Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 18:55
Static task
static1
General
-
Target
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe
-
Size
936KB
-
MD5
6cd802ee715041d2eb0449c7556dae12
-
SHA1
90d0e32a252a2839f47cf9d404b978de078dfc43
-
SHA256
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b
-
SHA512
0461c7e564a5dd948e43b99695c37506ec77e40bdc06e26c25c0e6d96612961577d7101ec1a66e2a836d5e9bf452eb1e007232154f9663fc244b5a2d1c260afc
-
SSDEEP
12288:RMrBy90sfxCCv9hHUgMJAZhAWucX3RaEzOidQIuu8u6xbsJp2vygxa5Fgv2HfK8R:wyxfv9hUAXucnRaEzOilgD1+DDNPz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr677426.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr677426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr677426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr677426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr677426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr677426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr677426.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3640-200-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-201-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-203-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-205-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-207-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-209-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-211-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-213-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-215-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-217-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-219-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-221-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-223-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-225-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-227-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-229-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-231-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3640-233-0x0000000002530000-0x000000000256F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si097934.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation si097934.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
Processes:
un585051.exeun452815.exepr677426.exequ014660.exerk583239.exesi097934.exeoneetx.exeoneetx.exepid process 3232 un585051.exe 100 un452815.exe 4916 pr677426.exe 3640 qu014660.exe 1788 rk583239.exe 4912 si097934.exe 2844 oneetx.exe 1836 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2204 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr677426.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr677426.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr677426.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un585051.exeun452815.exe86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un585051.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un452815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un452815.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un585051.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2488 4916 WerFault.exe pr677426.exe 1344 3640 WerFault.exe qu014660.exe 5016 4912 WerFault.exe si097934.exe 2360 4912 WerFault.exe si097934.exe 3368 4912 WerFault.exe si097934.exe 3332 4912 WerFault.exe si097934.exe 4452 4912 WerFault.exe si097934.exe 4144 4912 WerFault.exe si097934.exe 2276 4912 WerFault.exe si097934.exe 1824 4912 WerFault.exe si097934.exe 4816 4912 WerFault.exe si097934.exe 464 4912 WerFault.exe si097934.exe 4420 2844 WerFault.exe oneetx.exe 320 2844 WerFault.exe oneetx.exe 4924 2844 WerFault.exe oneetx.exe 3656 2844 WerFault.exe oneetx.exe 756 2844 WerFault.exe oneetx.exe 2216 2844 WerFault.exe oneetx.exe 2116 2844 WerFault.exe oneetx.exe 4900 2844 WerFault.exe oneetx.exe 3672 2844 WerFault.exe oneetx.exe 2964 2844 WerFault.exe oneetx.exe 1052 2844 WerFault.exe oneetx.exe 4916 2844 WerFault.exe oneetx.exe 2984 2844 WerFault.exe oneetx.exe 3368 2844 WerFault.exe oneetx.exe 3744 1836 WerFault.exe oneetx.exe 4148 1836 WerFault.exe oneetx.exe 4720 1836 WerFault.exe oneetx.exe 2780 1836 WerFault.exe oneetx.exe 3624 2844 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr677426.exequ014660.exerk583239.exepid process 4916 pr677426.exe 4916 pr677426.exe 3640 qu014660.exe 3640 qu014660.exe 1788 rk583239.exe 1788 rk583239.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr677426.exequ014660.exerk583239.exedescription pid process Token: SeDebugPrivilege 4916 pr677426.exe Token: SeDebugPrivilege 3640 qu014660.exe Token: SeDebugPrivilege 1788 rk583239.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si097934.exepid process 4912 si097934.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exeun585051.exeun452815.exesi097934.exeoneetx.exedescription pid process target process PID 1916 wrote to memory of 3232 1916 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe un585051.exe PID 1916 wrote to memory of 3232 1916 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe un585051.exe PID 1916 wrote to memory of 3232 1916 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe un585051.exe PID 3232 wrote to memory of 100 3232 un585051.exe un452815.exe PID 3232 wrote to memory of 100 3232 un585051.exe un452815.exe PID 3232 wrote to memory of 100 3232 un585051.exe un452815.exe PID 100 wrote to memory of 4916 100 un452815.exe pr677426.exe PID 100 wrote to memory of 4916 100 un452815.exe pr677426.exe PID 100 wrote to memory of 4916 100 un452815.exe pr677426.exe PID 100 wrote to memory of 3640 100 un452815.exe qu014660.exe PID 100 wrote to memory of 3640 100 un452815.exe qu014660.exe PID 100 wrote to memory of 3640 100 un452815.exe qu014660.exe PID 3232 wrote to memory of 1788 3232 un585051.exe rk583239.exe PID 3232 wrote to memory of 1788 3232 un585051.exe rk583239.exe PID 3232 wrote to memory of 1788 3232 un585051.exe rk583239.exe PID 1916 wrote to memory of 4912 1916 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe si097934.exe PID 1916 wrote to memory of 4912 1916 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe si097934.exe PID 1916 wrote to memory of 4912 1916 86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe si097934.exe PID 4912 wrote to memory of 2844 4912 si097934.exe oneetx.exe PID 4912 wrote to memory of 2844 4912 si097934.exe oneetx.exe PID 4912 wrote to memory of 2844 4912 si097934.exe oneetx.exe PID 2844 wrote to memory of 3012 2844 oneetx.exe schtasks.exe PID 2844 wrote to memory of 3012 2844 oneetx.exe schtasks.exe PID 2844 wrote to memory of 3012 2844 oneetx.exe schtasks.exe PID 2844 wrote to memory of 2204 2844 oneetx.exe rundll32.exe PID 2844 wrote to memory of 2204 2844 oneetx.exe rundll32.exe PID 2844 wrote to memory of 2204 2844 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe"C:\Users\Admin\AppData\Local\Temp\86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un585051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un585051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un452815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un452815.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr677426.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr677426.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 10845⤵
- Program crash
PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu014660.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu014660.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 17645⤵
- Program crash
PID:1344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk583239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk583239.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si097934.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si097934.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 6963⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7803⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8123⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8603⤵
- Program crash
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 9763⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 9763⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 12083⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 12403⤵
- Program crash
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 13163⤵
- Program crash
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 6924⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 7284⤵
- Program crash
PID:320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 8764⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 10604⤵
- Program crash
PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 10924⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 10924⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 10724⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 9924⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 12964⤵
- Program crash
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 7164⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 6964⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 10804⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 16124⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 15604⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 16284⤵
- Program crash
PID:3624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 15843⤵
- Program crash
PID:464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4916 -ip 49161⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3640 -ip 36401⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4912 -ip 49121⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4912 -ip 49121⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4912 -ip 49121⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4912 -ip 49121⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4912 -ip 49121⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4912 -ip 49121⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4912 -ip 49121⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4912 -ip 49121⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4912 -ip 49121⤵PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4912 -ip 49121⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2844 -ip 28441⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2844 -ip 28441⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2844 -ip 28441⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2844 -ip 28441⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2844 -ip 28441⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2844 -ip 28441⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2844 -ip 28441⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2844 -ip 28441⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2844 -ip 28441⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2844 -ip 28441⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2844 -ip 28441⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2844 -ip 28441⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2844 -ip 28441⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2844 -ip 28441⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 3922⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 5482⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 6082⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 6522⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 1836 -ip 18361⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1836 -ip 18361⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1836 -ip 18361⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 1836 -ip 18361⤵PID:3076
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2844 -ip 28441⤵PID:4656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD57d4cd4a44c1a62d13f282a450b4340aa
SHA102e032f246424d04d853fac9064b6958f94730f5
SHA25696ef83cedeb8ba8eea7d700ac91410298f28cb3aa022a48d189f677981c59448
SHA512f70e40e9a90912013f6ef36afe343c536d4918f718fa33decd12e03ed1abfcaf149c26b0b0b84964bd01939505ab1cb87d8121c340b2afd583a0d56855eba288
-
Filesize
230KB
MD57d4cd4a44c1a62d13f282a450b4340aa
SHA102e032f246424d04d853fac9064b6958f94730f5
SHA25696ef83cedeb8ba8eea7d700ac91410298f28cb3aa022a48d189f677981c59448
SHA512f70e40e9a90912013f6ef36afe343c536d4918f718fa33decd12e03ed1abfcaf149c26b0b0b84964bd01939505ab1cb87d8121c340b2afd583a0d56855eba288
-
Filesize
230KB
MD57d4cd4a44c1a62d13f282a450b4340aa
SHA102e032f246424d04d853fac9064b6958f94730f5
SHA25696ef83cedeb8ba8eea7d700ac91410298f28cb3aa022a48d189f677981c59448
SHA512f70e40e9a90912013f6ef36afe343c536d4918f718fa33decd12e03ed1abfcaf149c26b0b0b84964bd01939505ab1cb87d8121c340b2afd583a0d56855eba288
-
Filesize
230KB
MD57d4cd4a44c1a62d13f282a450b4340aa
SHA102e032f246424d04d853fac9064b6958f94730f5
SHA25696ef83cedeb8ba8eea7d700ac91410298f28cb3aa022a48d189f677981c59448
SHA512f70e40e9a90912013f6ef36afe343c536d4918f718fa33decd12e03ed1abfcaf149c26b0b0b84964bd01939505ab1cb87d8121c340b2afd583a0d56855eba288
-
Filesize
230KB
MD57d4cd4a44c1a62d13f282a450b4340aa
SHA102e032f246424d04d853fac9064b6958f94730f5
SHA25696ef83cedeb8ba8eea7d700ac91410298f28cb3aa022a48d189f677981c59448
SHA512f70e40e9a90912013f6ef36afe343c536d4918f718fa33decd12e03ed1abfcaf149c26b0b0b84964bd01939505ab1cb87d8121c340b2afd583a0d56855eba288
-
Filesize
230KB
MD57d4cd4a44c1a62d13f282a450b4340aa
SHA102e032f246424d04d853fac9064b6958f94730f5
SHA25696ef83cedeb8ba8eea7d700ac91410298f28cb3aa022a48d189f677981c59448
SHA512f70e40e9a90912013f6ef36afe343c536d4918f718fa33decd12e03ed1abfcaf149c26b0b0b84964bd01939505ab1cb87d8121c340b2afd583a0d56855eba288
-
Filesize
671KB
MD5185ddb861689d9decf62c5053de90c87
SHA12a4ceeb05d3616393f20369efcf2cecfaf87ac74
SHA256090d155373eff95f6134f1ac79e1d2fb5d20e713e34ebee71326937538e2ad83
SHA512c9d181f62136dfb13f9b7887024606cec190a6e16dcaa5c296920421948b3bf9286a690d33a65584f68c801707f122ad763401aae207187ac0c8180f230ba134
-
Filesize
671KB
MD5185ddb861689d9decf62c5053de90c87
SHA12a4ceeb05d3616393f20369efcf2cecfaf87ac74
SHA256090d155373eff95f6134f1ac79e1d2fb5d20e713e34ebee71326937538e2ad83
SHA512c9d181f62136dfb13f9b7887024606cec190a6e16dcaa5c296920421948b3bf9286a690d33a65584f68c801707f122ad763401aae207187ac0c8180f230ba134
-
Filesize
168KB
MD5eaad2ca0080468ac683e0679890a082f
SHA13f972a8f00f8603552c8f9ac0238dd641de35b8d
SHA25618d74c7bbf4dda5eed5b0017f9e1f412ee165acc9c9434c7a17e4d4dc0d864af
SHA51245ef43ddd1861525ccb73bdbdb206a0f7228f45ad2ddfe553c57452c304e859b637413c0ac07db60cf372bc9c5a40002698e256ad5a3c1f8c50d93a089003883
-
Filesize
168KB
MD5eaad2ca0080468ac683e0679890a082f
SHA13f972a8f00f8603552c8f9ac0238dd641de35b8d
SHA25618d74c7bbf4dda5eed5b0017f9e1f412ee165acc9c9434c7a17e4d4dc0d864af
SHA51245ef43ddd1861525ccb73bdbdb206a0f7228f45ad2ddfe553c57452c304e859b637413c0ac07db60cf372bc9c5a40002698e256ad5a3c1f8c50d93a089003883
-
Filesize
518KB
MD56712474001a6a29d9e68c18818869e26
SHA168657baf6f257a9e1489c7742309a6fc3eda6ab6
SHA256bb6ac073762d7390bd0844392255e3b8d3b5a0c259c9b0bbc55bca707de753bb
SHA512bea43f05a8b5d0a3c1da77e689fa41d4c59ed5803c81cadcb97c341e5d147ddbb0c432aa711909516be350b8a277c593b8fde8359b7dca31fadf7d575ab316de
-
Filesize
518KB
MD56712474001a6a29d9e68c18818869e26
SHA168657baf6f257a9e1489c7742309a6fc3eda6ab6
SHA256bb6ac073762d7390bd0844392255e3b8d3b5a0c259c9b0bbc55bca707de753bb
SHA512bea43f05a8b5d0a3c1da77e689fa41d4c59ed5803c81cadcb97c341e5d147ddbb0c432aa711909516be350b8a277c593b8fde8359b7dca31fadf7d575ab316de
-
Filesize
239KB
MD5c95c803947ba082b4b119a0183dfd504
SHA17b382c9deb94f5c084b245f5e8d18e3bb094f74c
SHA256a3d7c8d0365d9656d53f7d4fe1e71dd2471e59237b3500d6cef07d9d4eb04aba
SHA512906bc5c6c53d841bc6538fdcb2ec98730a20422f576a3a0d78fad441de90bc39ab3636f61312cf9deb7204f1d54d2ee33e372fa148655b4b0372d0588a70ac12
-
Filesize
239KB
MD5c95c803947ba082b4b119a0183dfd504
SHA17b382c9deb94f5c084b245f5e8d18e3bb094f74c
SHA256a3d7c8d0365d9656d53f7d4fe1e71dd2471e59237b3500d6cef07d9d4eb04aba
SHA512906bc5c6c53d841bc6538fdcb2ec98730a20422f576a3a0d78fad441de90bc39ab3636f61312cf9deb7204f1d54d2ee33e372fa148655b4b0372d0588a70ac12
-
Filesize
298KB
MD503cbb12996eefa2e64e56359662ecf0c
SHA1afdd5e73c8b0deef39b974c475ef2cf2efec836b
SHA2560554b18409e90e52ef8d11c50540fbbe6640a4f0d04511b3a79700ce673fc5e4
SHA512f68b66d456b40508396334af387ce45dc408ee0b86da450c74a4e6c771387b4b8d4a33ab17243d0d9b694317bab80a62388640623c8e63f8128664bdd5d5d8c4
-
Filesize
298KB
MD503cbb12996eefa2e64e56359662ecf0c
SHA1afdd5e73c8b0deef39b974c475ef2cf2efec836b
SHA2560554b18409e90e52ef8d11c50540fbbe6640a4f0d04511b3a79700ce673fc5e4
SHA512f68b66d456b40508396334af387ce45dc408ee0b86da450c74a4e6c771387b4b8d4a33ab17243d0d9b694317bab80a62388640623c8e63f8128664bdd5d5d8c4
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5