Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:30
Static task
static1
General
-
Target
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe
-
Size
800KB
-
MD5
e5c327afaad21567e6a4a9cc30661316
-
SHA1
579a662bc621030389c741c1727de66647250c92
-
SHA256
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff
-
SHA512
4b4ccc0b97f31e1877cfe5474ef9411ec975f02cea72c09e9608f5c3e341a5d840b2b223cd0a932f8016eddf85d9454cce0f6cb3fb5bf2fab4ef9354203ae243
-
SSDEEP
12288:sMrny90thWwyLZC1lTOuJ/owxK7CFeaP86T44e6zBxCtoLkvAf52:jygb1lOMxfkaPJBzBxC+LsY2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it496320.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it496320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it496320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it496320.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it496320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it496320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it496320.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3836-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-166-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-168-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-170-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-172-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-174-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-176-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-178-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-180-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-182-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-184-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-186-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-188-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-190-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-192-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-194-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-196-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-200-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-198-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-202-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-204-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-206-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-208-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-210-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-212-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-214-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-216-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-218-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-220-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-222-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-224-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-226-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3836-228-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr407023.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr407023.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
zizO9994.exeziiX8121.exeit496320.exejr367504.exekp312909.exelr407023.exeoneetx.exeoneetx.exeoneetx.exepid process 3824 zizO9994.exe 4852 ziiX8121.exe 3608 it496320.exe 3836 jr367504.exe 4608 kp312909.exe 2580 lr407023.exe 4220 oneetx.exe 1316 oneetx.exe 4980 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4852 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it496320.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it496320.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zizO9994.exeziiX8121.exe82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizO9994.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizO9994.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiX8121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziiX8121.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4668 3836 WerFault.exe jr367504.exe 672 2580 WerFault.exe lr407023.exe 1684 2580 WerFault.exe lr407023.exe 560 2580 WerFault.exe lr407023.exe 4340 2580 WerFault.exe lr407023.exe 4104 2580 WerFault.exe lr407023.exe 3788 2580 WerFault.exe lr407023.exe 2276 2580 WerFault.exe lr407023.exe 2988 2580 WerFault.exe lr407023.exe 2664 2580 WerFault.exe lr407023.exe 4212 2580 WerFault.exe lr407023.exe 3944 4220 WerFault.exe oneetx.exe 3964 4220 WerFault.exe oneetx.exe 3356 4220 WerFault.exe oneetx.exe 2444 4220 WerFault.exe oneetx.exe 3608 4220 WerFault.exe oneetx.exe 3932 4220 WerFault.exe oneetx.exe 220 4220 WerFault.exe oneetx.exe 4496 4220 WerFault.exe oneetx.exe 5064 4220 WerFault.exe oneetx.exe 2044 4220 WerFault.exe oneetx.exe 3320 4220 WerFault.exe oneetx.exe 4928 1316 WerFault.exe oneetx.exe 4800 4220 WerFault.exe oneetx.exe 3840 4220 WerFault.exe oneetx.exe 2372 4220 WerFault.exe oneetx.exe 1208 4220 WerFault.exe oneetx.exe 3340 4980 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it496320.exejr367504.exekp312909.exepid process 3608 it496320.exe 3608 it496320.exe 3836 jr367504.exe 3836 jr367504.exe 4608 kp312909.exe 4608 kp312909.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it496320.exejr367504.exekp312909.exedescription pid process Token: SeDebugPrivilege 3608 it496320.exe Token: SeDebugPrivilege 3836 jr367504.exe Token: SeDebugPrivilege 4608 kp312909.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr407023.exepid process 2580 lr407023.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exezizO9994.exeziiX8121.exelr407023.exeoneetx.exedescription pid process target process PID 384 wrote to memory of 3824 384 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe zizO9994.exe PID 384 wrote to memory of 3824 384 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe zizO9994.exe PID 384 wrote to memory of 3824 384 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe zizO9994.exe PID 3824 wrote to memory of 4852 3824 zizO9994.exe ziiX8121.exe PID 3824 wrote to memory of 4852 3824 zizO9994.exe ziiX8121.exe PID 3824 wrote to memory of 4852 3824 zizO9994.exe ziiX8121.exe PID 4852 wrote to memory of 3608 4852 ziiX8121.exe it496320.exe PID 4852 wrote to memory of 3608 4852 ziiX8121.exe it496320.exe PID 4852 wrote to memory of 3836 4852 ziiX8121.exe jr367504.exe PID 4852 wrote to memory of 3836 4852 ziiX8121.exe jr367504.exe PID 4852 wrote to memory of 3836 4852 ziiX8121.exe jr367504.exe PID 3824 wrote to memory of 4608 3824 zizO9994.exe kp312909.exe PID 3824 wrote to memory of 4608 3824 zizO9994.exe kp312909.exe PID 3824 wrote to memory of 4608 3824 zizO9994.exe kp312909.exe PID 384 wrote to memory of 2580 384 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe lr407023.exe PID 384 wrote to memory of 2580 384 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe lr407023.exe PID 384 wrote to memory of 2580 384 82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe lr407023.exe PID 2580 wrote to memory of 4220 2580 lr407023.exe oneetx.exe PID 2580 wrote to memory of 4220 2580 lr407023.exe oneetx.exe PID 2580 wrote to memory of 4220 2580 lr407023.exe oneetx.exe PID 4220 wrote to memory of 4992 4220 oneetx.exe schtasks.exe PID 4220 wrote to memory of 4992 4220 oneetx.exe schtasks.exe PID 4220 wrote to memory of 4992 4220 oneetx.exe schtasks.exe PID 4220 wrote to memory of 4852 4220 oneetx.exe rundll32.exe PID 4220 wrote to memory of 4852 4220 oneetx.exe rundll32.exe PID 4220 wrote to memory of 4852 4220 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe"C:\Users\Admin\AppData\Local\Temp\82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO9994.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO9994.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziiX8121.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziiX8121.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it496320.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it496320.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr367504.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr367504.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 13285⤵
- Program crash
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp312909.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp312909.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr407023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr407023.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 6963⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 7563⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 8563⤵
- Program crash
PID:560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 9603⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 9803⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 10043⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 12123⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 12323⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 13163⤵
- Program crash
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 6924⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 8164⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 9164⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 10604⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 10804⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 10804⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 10604⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 9924⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 7844⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 7524⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 12884⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 11164⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 15564⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 15524⤵
- Program crash
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 16204⤵
- Program crash
PID:1208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 8643⤵
- Program crash
PID:4212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3836 -ip 38361⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2580 -ip 25801⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2580 -ip 25801⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2580 -ip 25801⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2580 -ip 25801⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2580 -ip 25801⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2580 -ip 25801⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2580 -ip 25801⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2580 -ip 25801⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2580 -ip 25801⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2580 -ip 25801⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4220 -ip 42201⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4220 -ip 42201⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4220 -ip 42201⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4220 -ip 42201⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4220 -ip 42201⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4220 -ip 42201⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4220 -ip 42201⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4220 -ip 42201⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4220 -ip 42201⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4220 -ip 42201⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4220 -ip 42201⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 3202⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1316 -ip 13161⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4220 -ip 42201⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4220 -ip 42201⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4220 -ip 42201⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4220 -ip 42201⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 3202⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4980 -ip 49801⤵PID:4196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
536KB
MD5d758861bafdb18d72597cce03abf9730
SHA16aa2b8ca0458d29e1e32a8771e5b769f9b280e71
SHA2567e641c68111ff70a1a39d9749fd6aaa2c6a8c6bb443648a18964aad8f4d19d3f
SHA512a29bb6bb9e40571a88ff21806e91d462a929837698198655befbdac7ca4f9d3e46ce79245c59a0a8b1288839fe15ffbeb3f494b5916fdd9d69a9c16213b5fbeb
-
Filesize
536KB
MD5d758861bafdb18d72597cce03abf9730
SHA16aa2b8ca0458d29e1e32a8771e5b769f9b280e71
SHA2567e641c68111ff70a1a39d9749fd6aaa2c6a8c6bb443648a18964aad8f4d19d3f
SHA512a29bb6bb9e40571a88ff21806e91d462a929837698198655befbdac7ca4f9d3e46ce79245c59a0a8b1288839fe15ffbeb3f494b5916fdd9d69a9c16213b5fbeb
-
Filesize
168KB
MD5a257e730f95f02d18321e9d0ef2633a9
SHA136b8c59cfcca893bbbe3e867ea8b1a0dcb7223f7
SHA2563765940c39dfa8eda5fbd0e3dff14e8b86845ede7083384729a6e79a4d84df40
SHA512dfbeef591b80bcb60f6eb16de7076a4e98eaf79c4b6cbb60a0117d17661ebb43497ce0e813994b66223ce748e20b525621879b4e83faaf15e098a96e63b941d6
-
Filesize
168KB
MD5a257e730f95f02d18321e9d0ef2633a9
SHA136b8c59cfcca893bbbe3e867ea8b1a0dcb7223f7
SHA2563765940c39dfa8eda5fbd0e3dff14e8b86845ede7083384729a6e79a4d84df40
SHA512dfbeef591b80bcb60f6eb16de7076a4e98eaf79c4b6cbb60a0117d17661ebb43497ce0e813994b66223ce748e20b525621879b4e83faaf15e098a96e63b941d6
-
Filesize
382KB
MD5e114fd84c55066b8a2c9ddb201b8ff4c
SHA14cb10cd23ec1e44ae3d903cd923ec17ec48ddd20
SHA2562f96d6adbb98f8cb4a3463a7897de7dc83f5bf42bcac17b2c8d3e4d968c98003
SHA5127f58bdaa805932bbdda8e8824d45e9f8a85626dd11e43753c84c96432ede83c546336b39fed8e7d41795198168a639da7a7aade4ed9e291eabe0c520b30b2cdb
-
Filesize
382KB
MD5e114fd84c55066b8a2c9ddb201b8ff4c
SHA14cb10cd23ec1e44ae3d903cd923ec17ec48ddd20
SHA2562f96d6adbb98f8cb4a3463a7897de7dc83f5bf42bcac17b2c8d3e4d968c98003
SHA5127f58bdaa805932bbdda8e8824d45e9f8a85626dd11e43753c84c96432ede83c546336b39fed8e7d41795198168a639da7a7aade4ed9e291eabe0c520b30b2cdb
-
Filesize
11KB
MD57720e60b1e2818e47418fa2551f90f07
SHA1caa232d9a1939650cfd54f7890a74d46c7291356
SHA25683ba14557a7847fb9fd3b925051db3c3b6a32edadd232c8a7fd0bcc6e35ed98d
SHA512cfd3f0be18ddde002d0b778b6231d24cc3dcf816fc47cd8a731e41419cdd833d66a11d9551076374dd61bf9dd5c0abf81606879f5ef4bceb7b87a93fcaa4e1bc
-
Filesize
11KB
MD57720e60b1e2818e47418fa2551f90f07
SHA1caa232d9a1939650cfd54f7890a74d46c7291356
SHA25683ba14557a7847fb9fd3b925051db3c3b6a32edadd232c8a7fd0bcc6e35ed98d
SHA512cfd3f0be18ddde002d0b778b6231d24cc3dcf816fc47cd8a731e41419cdd833d66a11d9551076374dd61bf9dd5c0abf81606879f5ef4bceb7b87a93fcaa4e1bc
-
Filesize
297KB
MD543377749626876239465d71afef3008c
SHA17ca7d30febc32b5baf38ef700ec25744489fc915
SHA256f7b25e4c5f48f70e652eb901721ab7ffb94c53f9a62350822f3e2858e719f6f1
SHA5122fdf57412917edb9dac2e1ff1c64e1dea004e536aac6e28b3616d9f3ea44daca27052a655ef246b15812edbf698444667d4695450b9c9b72c436f268c2f5d581
-
Filesize
297KB
MD543377749626876239465d71afef3008c
SHA17ca7d30febc32b5baf38ef700ec25744489fc915
SHA256f7b25e4c5f48f70e652eb901721ab7ffb94c53f9a62350822f3e2858e719f6f1
SHA5122fdf57412917edb9dac2e1ff1c64e1dea004e536aac6e28b3616d9f3ea44daca27052a655ef246b15812edbf698444667d4695450b9c9b72c436f268c2f5d581
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5