ada587dffc4b5fbd2e839ef489e4441bc97ac61e5c6a4
-
Filesize
536KB
MD5093587fbce1393d58517ffc6a8563c68
SHA12120c0f0c81c1081752528db39edad02c9af4626
SHA256fabfe4fce1ce97852f6b792f7a9f067d43f7ffa77856206f6549a3f112c93b90
SHA512fe656f79e95368449ebbb8aed89d716a2cdb666339a95b357d3565e96030fe14ba3f01414a12339ed58ada587dffc4b5fbd2e839ef489e4441bc97ac61e5c6a4
-
Filesize
168KB
MD5330681352b38317330f1a1a1beeb0797
SHA1359f908695495dcc15f71c69a7e1201cef7533db
SHA256b333f7f095ef07e7504e31e0915990bbe157066374b95fa9dd79476310f64fd9
SHA512ba022e1065089cd982bd46a1b9742046214008243630b8cad33246cbb9967e477d4d93c54416450131fc2f115595d107785d8494fff31d5c3a1512be97251515
-
Filesize
168KB
MD5330681352b38317330f1a1a1beeb0797
SHA1359f908695495dcc15f71c69a7e1201cef7533db
SHA256b333f7f095ef07e7504e31e0915990bbe157066374b95fa9dd79476310f64fd9
SHA512ba022e1065089cd982bd46a1b9742046214008243630b8cad33246cbb9967e477d4d93c54416450131fc2f115595d107785d8494fff31d5c3a1512be97251515
-
Filesize
382KB
MD5f45230abf4feb4c00eb3947ebfae66b0
SHA1877dad1bc4d6892bf567f6ced8bc4a83cbaf7350
SHA256b6a20ff26822cc13261b60a76088137c9c8af9bf5d42c0e7b13ffa0e632f9dcf
SHA51256d60b7238d85dde165185cd2c0b08c7df370c998de7e688e9e490e381b8506376b23cf4a6a670b427865808bbeef314ebff823ffad2a401baedae2867415ba4
-
Filesize
382KB
MD5f45230abf4feb4c00eb3947ebfae66b0
SHA1877dad1bc4d6892bf567f6ced8bc4a83cbaf7350
SHA256b6a20ff26822cc13261b60a76088137c9c8af9bf5d42c0e7b13ffa0e632f9dcf
SHA51256d60b7238d85dde165185cd2c0b08c7df370c998de7e688e9e490e381b8506376b23cf4a6a670b427865808bbeef314ebff823ffad2a401baedae2867415ba4
-
Filesize
11KB
MD599e18487964f268048fce7aa653a4709
SHA12a337ac27e818346b0d122027126ef8c535a1c03
SHA25634e1e749928c5eee47ee640a254ae8127c858ec3995c08366426eda82f6ad6c5
SHA512d0f135096ac84d2cc695afda2ecfb5e6f8e8e3da422153a52c5c5b61169269cfc18cdb7f57277e591d2c96057d37c426a78b2ebd512b157eeca93ae1f43f159f
-
Filesize
11KB
MD599e18487964f268048fce7aa653a4709
SHA12a337ac27e818346b0d122027126ef8c535a1c03
SHA25634e1e749928c5eee47ee640a254ae8127c858ec3995c08366426eda82f6ad6c5
SHA512d0f135096ac84d2cc695afda2ecfb5e6f8e8e3da422153a52c5c5b61169269cfc18cdb7f57277e591d2c96057d37c426a78b2ebd512b157eeca93ae1f43f159f
-
Filesize
297KB
MD5c51fd3f601f0e8c67f95ed16eda3e182
SHA171f34b2cffae3bf97074303bc263f1cb69b41b6f
SHA256c4555b69d97578101ec49ad23bd0304f8d2a832819b7e524b70f2febbca28177
SHA51298875dad827cd85ff1e7a01852ecd3012978f01a373441e038f19bec3f53a7c7277ff894b00c83cceb7f15353e41be7701d2e93ada159fedcf039bbbc6f5e0e9
-
Filesize
297KB
MD5c51fd3f601f0e8c67f95ed16eda3e182
SHA171f34b2cffae3bf97074303bc263f1cb69b41b6f
SHA256c4555b69d97578101ec49ad23bd0304f8d2a832819b7e524b70f2febbca28177
SHA51298875dad827cd85ff1e7a01852ecd3012978f01a373441e038f19bec3f53a7c7277ff894b00c83cceb7f15353e41be7701d2e93ada159fedcf039bbbc6f5e0e9
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5