Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 20:25
Static task
static1
General
-
Target
7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe
-
Size
939KB
-
MD5
b38ab5aad5ca1e731a84a0130f8d038e
-
SHA1
192af73463cec39484cfe09fe03193e07e0e3f4b
-
SHA256
7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8
-
SHA512
9c7bcc168e58445d2eec10b3c48886a75eef33e22bba238b9ca8c947b8e2f55556005909c50c9f91103c4137b95b3abc865fd77b7f8dd573cbe84ce06523b241
-
SSDEEP
24576:CyAvDpkI5ISzX20W6xQk6Pvv4whoI0VPvf//I:pAvD62rygavv4NrvP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr498505.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr498505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr498505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr498505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr498505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr498505.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr498505.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2776-198-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-199-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-201-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-203-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-205-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-207-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-209-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-211-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-213-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-215-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-217-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-219-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-221-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-223-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-225-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-227-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-229-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-233-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/2776-232-0x0000000004AB0000-0x0000000004AC0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si430732.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si430732.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un955015.exeun156686.exepr498505.exequ813007.exerk347369.exesi430732.exeoneetx.exeoneetx.exeoneetx.exepid process 4576 un955015.exe 4832 un156686.exe 1984 pr498505.exe 2776 qu813007.exe 3416 rk347369.exe 264 si430732.exe 5056 oneetx.exe 4992 oneetx.exe 4120 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4224 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr498505.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr498505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr498505.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un156686.exe7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exeun955015.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un156686.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un955015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un955015.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un156686.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4060 1984 WerFault.exe pr498505.exe 3736 2776 WerFault.exe qu813007.exe 4224 264 WerFault.exe si430732.exe 4052 264 WerFault.exe si430732.exe 4372 264 WerFault.exe si430732.exe 1836 264 WerFault.exe si430732.exe 408 264 WerFault.exe si430732.exe 4452 264 WerFault.exe si430732.exe 1268 264 WerFault.exe si430732.exe 3344 264 WerFault.exe si430732.exe 1852 264 WerFault.exe si430732.exe 4264 264 WerFault.exe si430732.exe 4220 5056 WerFault.exe oneetx.exe 1648 5056 WerFault.exe oneetx.exe 1856 5056 WerFault.exe oneetx.exe 4124 5056 WerFault.exe oneetx.exe 4032 5056 WerFault.exe oneetx.exe 3812 5056 WerFault.exe oneetx.exe 4908 5056 WerFault.exe oneetx.exe 3532 5056 WerFault.exe oneetx.exe 1772 5056 WerFault.exe oneetx.exe 4548 5056 WerFault.exe oneetx.exe 4424 5056 WerFault.exe oneetx.exe 3704 4992 WerFault.exe oneetx.exe 5052 5056 WerFault.exe oneetx.exe 4428 5056 WerFault.exe oneetx.exe 1472 5056 WerFault.exe oneetx.exe 3980 4120 WerFault.exe oneetx.exe 896 5056 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr498505.exequ813007.exerk347369.exepid process 1984 pr498505.exe 1984 pr498505.exe 2776 qu813007.exe 2776 qu813007.exe 3416 rk347369.exe 3416 rk347369.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr498505.exequ813007.exerk347369.exedescription pid process Token: SeDebugPrivilege 1984 pr498505.exe Token: SeDebugPrivilege 2776 qu813007.exe Token: SeDebugPrivilege 3416 rk347369.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si430732.exepid process 264 si430732.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exeun955015.exeun156686.exesi430732.exeoneetx.exedescription pid process target process PID 1600 wrote to memory of 4576 1600 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe un955015.exe PID 1600 wrote to memory of 4576 1600 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe un955015.exe PID 1600 wrote to memory of 4576 1600 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe un955015.exe PID 4576 wrote to memory of 4832 4576 un955015.exe un156686.exe PID 4576 wrote to memory of 4832 4576 un955015.exe un156686.exe PID 4576 wrote to memory of 4832 4576 un955015.exe un156686.exe PID 4832 wrote to memory of 1984 4832 un156686.exe pr498505.exe PID 4832 wrote to memory of 1984 4832 un156686.exe pr498505.exe PID 4832 wrote to memory of 1984 4832 un156686.exe pr498505.exe PID 4832 wrote to memory of 2776 4832 un156686.exe qu813007.exe PID 4832 wrote to memory of 2776 4832 un156686.exe qu813007.exe PID 4832 wrote to memory of 2776 4832 un156686.exe qu813007.exe PID 4576 wrote to memory of 3416 4576 un955015.exe rk347369.exe PID 4576 wrote to memory of 3416 4576 un955015.exe rk347369.exe PID 4576 wrote to memory of 3416 4576 un955015.exe rk347369.exe PID 1600 wrote to memory of 264 1600 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe si430732.exe PID 1600 wrote to memory of 264 1600 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe si430732.exe PID 1600 wrote to memory of 264 1600 7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe si430732.exe PID 264 wrote to memory of 5056 264 si430732.exe oneetx.exe PID 264 wrote to memory of 5056 264 si430732.exe oneetx.exe PID 264 wrote to memory of 5056 264 si430732.exe oneetx.exe PID 5056 wrote to memory of 2008 5056 oneetx.exe schtasks.exe PID 5056 wrote to memory of 2008 5056 oneetx.exe schtasks.exe PID 5056 wrote to memory of 2008 5056 oneetx.exe schtasks.exe PID 5056 wrote to memory of 4224 5056 oneetx.exe rundll32.exe PID 5056 wrote to memory of 4224 5056 oneetx.exe rundll32.exe PID 5056 wrote to memory of 4224 5056 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe"C:\Users\Admin\AppData\Local\Temp\7050898ff74b519340b940d11db1c5e99e35a0c2e07ac67a5b4072cb7d07adf8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955015.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un156686.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un156686.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr498505.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr498505.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 10845⤵
- Program crash
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu813007.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu813007.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 13485⤵
- Program crash
PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk347369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk347369.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si430732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si430732.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 6963⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 7803⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 8563⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 8643⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 9763⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 9883⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 12163⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 12083⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 13123⤵
- Program crash
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 6924⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 7924⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 9124⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10524⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10724⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10724⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 11284⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 9124⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 7764⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 13044⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 7564⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 11524⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 11524⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 15844⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 13684⤵
- Program crash
PID:896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 14283⤵
- Program crash
PID:4264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1984 -ip 19841⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2776 -ip 27761⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 264 -ip 2641⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 264 -ip 2641⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 264 -ip 2641⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 264 -ip 2641⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 264 -ip 2641⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 264 -ip 2641⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 264 -ip 2641⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 264 -ip 2641⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 264 -ip 2641⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 264 -ip 2641⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5056 -ip 50561⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5056 -ip 50561⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5056 -ip 50561⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5056 -ip 50561⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5056 -ip 50561⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5056 -ip 50561⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5056 -ip 50561⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5056 -ip 50561⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5056 -ip 50561⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5056 -ip 50561⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5056 -ip 50561⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3162⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4992 -ip 49921⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5056 -ip 50561⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5056 -ip 50561⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5056 -ip 50561⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 3202⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4120 -ip 41201⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5056 -ip 50561⤵PID:408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
674KB
MD5b9cd962ed12b4c33816a9eac6b00db06
SHA1ac051aa9abf05747309f01c7c3f37e6bd7170f99
SHA256869a2b3bd80c9fa71e7445766999108b13d1d7eeb9607ec51d6409071be613f1
SHA5127fb4785030b925f7307152174e5842060876cb4304721f3524979f0160c54cb9037a69f96fe53c93576e835c562dc8e7a82cdc4f5e4c85673be5b6443539ffa3
-
Filesize
674KB
MD5b9cd962ed12b4c33816a9eac6b00db06
SHA1ac051aa9abf05747309f01c7c3f37e6bd7170f99
SHA256869a2b3bd80c9fa71e7445766999108b13d1d7eeb9607ec51d6409071be613f1
SHA5127fb4785030b925f7307152174e5842060876cb4304721f3524979f0160c54cb9037a69f96fe53c93576e835c562dc8e7a82cdc4f5e4c85673be5b6443539ffa3
-
Filesize
169KB
MD540e4eaa18721221b97f259280f9da1e7
SHA1102c1175cc75a2dcfe8b4d51d54e82a805785f21
SHA2561db25eeaf1844e40e51fe354466ee54f98200bc317fac2aded30238f2d625809
SHA5121b76c28df85c15dd207da401fcb657dc3e6fe649af49cbb0ec9d0b36ff87ede25d9103e749a44276a8384329d8608a1f619b2095a3f0a438431f195f6f9017d9
-
Filesize
169KB
MD540e4eaa18721221b97f259280f9da1e7
SHA1102c1175cc75a2dcfe8b4d51d54e82a805785f21
SHA2561db25eeaf1844e40e51fe354466ee54f98200bc317fac2aded30238f2d625809
SHA5121b76c28df85c15dd207da401fcb657dc3e6fe649af49cbb0ec9d0b36ff87ede25d9103e749a44276a8384329d8608a1f619b2095a3f0a438431f195f6f9017d9
-
Filesize
520KB
MD5fcd2c480f6bced7dbcfba8e686738e26
SHA1caec5d5e7ccb0fe4c75875f9c7a9ecf96652957d
SHA256ce82bb4a83678c5bbcf9c129c1f1b87facde4903788d635721557f8adc7607ef
SHA512e44cf2ba331b2cc29fc148a03b820269e8028c273d3768c90ae173b86d2cba638f6c51eba21b1171c8ebaf5fd8e16614de9b6d5f97d32e134122b3c8f6cbccea
-
Filesize
520KB
MD5fcd2c480f6bced7dbcfba8e686738e26
SHA1caec5d5e7ccb0fe4c75875f9c7a9ecf96652957d
SHA256ce82bb4a83678c5bbcf9c129c1f1b87facde4903788d635721557f8adc7607ef
SHA512e44cf2ba331b2cc29fc148a03b820269e8028c273d3768c90ae173b86d2cba638f6c51eba21b1171c8ebaf5fd8e16614de9b6d5f97d32e134122b3c8f6cbccea
-
Filesize
239KB
MD51fccb46e14feaac340679d3fe51a9a6a
SHA11656bd128f33138eaa036c26dfe79b87e1ffcbe6
SHA2568295ca04fd544d5e6be4ef09c364a84ea97bd598cd7bdc70c8265f15a571d973
SHA5125b733f488b9ff494cfc719f3467ded032d5bb9b1a5207ea7b75795db011f256249e2c7156812df31344943d6852325718b10c8acfb458a5720c2193183cf4fba
-
Filesize
239KB
MD51fccb46e14feaac340679d3fe51a9a6a
SHA11656bd128f33138eaa036c26dfe79b87e1ffcbe6
SHA2568295ca04fd544d5e6be4ef09c364a84ea97bd598cd7bdc70c8265f15a571d973
SHA5125b733f488b9ff494cfc719f3467ded032d5bb9b1a5207ea7b75795db011f256249e2c7156812df31344943d6852325718b10c8acfb458a5720c2193183cf4fba
-
Filesize
297KB
MD592a9cd2faaadd4603fa102f637ffa0f1
SHA178c70ae2ea3140f73f0123d70dca72e6f089b149
SHA256b76f47efbf7175472f914157c786b54d8802e7900cce8b2a56801a59bc66d58d
SHA512ca6a570f1c0bef1d24c687ec1ba1a3a5a9ec663a8696565784dc623791dd2d1c8d0eafc5ee29c32d2d2440b17874e97c284690c84346f130b135c0c40a012c99
-
Filesize
297KB
MD592a9cd2faaadd4603fa102f637ffa0f1
SHA178c70ae2ea3140f73f0123d70dca72e6f089b149
SHA256b76f47efbf7175472f914157c786b54d8802e7900cce8b2a56801a59bc66d58d
SHA512ca6a570f1c0bef1d24c687ec1ba1a3a5a9ec663a8696565784dc623791dd2d1c8d0eafc5ee29c32d2d2440b17874e97c284690c84346f130b135c0c40a012c99
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5