Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:38
Static task
static1
General
-
Target
a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe
-
Size
939KB
-
MD5
67c3d7ff6a78210c29f8044d03f1cfb1
-
SHA1
6d2ad325b053106e6077c50d6be3640d12b21211
-
SHA256
a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d
-
SHA512
b9e350f93a5b2d37c265d725427378ed6259c88dfc0a49f1d4a58a9bc33f0793af7ad6d891327a4a59d34ec2da0ecff2c9ab030a6d56cfd10b587f5141e82352
-
SSDEEP
24576:tyWBy78sN6HajFL2SxbXL4IzVf5wSvuvG3g:IWBy78/aj1nxbsI2rO3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr224863.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr224863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr224863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr224863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr224863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr224863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr224863.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/3820-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-213-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-215-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-219-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-221-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-223-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-225-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-227-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-229-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-231-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3820-1116-0x0000000004B90000-0x0000000004BA0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si906295.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si906295.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
Processes:
un293274.exeun195336.exepr224863.exequ810228.exerk574135.exesi906295.exeoneetx.exeoneetx.exepid process 2452 un293274.exe 2384 un195336.exe 3532 pr224863.exe 3820 qu810228.exe 4336 rk574135.exe 2644 si906295.exe 3588 oneetx.exe 4220 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3256 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr224863.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr224863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr224863.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exeun293274.exeun195336.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un293274.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un293274.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un195336.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un195336.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3980 3532 WerFault.exe pr224863.exe 3808 3820 WerFault.exe qu810228.exe 4100 2644 WerFault.exe si906295.exe 1980 2644 WerFault.exe si906295.exe 244 2644 WerFault.exe si906295.exe 4464 2644 WerFault.exe si906295.exe 4976 2644 WerFault.exe si906295.exe 1388 2644 WerFault.exe si906295.exe 4512 2644 WerFault.exe si906295.exe 4820 2644 WerFault.exe si906295.exe 60 2644 WerFault.exe si906295.exe 4344 2644 WerFault.exe si906295.exe 3488 3588 WerFault.exe oneetx.exe 1908 3588 WerFault.exe oneetx.exe 3416 3588 WerFault.exe oneetx.exe 672 3588 WerFault.exe oneetx.exe 1496 3588 WerFault.exe oneetx.exe 3280 3588 WerFault.exe oneetx.exe 4032 3588 WerFault.exe oneetx.exe 1124 3588 WerFault.exe oneetx.exe 4136 3588 WerFault.exe oneetx.exe 1928 3588 WerFault.exe oneetx.exe 1172 3588 WerFault.exe oneetx.exe 3348 3588 WerFault.exe oneetx.exe 1260 3588 WerFault.exe oneetx.exe 2936 3588 WerFault.exe oneetx.exe 4960 4220 WerFault.exe oneetx.exe 3208 3588 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr224863.exequ810228.exerk574135.exepid process 3532 pr224863.exe 3532 pr224863.exe 3820 qu810228.exe 3820 qu810228.exe 4336 rk574135.exe 4336 rk574135.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr224863.exequ810228.exerk574135.exedescription pid process Token: SeDebugPrivilege 3532 pr224863.exe Token: SeDebugPrivilege 3820 qu810228.exe Token: SeDebugPrivilege 4336 rk574135.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si906295.exepid process 2644 si906295.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exeun293274.exeun195336.exesi906295.exeoneetx.exedescription pid process target process PID 1760 wrote to memory of 2452 1760 a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe un293274.exe PID 1760 wrote to memory of 2452 1760 a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe un293274.exe PID 1760 wrote to memory of 2452 1760 a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe un293274.exe PID 2452 wrote to memory of 2384 2452 un293274.exe un195336.exe PID 2452 wrote to memory of 2384 2452 un293274.exe un195336.exe PID 2452 wrote to memory of 2384 2452 un293274.exe un195336.exe PID 2384 wrote to memory of 3532 2384 un195336.exe pr224863.exe PID 2384 wrote to memory of 3532 2384 un195336.exe pr224863.exe PID 2384 wrote to memory of 3532 2384 un195336.exe pr224863.exe PID 2384 wrote to memory of 3820 2384 un195336.exe qu810228.exe PID 2384 wrote to memory of 3820 2384 un195336.exe qu810228.exe PID 2384 wrote to memory of 3820 2384 un195336.exe qu810228.exe PID 2452 wrote to memory of 4336 2452 un293274.exe rk574135.exe PID 2452 wrote to memory of 4336 2452 un293274.exe rk574135.exe PID 2452 wrote to memory of 4336 2452 un293274.exe rk574135.exe PID 1760 wrote to memory of 2644 1760 a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe si906295.exe PID 1760 wrote to memory of 2644 1760 a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe si906295.exe PID 1760 wrote to memory of 2644 1760 a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe si906295.exe PID 2644 wrote to memory of 3588 2644 si906295.exe oneetx.exe PID 2644 wrote to memory of 3588 2644 si906295.exe oneetx.exe PID 2644 wrote to memory of 3588 2644 si906295.exe oneetx.exe PID 3588 wrote to memory of 1012 3588 oneetx.exe schtasks.exe PID 3588 wrote to memory of 1012 3588 oneetx.exe schtasks.exe PID 3588 wrote to memory of 1012 3588 oneetx.exe schtasks.exe PID 3588 wrote to memory of 3256 3588 oneetx.exe rundll32.exe PID 3588 wrote to memory of 3256 3588 oneetx.exe rundll32.exe PID 3588 wrote to memory of 3256 3588 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe"C:\Users\Admin\AppData\Local\Temp\a90a2c2190695d2f65b31341442f2531a47733798797767401369c0e736a020d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un293274.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un293274.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un195336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un195336.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr224863.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr224863.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10845⤵
- Program crash
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu810228.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu810228.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 13565⤵
- Program crash
PID:3808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk574135.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk574135.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906295.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 6963⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 7763⤵
- Program crash
PID:1980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 8563⤵
- Program crash
PID:244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 9723⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 9963⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 9963⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 12163⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 12323⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 13123⤵
- Program crash
PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 6924⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 9404⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 10724⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11044⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11244⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11244⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11164⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 10124⤵
- Program crash
PID:1124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 6884⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 7364⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 7364⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 9404⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 16044⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11124⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 16204⤵
- Program crash
PID:3208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 9803⤵
- Program crash
PID:4344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3532 -ip 35321⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3820 -ip 38201⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2644 -ip 26441⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2644 -ip 26441⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2644 -ip 26441⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2644 -ip 26441⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2644 -ip 26441⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2644 -ip 26441⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2644 -ip 26441⤵PID:2624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2644 -ip 26441⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2644 -ip 26441⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2644 -ip 26441⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3588 -ip 35881⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3588 -ip 35881⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3588 -ip 35881⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3588 -ip 35881⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3588 -ip 35881⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3588 -ip 35881⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3588 -ip 35881⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3588 -ip 35881⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3588 -ip 35881⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3588 -ip 35881⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3588 -ip 35881⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3588 -ip 35881⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3588 -ip 35881⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3588 -ip 35881⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 3202⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4220 -ip 42201⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3588 -ip 35881⤵PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
674KB
MD5ed87d81a2b6dcdaaa7cd76118227ae2b
SHA173e637b26281737a1ce1da1993acfdda22ff5f2d
SHA256f74e23bbea4a3a05a1452b68f510c8b5f2e62a0c52d2f7badb6a63a54fe17d2f
SHA51201aeb4a5e7cb2bc59ed92cabe2ea8dcaa25aef95ed21fa49b6c235b7fd6b2ea87b776cb77cf5908bdfab2e6c448457d7490d76fe5419c9415c1bc907a2869e5e
-
Filesize
674KB
MD5ed87d81a2b6dcdaaa7cd76118227ae2b
SHA173e637b26281737a1ce1da1993acfdda22ff5f2d
SHA256f74e23bbea4a3a05a1452b68f510c8b5f2e62a0c52d2f7badb6a63a54fe17d2f
SHA51201aeb4a5e7cb2bc59ed92cabe2ea8dcaa25aef95ed21fa49b6c235b7fd6b2ea87b776cb77cf5908bdfab2e6c448457d7490d76fe5419c9415c1bc907a2869e5e
-
Filesize
168KB
MD529a8c1ebea156f44aa483a231752adf8
SHA15ca625e98655d3453e7d55cc43569dc27ca09114
SHA25647897868e442210f468e0f058e5e377da26aa2e54b52d7a49c8c949986aad4b1
SHA5126c8872f867d427cef4514640fef7224a8492e547c33dada6c492cac22295afb4e2f2f26eeff2f5bfe83c4cd6e017cc7020325f33e042ba3dbc82339e61c276d9
-
Filesize
168KB
MD529a8c1ebea156f44aa483a231752adf8
SHA15ca625e98655d3453e7d55cc43569dc27ca09114
SHA25647897868e442210f468e0f058e5e377da26aa2e54b52d7a49c8c949986aad4b1
SHA5126c8872f867d427cef4514640fef7224a8492e547c33dada6c492cac22295afb4e2f2f26eeff2f5bfe83c4cd6e017cc7020325f33e042ba3dbc82339e61c276d9
-
Filesize
520KB
MD5942173667dc78c7dcf2416ad51f215e1
SHA1433f38e42271b3d186792e1d986cbe29bad0dea6
SHA256d6866f913f404de951f0537b1914ee2c10c92e01ea535153a7d685af98e21fc0
SHA51258da9b7b95ba0d1dc1d49d0806ead519730d336ffbdecc8bc1092db08a9a4fda5a1791fd0d32067fa93e65b7fe886b86a6df48b2e0c393ae771f8e87365d8104
-
Filesize
520KB
MD5942173667dc78c7dcf2416ad51f215e1
SHA1433f38e42271b3d186792e1d986cbe29bad0dea6
SHA256d6866f913f404de951f0537b1914ee2c10c92e01ea535153a7d685af98e21fc0
SHA51258da9b7b95ba0d1dc1d49d0806ead519730d336ffbdecc8bc1092db08a9a4fda5a1791fd0d32067fa93e65b7fe886b86a6df48b2e0c393ae771f8e87365d8104
-
Filesize
239KB
MD56db0ea22f3d16d041cd32c59ebd4ccc0
SHA164699a48649dcdd5f9e862721411f025ad2259ff
SHA256ed460d54b3bc86ba232a02dd58cc90783934490abe07b75396c1fdc67a57f537
SHA5128545cdbb4d46c2cad02b5f62bed2d3cb7b48ec91a9c7a64fd3c5607475f493bce831b47370d13c0c8bbedb852e93219d9a36a52c8e2759c0b10be8012be2a19a
-
Filesize
239KB
MD56db0ea22f3d16d041cd32c59ebd4ccc0
SHA164699a48649dcdd5f9e862721411f025ad2259ff
SHA256ed460d54b3bc86ba232a02dd58cc90783934490abe07b75396c1fdc67a57f537
SHA5128545cdbb4d46c2cad02b5f62bed2d3cb7b48ec91a9c7a64fd3c5607475f493bce831b47370d13c0c8bbedb852e93219d9a36a52c8e2759c0b10be8012be2a19a
-
Filesize
297KB
MD5f2dfa08be39fef435d1e802835b65fe7
SHA1b344ddd7da74c34975c7b73f436076207c568533
SHA2560c6e1fc1d6fdc9ccfad1cd4cc57ee7ebc8ec3c2d34e80e42ba507397323c63ce
SHA512f8d8af1747fe863a5855b99d140dfd8b9b795557902459ee4b78d27548c807bd2f81d5a84e378eaca57d0d184f66fce8dedd2f7ae97a6ef7b6455eea3425bd3b
-
Filesize
297KB
MD5f2dfa08be39fef435d1e802835b65fe7
SHA1b344ddd7da74c34975c7b73f436076207c568533
SHA2560c6e1fc1d6fdc9ccfad1cd4cc57ee7ebc8ec3c2d34e80e42ba507397323c63ce
SHA512f8d8af1747fe863a5855b99d140dfd8b9b795557902459ee4b78d27548c807bd2f81d5a84e378eaca57d0d184f66fce8dedd2f7ae97a6ef7b6455eea3425bd3b
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5