Analysis
-
max time kernel
81s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 20:22
Static task
static1
General
-
Target
745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe
-
Size
801KB
-
MD5
539a142597166cf261bd82e950edc06d
-
SHA1
0ce40a7a6c1d76484b4f2e927bbe81500c2e8181
-
SHA256
745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98
-
SHA512
c9fc6f371c99e1e0d535ce62e8a9f9ee2447790457a3e2fc3f4cbc8e23f4d0bf37e74406931f72eb5391d4a026339f328bec9522b2a61ad183b583c362754a45
-
SSDEEP
12288:WMrDy90+dsHLqN1AUgSQ1ZJ2ExZQJqexK7CtbsOliAbQepyextz7f:Ry/sHLqglx2xfts/repyextzj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it036120.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it036120.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it036120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it036120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it036120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it036120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it036120.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1208-165-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-166-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-168-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-170-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-172-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-174-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-176-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-178-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-180-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-182-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-184-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-186-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-188-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-190-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-192-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-194-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-196-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-198-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-200-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-202-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-204-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-206-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-208-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-210-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-212-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-214-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-216-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-218-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-220-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-222-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-224-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-226-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/1208-228-0x0000000005050000-0x000000000508F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr948719.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr948719.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
Processes:
zibR9088.exezise5810.exeit036120.exejr084569.exekp000234.exelr948719.exeoneetx.exeoneetx.exepid process 2844 zibR9088.exe 3920 zise5810.exe 4676 it036120.exe 1208 jr084569.exe 3100 kp000234.exe 2648 lr948719.exe 3684 oneetx.exe 1356 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it036120.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it036120.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exezibR9088.exezise5810.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zibR9088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibR9088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zise5810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zise5810.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 23 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4924 1208 WerFault.exe jr084569.exe 3688 2648 WerFault.exe lr948719.exe 3836 2648 WerFault.exe lr948719.exe 2992 2648 WerFault.exe lr948719.exe 4256 2648 WerFault.exe lr948719.exe 1320 2648 WerFault.exe lr948719.exe 1168 2648 WerFault.exe lr948719.exe 1576 2648 WerFault.exe lr948719.exe 3716 2648 WerFault.exe lr948719.exe 644 2648 WerFault.exe lr948719.exe 4756 2648 WerFault.exe lr948719.exe 4940 3684 WerFault.exe oneetx.exe 3900 3684 WerFault.exe oneetx.exe 5088 3684 WerFault.exe oneetx.exe 2000 3684 WerFault.exe oneetx.exe 492 3684 WerFault.exe oneetx.exe 2920 3684 WerFault.exe oneetx.exe 4500 3684 WerFault.exe oneetx.exe 3700 3684 WerFault.exe oneetx.exe 3528 3684 WerFault.exe oneetx.exe 2320 3684 WerFault.exe oneetx.exe 1584 3684 WerFault.exe oneetx.exe 3388 3684 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it036120.exejr084569.exekp000234.exepid process 4676 it036120.exe 4676 it036120.exe 1208 jr084569.exe 1208 jr084569.exe 3100 kp000234.exe 3100 kp000234.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it036120.exejr084569.exekp000234.exedescription pid process Token: SeDebugPrivilege 4676 it036120.exe Token: SeDebugPrivilege 1208 jr084569.exe Token: SeDebugPrivilege 3100 kp000234.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr948719.exepid process 2648 lr948719.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exezibR9088.exezise5810.exelr948719.exeoneetx.exedescription pid process target process PID 5060 wrote to memory of 2844 5060 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe zibR9088.exe PID 5060 wrote to memory of 2844 5060 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe zibR9088.exe PID 5060 wrote to memory of 2844 5060 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe zibR9088.exe PID 2844 wrote to memory of 3920 2844 zibR9088.exe zise5810.exe PID 2844 wrote to memory of 3920 2844 zibR9088.exe zise5810.exe PID 2844 wrote to memory of 3920 2844 zibR9088.exe zise5810.exe PID 3920 wrote to memory of 4676 3920 zise5810.exe it036120.exe PID 3920 wrote to memory of 4676 3920 zise5810.exe it036120.exe PID 3920 wrote to memory of 1208 3920 zise5810.exe jr084569.exe PID 3920 wrote to memory of 1208 3920 zise5810.exe jr084569.exe PID 3920 wrote to memory of 1208 3920 zise5810.exe jr084569.exe PID 2844 wrote to memory of 3100 2844 zibR9088.exe kp000234.exe PID 2844 wrote to memory of 3100 2844 zibR9088.exe kp000234.exe PID 2844 wrote to memory of 3100 2844 zibR9088.exe kp000234.exe PID 5060 wrote to memory of 2648 5060 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe lr948719.exe PID 5060 wrote to memory of 2648 5060 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe lr948719.exe PID 5060 wrote to memory of 2648 5060 745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe lr948719.exe PID 2648 wrote to memory of 3684 2648 lr948719.exe oneetx.exe PID 2648 wrote to memory of 3684 2648 lr948719.exe oneetx.exe PID 2648 wrote to memory of 3684 2648 lr948719.exe oneetx.exe PID 3684 wrote to memory of 3476 3684 oneetx.exe schtasks.exe PID 3684 wrote to memory of 3476 3684 oneetx.exe schtasks.exe PID 3684 wrote to memory of 3476 3684 oneetx.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe"C:\Users\Admin\AppData\Local\Temp\745542156bf763281e2fb6e10de29df9765705b22310330bd3374ee7c2644a98.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibR9088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibR9088.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zise5810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zise5810.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it036120.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it036120.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr084569.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr084569.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 16365⤵
- Program crash
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp000234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp000234.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr948719.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr948719.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 6963⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 7803⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 8003⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 9803⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 8003⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 9803⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 12163⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 12363⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 13203⤵
- Program crash
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 6284⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 6284⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9284⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10524⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10804⤵
- Program crash
PID:492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10724⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10924⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9204⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7804⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 13044⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 13124⤵
- Program crash
PID:1584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 15324⤵
- Program crash
PID:3388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 13603⤵
- Program crash
PID:4756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1208 -ip 12081⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2648 -ip 26481⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2648 -ip 26481⤵PID:3212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2648 -ip 26481⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2648 -ip 26481⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2648 -ip 26481⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2648 -ip 26481⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2648 -ip 26481⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2648 -ip 26481⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2648 -ip 26481⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2648 -ip 26481⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3684 -ip 36841⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3684 -ip 36841⤵PID:2364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3684 -ip 36841⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3684 -ip 36841⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3684 -ip 36841⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3684 -ip 36841⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3684 -ip 36841⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3684 -ip 36841⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3684 -ip 36841⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3684 -ip 36841⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3684 -ip 36841⤵PID:1000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3684 -ip 36841⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
536KB
MD526c95b0eb25c979cdcc51dd6c959692d
SHA1e2f92852946276c98cc7168cd85bacc37bc65a00
SHA256eec87953865d626b9d1df73443494a859f537f25caac3c42a52bdf80e9663616
SHA51264aa21a27854a9d5dc70e8c1efc0fdf462a956501bafdde38ef9a3393542d66c0fa1d408142043bf0c39e9b17749959d7e127188dd2ecab19f36770964c5a713
-
Filesize
536KB
MD526c95b0eb25c979cdcc51dd6c959692d
SHA1e2f92852946276c98cc7168cd85bacc37bc65a00
SHA256eec87953865d626b9d1df73443494a859f537f25caac3c42a52bdf80e9663616
SHA51264aa21a27854a9d5dc70e8c1efc0fdf462a956501bafdde38ef9a3393542d66c0fa1d408142043bf0c39e9b17749959d7e127188dd2ecab19f36770964c5a713
-
Filesize
169KB
MD5b3663287d28c94d080618173f5c825e4
SHA16ba5218b025b5955002b80dcf6273943bc0c3b79
SHA256955611b70bb9775bb37485de1005e69e1c21d7802a03f32068306f1c5b217f3f
SHA512f6e2f6c806e0c8ecb8c52c7cdd45df11fc63488671a6eb0d27cac05ba40464bf83feac446b88b4e2b89d8f16b4443242605b75bac0a99080a42e7b87cdbe08c3
-
Filesize
169KB
MD5b3663287d28c94d080618173f5c825e4
SHA16ba5218b025b5955002b80dcf6273943bc0c3b79
SHA256955611b70bb9775bb37485de1005e69e1c21d7802a03f32068306f1c5b217f3f
SHA512f6e2f6c806e0c8ecb8c52c7cdd45df11fc63488671a6eb0d27cac05ba40464bf83feac446b88b4e2b89d8f16b4443242605b75bac0a99080a42e7b87cdbe08c3
-
Filesize
382KB
MD5354e884f0e1f748641d02274b424c599
SHA1227b9a3cbbee1b34941dae68691c5b84f816a816
SHA256999353c7bf115075c491dd53f4813f0e3033194113a5e625af04d21190975ad3
SHA512a8253ae1b89d6eb2ef4b0946f1f132e2d826881842fcc2bdd760a7989e25f8b39897b8f5f8e501bd9bcb9a3ed98f5dbb2b786446d5255a7134cb471d352ba9ee
-
Filesize
382KB
MD5354e884f0e1f748641d02274b424c599
SHA1227b9a3cbbee1b34941dae68691c5b84f816a816
SHA256999353c7bf115075c491dd53f4813f0e3033194113a5e625af04d21190975ad3
SHA512a8253ae1b89d6eb2ef4b0946f1f132e2d826881842fcc2bdd760a7989e25f8b39897b8f5f8e501bd9bcb9a3ed98f5dbb2b786446d5255a7134cb471d352ba9ee
-
Filesize
11KB
MD58db517a16ebdd8bc54e557b002b0fc1c
SHA1f23385de2e2a05e6010dd0c583ef6fc6f47109db
SHA256aef1e9ca653d58553644f52169f982117fa33b89bb93d8a194f241dfa1c740cb
SHA51205425e9d559cf1092f149f6888b4a694e52bb9b37ed58ffb01e2c7894b6c8b7f21c05983342b6c2480c3c5babb00afc9ef8ea10c1cb3c021ab909a37f3fa6a9b
-
Filesize
11KB
MD58db517a16ebdd8bc54e557b002b0fc1c
SHA1f23385de2e2a05e6010dd0c583ef6fc6f47109db
SHA256aef1e9ca653d58553644f52169f982117fa33b89bb93d8a194f241dfa1c740cb
SHA51205425e9d559cf1092f149f6888b4a694e52bb9b37ed58ffb01e2c7894b6c8b7f21c05983342b6c2480c3c5babb00afc9ef8ea10c1cb3c021ab909a37f3fa6a9b
-
Filesize
297KB
MD5b25c66a7afe0ac30d3984f47c12a72d3
SHA1f2e4e11e10c0eb6babb78ad471ca79f8896a9b2f
SHA256f084ca1ed8eb66a158347cf5c21e642f32da26f986212706e0cccba6413ceafa
SHA512cec7f3ba37e0763bf77d9ef76f48e8cf8f6eb65eaeb185443eab57d202efd8b007bd0ed1e9b4e2caaf598221188bedf3ec16fce1e00837cc4b943fd8853df3da
-
Filesize
297KB
MD5b25c66a7afe0ac30d3984f47c12a72d3
SHA1f2e4e11e10c0eb6babb78ad471ca79f8896a9b2f
SHA256f084ca1ed8eb66a158347cf5c21e642f32da26f986212706e0cccba6413ceafa
SHA512cec7f3ba37e0763bf77d9ef76f48e8cf8f6eb65eaeb185443eab57d202efd8b007bd0ed1e9b4e2caaf598221188bedf3ec16fce1e00837cc4b943fd8853df3da