Analysis
-
max time kernel
148s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 19:44
Static task
static1
General
-
Target
f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe
-
Size
939KB
-
MD5
caef2d5e96694bf59dc9566e5a167a39
-
SHA1
58beae736723f89058478f09362540dae0d7f4e5
-
SHA256
f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72
-
SHA512
b499a3fc2f0701fdf653ee246870f8be52348042d09c74d1348ae8640678bb8ce497cf61e408d3a59b86bd2db17110d634b79a70313bb69789070385afb420d1
-
SSDEEP
24576:yyeuJxPw+2SSdA28HbFcgQxtLANTIRGfKut/uyva:Z3Y+2SBbFGtLqlfKuJpv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr723742.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr723742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr723742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr723742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr723742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr723742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr723742.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3380-198-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-199-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-201-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-203-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-205-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-207-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-209-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-211-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-213-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-215-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-217-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-219-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-223-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-221-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-225-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-227-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-229-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3380-231-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si363772.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si363772.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
Processes:
un607846.exeun204902.exepr723742.exequ894718.exerk907823.exesi363772.exeoneetx.exeoneetx.exepid process 3404 un607846.exe 1320 un204902.exe 4156 pr723742.exe 3380 qu894718.exe 4496 rk907823.exe 3964 si363772.exe 4772 oneetx.exe 1936 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4396 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr723742.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr723742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr723742.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un607846.exeun204902.exef2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un607846.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un607846.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un204902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un204902.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4380 4156 WerFault.exe pr723742.exe 2220 3380 WerFault.exe qu894718.exe 1428 3964 WerFault.exe si363772.exe 3084 3964 WerFault.exe si363772.exe 1104 3964 WerFault.exe si363772.exe 3372 3964 WerFault.exe si363772.exe 4808 3964 WerFault.exe si363772.exe 1188 3964 WerFault.exe si363772.exe 1740 3964 WerFault.exe si363772.exe 816 3964 WerFault.exe si363772.exe 3828 3964 WerFault.exe si363772.exe 404 3964 WerFault.exe si363772.exe 2296 4772 WerFault.exe oneetx.exe 4528 4772 WerFault.exe oneetx.exe 5116 4772 WerFault.exe oneetx.exe 2248 4772 WerFault.exe oneetx.exe 4532 4772 WerFault.exe oneetx.exe 1792 4772 WerFault.exe oneetx.exe 1064 4772 WerFault.exe oneetx.exe 4860 4772 WerFault.exe oneetx.exe 2040 4772 WerFault.exe oneetx.exe 4156 4772 WerFault.exe oneetx.exe 4224 4772 WerFault.exe oneetx.exe 1264 4772 WerFault.exe oneetx.exe 2948 1936 WerFault.exe oneetx.exe 2872 4772 WerFault.exe oneetx.exe 1104 4772 WerFault.exe oneetx.exe 4852 4772 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr723742.exequ894718.exerk907823.exepid process 4156 pr723742.exe 4156 pr723742.exe 3380 qu894718.exe 3380 qu894718.exe 4496 rk907823.exe 4496 rk907823.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr723742.exequ894718.exerk907823.exedescription pid process Token: SeDebugPrivilege 4156 pr723742.exe Token: SeDebugPrivilege 3380 qu894718.exe Token: SeDebugPrivilege 4496 rk907823.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si363772.exepid process 3964 si363772.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exeun607846.exeun204902.exesi363772.exeoneetx.exedescription pid process target process PID 920 wrote to memory of 3404 920 f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe un607846.exe PID 920 wrote to memory of 3404 920 f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe un607846.exe PID 920 wrote to memory of 3404 920 f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe un607846.exe PID 3404 wrote to memory of 1320 3404 un607846.exe un204902.exe PID 3404 wrote to memory of 1320 3404 un607846.exe un204902.exe PID 3404 wrote to memory of 1320 3404 un607846.exe un204902.exe PID 1320 wrote to memory of 4156 1320 un204902.exe pr723742.exe PID 1320 wrote to memory of 4156 1320 un204902.exe pr723742.exe PID 1320 wrote to memory of 4156 1320 un204902.exe pr723742.exe PID 1320 wrote to memory of 3380 1320 un204902.exe qu894718.exe PID 1320 wrote to memory of 3380 1320 un204902.exe qu894718.exe PID 1320 wrote to memory of 3380 1320 un204902.exe qu894718.exe PID 3404 wrote to memory of 4496 3404 un607846.exe rk907823.exe PID 3404 wrote to memory of 4496 3404 un607846.exe rk907823.exe PID 3404 wrote to memory of 4496 3404 un607846.exe rk907823.exe PID 920 wrote to memory of 3964 920 f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe si363772.exe PID 920 wrote to memory of 3964 920 f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe si363772.exe PID 920 wrote to memory of 3964 920 f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe si363772.exe PID 3964 wrote to memory of 4772 3964 si363772.exe oneetx.exe PID 3964 wrote to memory of 4772 3964 si363772.exe oneetx.exe PID 3964 wrote to memory of 4772 3964 si363772.exe oneetx.exe PID 4772 wrote to memory of 1192 4772 oneetx.exe schtasks.exe PID 4772 wrote to memory of 1192 4772 oneetx.exe schtasks.exe PID 4772 wrote to memory of 1192 4772 oneetx.exe schtasks.exe PID 4772 wrote to memory of 4396 4772 oneetx.exe rundll32.exe PID 4772 wrote to memory of 4396 4772 oneetx.exe rundll32.exe PID 4772 wrote to memory of 4396 4772 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe"C:\Users\Admin\AppData\Local\Temp\f2bc46f2932a1f855ac503677863beee8a2f988a136700f33d62881bca1eff72.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un607846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un607846.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un204902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un204902.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr723742.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr723742.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 10805⤵
- Program crash
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu894718.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu894718.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 13325⤵
- Program crash
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk907823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk907823.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363772.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 6963⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 7803⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 7803⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 9523⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 9523⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 8723⤵
- Program crash
PID:1188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 12203⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 12123⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 13203⤵
- Program crash
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 6964⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 7884⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 8404⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 10524⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 10724⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 10724⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 11364⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 9924⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 8884⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 6964⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 7724⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 11044⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 16164⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 10524⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 16324⤵
- Program crash
PID:4852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 14163⤵
- Program crash
PID:404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4156 -ip 41561⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3380 -ip 33801⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3964 -ip 39641⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3964 -ip 39641⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3964 -ip 39641⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3964 -ip 39641⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3964 -ip 39641⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3964 -ip 39641⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3964 -ip 39641⤵PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3964 -ip 39641⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3964 -ip 39641⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3964 -ip 39641⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4772 -ip 47721⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4772 -ip 47721⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4772 -ip 47721⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4772 -ip 47721⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4772 -ip 47721⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4772 -ip 47721⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4772 -ip 47721⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4772 -ip 47721⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4772 -ip 47721⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4772 -ip 47721⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4772 -ip 47721⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4772 -ip 47721⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 3202⤵
- Program crash
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1936 -ip 19361⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4772 -ip 47721⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4772 -ip 47721⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4772 -ip 47721⤵PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
674KB
MD53026f97df05c08ddec8f5c05a94aaa73
SHA116e041137067323ce8c889933b362d2c8d810807
SHA256166874403acf8eb79682e24e3e7a8349b7244887004249c570f614246c5d1a24
SHA5129bf5d835f1ca8af484208215d9a3638a6a525cdcc05f618fbfc795bd742beec5ef387a94f1b48ec2d737e50f8c281b35acdbfe8b89e82c0ef0aeb0b17f8ff975
-
Filesize
674KB
MD53026f97df05c08ddec8f5c05a94aaa73
SHA116e041137067323ce8c889933b362d2c8d810807
SHA256166874403acf8eb79682e24e3e7a8349b7244887004249c570f614246c5d1a24
SHA5129bf5d835f1ca8af484208215d9a3638a6a525cdcc05f618fbfc795bd742beec5ef387a94f1b48ec2d737e50f8c281b35acdbfe8b89e82c0ef0aeb0b17f8ff975
-
Filesize
169KB
MD5cc50fea2aaee76c28f54edde9c36e8b3
SHA148a3099242958ea0084a96acc9ca6f71d1a72b34
SHA256e42c44be3551af96dc4cf1cc5fff1d79cecd74c76601c10d16985bc100553a5e
SHA512425829ce932e3f5cb1716f105dfb0fd6feb3d8db563684f50e8272b0267b197509aac7c7b01c5f3c66a236161108f95b03a997daf069aa3cc571939ea78863ec
-
Filesize
169KB
MD5cc50fea2aaee76c28f54edde9c36e8b3
SHA148a3099242958ea0084a96acc9ca6f71d1a72b34
SHA256e42c44be3551af96dc4cf1cc5fff1d79cecd74c76601c10d16985bc100553a5e
SHA512425829ce932e3f5cb1716f105dfb0fd6feb3d8db563684f50e8272b0267b197509aac7c7b01c5f3c66a236161108f95b03a997daf069aa3cc571939ea78863ec
-
Filesize
521KB
MD54540fac0a00fcbc77a45a303c36f273d
SHA1279f93c2bd173f2c1e7ce04583353640d17ee501
SHA2560bd65f71b00b9f3065d6aa90b871f1256e510502da33cff8bbe5b7ad1572fefa
SHA512f0c36b01d4b8b08a0debe44847bca431866494bb83a396f9d7db358b7b2e686c80456e33b7a590b8a4c0ade8e99ca0fbd14d01284a352ba1c04ee1f129e325e8
-
Filesize
521KB
MD54540fac0a00fcbc77a45a303c36f273d
SHA1279f93c2bd173f2c1e7ce04583353640d17ee501
SHA2560bd65f71b00b9f3065d6aa90b871f1256e510502da33cff8bbe5b7ad1572fefa
SHA512f0c36b01d4b8b08a0debe44847bca431866494bb83a396f9d7db358b7b2e686c80456e33b7a590b8a4c0ade8e99ca0fbd14d01284a352ba1c04ee1f129e325e8
-
Filesize
239KB
MD5544bd4a516140a723cb3bfa3c42e8e7b
SHA1ae90b215e374dbba022d68c68e912b6271a85699
SHA256c9bce70ef8ec967f6b379d175425f84efa688e262c01b0239e2c69dc8069b08c
SHA512be6b9cb987e5354f97169ed0c6fc08e38aa85fda824738b56240edb933d2360e796506a32c586099223e2882da939e38c4d3a9c5149a5fd1a2f2693e24da1cb1
-
Filesize
239KB
MD5544bd4a516140a723cb3bfa3c42e8e7b
SHA1ae90b215e374dbba022d68c68e912b6271a85699
SHA256c9bce70ef8ec967f6b379d175425f84efa688e262c01b0239e2c69dc8069b08c
SHA512be6b9cb987e5354f97169ed0c6fc08e38aa85fda824738b56240edb933d2360e796506a32c586099223e2882da939e38c4d3a9c5149a5fd1a2f2693e24da1cb1
-
Filesize
297KB
MD577b46f8c1d9047cad6fd71f9fc3148c8
SHA141902344b004321a07c0686e0779a67d300c1b8a
SHA256dfb2fd7e456f4f18e9456b6c53e2ea84d11d21ebf7cd2ab276a640008e9fe695
SHA512f82d143654f44467d463b0a28743837a1a5e607af6bafcf1bff914c4d85d40b1f9ce4cb002b0e5ca61a6e6d47c48fbf144cbfd1c438bad2720415767c4c4e44e
-
Filesize
297KB
MD577b46f8c1d9047cad6fd71f9fc3148c8
SHA141902344b004321a07c0686e0779a67d300c1b8a
SHA256dfb2fd7e456f4f18e9456b6c53e2ea84d11d21ebf7cd2ab276a640008e9fe695
SHA512f82d143654f44467d463b0a28743837a1a5e607af6bafcf1bff914c4d85d40b1f9ce4cb002b0e5ca61a6e6d47c48fbf144cbfd1c438bad2720415767c4c4e44e
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5