Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 20:47
Static task
static1
General
-
Target
3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe
-
Size
800KB
-
MD5
8c9ee8b529180129b8a8451a0069147c
-
SHA1
425a7fd909a6bf55a2bb422af1383414cb0a65ea
-
SHA256
3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38
-
SHA512
48ec4dc1962bdb9fcaa5dca24432aac3e9d4fea3393bc746325f34cf760f5f9be3bb22eb94dfbdd2a63d4596bfe3fe2f5bc10266dc41c107361173d58e7a9db6
-
SSDEEP
12288:jMrcy90iVYEfuba7KV0FvWhVElw6mN5xK7C/kmcsKxF9J70I7HGbtVTlo7fb8U4U:/yxODeZ+jXxflUt7mljXXE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it082154.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it082154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it082154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it082154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it082154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it082154.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it082154.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4300-165-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-166-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-168-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-170-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-172-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-174-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-176-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-178-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-180-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-182-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-184-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-186-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-188-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-190-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-192-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-194-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-196-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-198-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-200-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-202-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-204-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-206-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-208-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-210-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-212-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-214-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-216-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-218-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-220-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-222-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-224-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-226-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4300-228-0x0000000002650000-0x000000000268F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr103854.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr103854.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
Processes:
ziqL1433.exeziLE9795.exeit082154.exejr992245.exekp698033.exelr103854.exeoneetx.exeoneetx.exepid process 4840 ziqL1433.exe 3456 ziLE9795.exe 1064 it082154.exe 4300 jr992245.exe 2200 kp698033.exe 528 lr103854.exe 4548 oneetx.exe 4180 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1960 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it082154.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it082154.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziqL1433.exeziLE9795.exe3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziqL1433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqL1433.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLE9795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziLE9795.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3804 4300 WerFault.exe jr992245.exe 1064 528 WerFault.exe lr103854.exe 4080 528 WerFault.exe lr103854.exe 2892 528 WerFault.exe lr103854.exe 1364 528 WerFault.exe lr103854.exe 1824 528 WerFault.exe lr103854.exe 1036 528 WerFault.exe lr103854.exe 1416 528 WerFault.exe lr103854.exe 3688 528 WerFault.exe lr103854.exe 1224 528 WerFault.exe lr103854.exe 1264 528 WerFault.exe lr103854.exe 4120 4548 WerFault.exe oneetx.exe 3560 4548 WerFault.exe oneetx.exe 2396 4548 WerFault.exe oneetx.exe 4540 4548 WerFault.exe oneetx.exe 2188 4548 WerFault.exe oneetx.exe 4204 4548 WerFault.exe oneetx.exe 4376 4548 WerFault.exe oneetx.exe 636 4548 WerFault.exe oneetx.exe 984 4548 WerFault.exe oneetx.exe 1136 4548 WerFault.exe oneetx.exe 2612 4548 WerFault.exe oneetx.exe 1276 4548 WerFault.exe oneetx.exe 2400 4548 WerFault.exe oneetx.exe 3692 4548 WerFault.exe oneetx.exe 1532 4180 WerFault.exe oneetx.exe 3680 4548 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it082154.exejr992245.exekp698033.exepid process 1064 it082154.exe 1064 it082154.exe 4300 jr992245.exe 4300 jr992245.exe 2200 kp698033.exe 2200 kp698033.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it082154.exejr992245.exekp698033.exedescription pid process Token: SeDebugPrivilege 1064 it082154.exe Token: SeDebugPrivilege 4300 jr992245.exe Token: SeDebugPrivilege 2200 kp698033.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr103854.exepid process 528 lr103854.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exeziqL1433.exeziLE9795.exelr103854.exeoneetx.exedescription pid process target process PID 3408 wrote to memory of 4840 3408 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe ziqL1433.exe PID 3408 wrote to memory of 4840 3408 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe ziqL1433.exe PID 3408 wrote to memory of 4840 3408 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe ziqL1433.exe PID 4840 wrote to memory of 3456 4840 ziqL1433.exe ziLE9795.exe PID 4840 wrote to memory of 3456 4840 ziqL1433.exe ziLE9795.exe PID 4840 wrote to memory of 3456 4840 ziqL1433.exe ziLE9795.exe PID 3456 wrote to memory of 1064 3456 ziLE9795.exe it082154.exe PID 3456 wrote to memory of 1064 3456 ziLE9795.exe it082154.exe PID 3456 wrote to memory of 4300 3456 ziLE9795.exe jr992245.exe PID 3456 wrote to memory of 4300 3456 ziLE9795.exe jr992245.exe PID 3456 wrote to memory of 4300 3456 ziLE9795.exe jr992245.exe PID 4840 wrote to memory of 2200 4840 ziqL1433.exe kp698033.exe PID 4840 wrote to memory of 2200 4840 ziqL1433.exe kp698033.exe PID 4840 wrote to memory of 2200 4840 ziqL1433.exe kp698033.exe PID 3408 wrote to memory of 528 3408 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe lr103854.exe PID 3408 wrote to memory of 528 3408 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe lr103854.exe PID 3408 wrote to memory of 528 3408 3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe lr103854.exe PID 528 wrote to memory of 4548 528 lr103854.exe oneetx.exe PID 528 wrote to memory of 4548 528 lr103854.exe oneetx.exe PID 528 wrote to memory of 4548 528 lr103854.exe oneetx.exe PID 4548 wrote to memory of 392 4548 oneetx.exe schtasks.exe PID 4548 wrote to memory of 392 4548 oneetx.exe schtasks.exe PID 4548 wrote to memory of 392 4548 oneetx.exe schtasks.exe PID 4548 wrote to memory of 1960 4548 oneetx.exe rundll32.exe PID 4548 wrote to memory of 1960 4548 oneetx.exe rundll32.exe PID 4548 wrote to memory of 1960 4548 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe"C:\Users\Admin\AppData\Local\Temp\3d1c082563933a8bae24244e67e182d612455f1105b76518c3b3067b00b12d38.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqL1433.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqL1433.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLE9795.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLE9795.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it082154.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it082154.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr992245.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr992245.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 20925⤵
- Program crash
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp698033.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp698033.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr103854.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr103854.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 6963⤵
- Program crash
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 7723⤵
- Program crash
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 8123⤵
- Program crash
PID:2892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 9723⤵
- Program crash
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 10083⤵
- Program crash
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 10123⤵
- Program crash
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 11963⤵
- Program crash
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 12483⤵
- Program crash
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 13203⤵
- Program crash
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 6924⤵
- Program crash
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 7924⤵
- Program crash
PID:3560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 8924⤵
- Program crash
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10524⤵
- Program crash
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10924⤵
- Program crash
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10924⤵
- Program crash
PID:4204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 11284⤵
- Program crash
PID:4376 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 9964⤵
- Program crash
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 12564⤵
- Program crash
PID:984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 6924⤵
- Program crash
PID:1136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 12764⤵
- Program crash
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 11524⤵
- Program crash
PID:1276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 15884⤵
- Program crash
PID:2400 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 11644⤵
- Program crash
PID:3692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 16204⤵
- Program crash
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 13603⤵
- Program crash
PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4300 -ip 43001⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 528 -ip 5281⤵PID:1176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 528 -ip 5281⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 528 -ip 5281⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 528 -ip 5281⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 528 -ip 5281⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 528 -ip 5281⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 528 -ip 5281⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 528 -ip 5281⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 528 -ip 5281⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 528 -ip 5281⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4548 -ip 45481⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4548 -ip 45481⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4548 -ip 45481⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4548 -ip 45481⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4548 -ip 45481⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4548 -ip 45481⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4548 -ip 45481⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4548 -ip 45481⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4548 -ip 45481⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4548 -ip 45481⤵PID:2624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4548 -ip 45481⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4548 -ip 45481⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4548 -ip 45481⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4548 -ip 45481⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 3202⤵
- Program crash
PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4180 -ip 41801⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4548 -ip 45481⤵PID:3632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
535KB
MD5dbf0c4e0a827ad0e7f0f52e122cafe77
SHA17eae63c54b0247f97b2e8cd44925eac5711bdaba
SHA256fa4398b069b2f99fbd7651b6c0c441f56a6b3eba36f29dac42e82e9974b20e5d
SHA512fe35cef9ae770ec3b71975c2a4a09f85d55d99305a1731803c3988eeaf4eb83ac64dd7178afdd9055624979fedb8a5d73bb4d21650d3d215c3e03c3564733e04
-
Filesize
535KB
MD5dbf0c4e0a827ad0e7f0f52e122cafe77
SHA17eae63c54b0247f97b2e8cd44925eac5711bdaba
SHA256fa4398b069b2f99fbd7651b6c0c441f56a6b3eba36f29dac42e82e9974b20e5d
SHA512fe35cef9ae770ec3b71975c2a4a09f85d55d99305a1731803c3988eeaf4eb83ac64dd7178afdd9055624979fedb8a5d73bb4d21650d3d215c3e03c3564733e04
-
Filesize
169KB
MD5efdb20b11c5bfc2c1b461ff8e74981bf
SHA14f80da60dd2feefd35701b418518279a3e90d06f
SHA25609f3ec619a88c423dff811539acd6962932da4c5f63b712ffaac1280937604b4
SHA5123e943b2c86a32e9fd99a9c91aa22e349e68a7bb816c3e88fe41ea8001ab688960a6add791e3bd615c41b0bce7d11bcdbaad3d28f46e45c2fb47c70f9e84f32dc
-
Filesize
169KB
MD5efdb20b11c5bfc2c1b461ff8e74981bf
SHA14f80da60dd2feefd35701b418518279a3e90d06f
SHA25609f3ec619a88c423dff811539acd6962932da4c5f63b712ffaac1280937604b4
SHA5123e943b2c86a32e9fd99a9c91aa22e349e68a7bb816c3e88fe41ea8001ab688960a6add791e3bd615c41b0bce7d11bcdbaad3d28f46e45c2fb47c70f9e84f32dc
-
Filesize
382KB
MD5bfdd7001f3a4f415e9fd067258fdba21
SHA10ad109ce8afd51fd99a38a3d0531a5e0f5731a84
SHA25664a229f200d0d4b69d63923d53fa92f2ecf765f82af1952cd7a737ed7d852053
SHA51219b025c680092bd988a84909a1498de5883842ebeb005bae85e0923098b9eafe856e5744707b154d94344a6fa76091104e48a6a71d2d866fc9ac79785867c0d6
-
Filesize
382KB
MD5bfdd7001f3a4f415e9fd067258fdba21
SHA10ad109ce8afd51fd99a38a3d0531a5e0f5731a84
SHA25664a229f200d0d4b69d63923d53fa92f2ecf765f82af1952cd7a737ed7d852053
SHA51219b025c680092bd988a84909a1498de5883842ebeb005bae85e0923098b9eafe856e5744707b154d94344a6fa76091104e48a6a71d2d866fc9ac79785867c0d6
-
Filesize
11KB
MD54321a4e9d74403781f34dfabe4d0e680
SHA11ee286d4a5a990f0a50e1d5b28abc27d30813437
SHA25694fb111411f2e2355be7368ca47fca990d748a5496d290526b390cbc03ce3a89
SHA512daef216173e96526d7fcdcee0371d4e4f698ddca836695da6f62ffb9d767d0a8c9b11615fdd688c19339bc6588143d3b5a6a9751dfcf9d642ef49595cfbaef50
-
Filesize
11KB
MD54321a4e9d74403781f34dfabe4d0e680
SHA11ee286d4a5a990f0a50e1d5b28abc27d30813437
SHA25694fb111411f2e2355be7368ca47fca990d748a5496d290526b390cbc03ce3a89
SHA512daef216173e96526d7fcdcee0371d4e4f698ddca836695da6f62ffb9d767d0a8c9b11615fdd688c19339bc6588143d3b5a6a9751dfcf9d642ef49595cfbaef50
-
Filesize
297KB
MD5c5e929bc8756ac229e646e63c590472c
SHA1f4611dbb78cc0bc17a306d830f68d8cc1156c573
SHA256cfc4a96d724236c9dfcede61fb63af442a6db1fdd4c6b96f8b44a1f2ddd0c041
SHA512717259b6ecdabe691adbfb29d9037a75b6237a1d23b178882242ffa14dbdd589a5437aa8326ae67ee50419a828a19d9973ea1fe7b87d60d7d0e9ba362eb22a43
-
Filesize
297KB
MD5c5e929bc8756ac229e646e63c590472c
SHA1f4611dbb78cc0bc17a306d830f68d8cc1156c573
SHA256cfc4a96d724236c9dfcede61fb63af442a6db1fdd4c6b96f8b44a1f2ddd0c041
SHA512717259b6ecdabe691adbfb29d9037a75b6237a1d23b178882242ffa14dbdd589a5437aa8326ae67ee50419a828a19d9973ea1fe7b87d60d7d0e9ba362eb22a43
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5