Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 20:53
Static task
static1
General
-
Target
07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe
-
Size
939KB
-
MD5
fd493bd2c93bc30a37308dbfaf9a82d5
-
SHA1
49a730688b4f10254ae35c3d55bf7e0f5a833a8f
-
SHA256
07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0
-
SHA512
13299e304510c4a226c01d749b37355c5fc2291cc8789dfe10c53daa86ed8920bd1599ee75f8731e2164f903cfea469d59165404e9f556c367bb032ed6b6429e
-
SSDEEP
24576:2yXEg2osKtidDU3kAVkkUNpVlgDIlGLbdXOh30EUFxBedJGA:FUg2Oti8VkhzV8rbMJaxBJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr830038.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr830038.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr830038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr830038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr830038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr830038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr830038.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/4576-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-199-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-201-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-209-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-211-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-213-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-215-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-217-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-219-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-221-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-223-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-225-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-227-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-229-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-231-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-233-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4576-235-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si402940.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si402940.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un640368.exeun286138.exepr830038.exequ168778.exerk011055.exesi402940.exeoneetx.exeoneetx.exeoneetx.exepid process 740 un640368.exe 2136 un286138.exe 1168 pr830038.exe 4576 qu168778.exe 3944 rk011055.exe 2128 si402940.exe 3684 oneetx.exe 1728 oneetx.exe 3932 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3952 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr830038.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr830038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr830038.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exeun640368.exeun286138.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un640368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un640368.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un286138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un286138.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3984 1168 WerFault.exe pr830038.exe 1764 4576 WerFault.exe qu168778.exe 1316 2128 WerFault.exe si402940.exe 1976 2128 WerFault.exe si402940.exe 3620 2128 WerFault.exe si402940.exe 1348 2128 WerFault.exe si402940.exe 4168 2128 WerFault.exe si402940.exe 5016 2128 WerFault.exe si402940.exe 1252 2128 WerFault.exe si402940.exe 1168 2128 WerFault.exe si402940.exe 3352 2128 WerFault.exe si402940.exe 3696 2128 WerFault.exe si402940.exe 3500 3684 WerFault.exe oneetx.exe 2076 3684 WerFault.exe oneetx.exe 3960 3684 WerFault.exe oneetx.exe 2084 3684 WerFault.exe oneetx.exe 4800 3684 WerFault.exe oneetx.exe 4328 3684 WerFault.exe oneetx.exe 5104 3684 WerFault.exe oneetx.exe 2168 3684 WerFault.exe oneetx.exe 3700 3684 WerFault.exe oneetx.exe 4336 3684 WerFault.exe oneetx.exe 4528 3684 WerFault.exe oneetx.exe 1576 1728 WerFault.exe oneetx.exe 3616 3684 WerFault.exe oneetx.exe 1316 3684 WerFault.exe oneetx.exe 2828 3684 WerFault.exe oneetx.exe 4200 3932 WerFault.exe oneetx.exe 3240 3684 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr830038.exequ168778.exerk011055.exepid process 1168 pr830038.exe 1168 pr830038.exe 4576 qu168778.exe 4576 qu168778.exe 3944 rk011055.exe 3944 rk011055.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr830038.exequ168778.exerk011055.exedescription pid process Token: SeDebugPrivilege 1168 pr830038.exe Token: SeDebugPrivilege 4576 qu168778.exe Token: SeDebugPrivilege 3944 rk011055.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si402940.exepid process 2128 si402940.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exeun640368.exeun286138.exesi402940.exeoneetx.exedescription pid process target process PID 3076 wrote to memory of 740 3076 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe un640368.exe PID 3076 wrote to memory of 740 3076 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe un640368.exe PID 3076 wrote to memory of 740 3076 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe un640368.exe PID 740 wrote to memory of 2136 740 un640368.exe un286138.exe PID 740 wrote to memory of 2136 740 un640368.exe un286138.exe PID 740 wrote to memory of 2136 740 un640368.exe un286138.exe PID 2136 wrote to memory of 1168 2136 un286138.exe pr830038.exe PID 2136 wrote to memory of 1168 2136 un286138.exe pr830038.exe PID 2136 wrote to memory of 1168 2136 un286138.exe pr830038.exe PID 2136 wrote to memory of 4576 2136 un286138.exe qu168778.exe PID 2136 wrote to memory of 4576 2136 un286138.exe qu168778.exe PID 2136 wrote to memory of 4576 2136 un286138.exe qu168778.exe PID 740 wrote to memory of 3944 740 un640368.exe rk011055.exe PID 740 wrote to memory of 3944 740 un640368.exe rk011055.exe PID 740 wrote to memory of 3944 740 un640368.exe rk011055.exe PID 3076 wrote to memory of 2128 3076 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe si402940.exe PID 3076 wrote to memory of 2128 3076 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe si402940.exe PID 3076 wrote to memory of 2128 3076 07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe si402940.exe PID 2128 wrote to memory of 3684 2128 si402940.exe oneetx.exe PID 2128 wrote to memory of 3684 2128 si402940.exe oneetx.exe PID 2128 wrote to memory of 3684 2128 si402940.exe oneetx.exe PID 3684 wrote to memory of 4280 3684 oneetx.exe schtasks.exe PID 3684 wrote to memory of 4280 3684 oneetx.exe schtasks.exe PID 3684 wrote to memory of 4280 3684 oneetx.exe schtasks.exe PID 3684 wrote to memory of 3952 3684 oneetx.exe rundll32.exe PID 3684 wrote to memory of 3952 3684 oneetx.exe rundll32.exe PID 3684 wrote to memory of 3952 3684 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe"C:\Users\Admin\AppData\Local\Temp\07b94a281d4f3b778acc959a39f45453e2bf1f15acc651305b6ae9b3cfc09fd0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640368.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640368.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un286138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un286138.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr830038.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr830038.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10845⤵
- Program crash
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu168778.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu168778.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 13445⤵
- Program crash
PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011055.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk011055.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402940.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 6963⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 7803⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 8563⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 9523⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 8563⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 8563⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 12163⤵
- Program crash
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 12563⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 13163⤵
- Program crash
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7044⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 8764⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9324⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10524⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10884⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10884⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 11084⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10204⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 12524⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7604⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7684⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 11364⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 16164⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10964⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 16324⤵
- Program crash
PID:3240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 13563⤵
- Program crash
PID:3696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1168 -ip 11681⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4576 -ip 45761⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 2128 -ip 21281⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2128 -ip 21281⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2128 -ip 21281⤵PID:484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2128 -ip 21281⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2128 -ip 21281⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 2128 -ip 21281⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2128 -ip 21281⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2128 -ip 21281⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2128 -ip 21281⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2128 -ip 21281⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3684 -ip 36841⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3684 -ip 36841⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3684 -ip 36841⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3684 -ip 36841⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3684 -ip 36841⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3684 -ip 36841⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3684 -ip 36841⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3684 -ip 36841⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3684 -ip 36841⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3684 -ip 36841⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3684 -ip 36841⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 3122⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1728 -ip 17281⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3684 -ip 36841⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3684 -ip 36841⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3684 -ip 36841⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 2162⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3932 -ip 39321⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3684 -ip 36841⤵PID:844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
674KB
MD5b2fd4a8fd1dad5db4174ae8012004c9d
SHA1d8bd00965ce4c82f15c8e65455bc4bca761e7bb0
SHA2563a52b225180b06580fb44126f6f0224d1c656ee1548c0e631dd78786831815a3
SHA5123cb3c947901ef90a0613c89dd4a44658ab189ed1e22a532baadeb301d633f27c7fa4c7cc8ae0b152466ef7aefd5ac6c3d8aa86223b6a86b80cd416ed5aedbb75
-
Filesize
674KB
MD5b2fd4a8fd1dad5db4174ae8012004c9d
SHA1d8bd00965ce4c82f15c8e65455bc4bca761e7bb0
SHA2563a52b225180b06580fb44126f6f0224d1c656ee1548c0e631dd78786831815a3
SHA5123cb3c947901ef90a0613c89dd4a44658ab189ed1e22a532baadeb301d633f27c7fa4c7cc8ae0b152466ef7aefd5ac6c3d8aa86223b6a86b80cd416ed5aedbb75
-
Filesize
169KB
MD56185bc86b5e63f628406674d8bf9fd91
SHA1256c9f7a8f2a15a2413db1402674cd47fb825465
SHA25635acece7146bf71b87ef409f3bf80a3755b0826f078441bd2c0e5dde29eba442
SHA51283125f55894dad6d18046580d048e9b97e0501b1a1fffe995692604fd1130e6bdcc2b62077c5b4bbc463374a291dbba5f2de39380d73cc43575d46892496a490
-
Filesize
169KB
MD56185bc86b5e63f628406674d8bf9fd91
SHA1256c9f7a8f2a15a2413db1402674cd47fb825465
SHA25635acece7146bf71b87ef409f3bf80a3755b0826f078441bd2c0e5dde29eba442
SHA51283125f55894dad6d18046580d048e9b97e0501b1a1fffe995692604fd1130e6bdcc2b62077c5b4bbc463374a291dbba5f2de39380d73cc43575d46892496a490
-
Filesize
521KB
MD50b40a2f084c3db739c2fab562da6960b
SHA1d73334cfc28c681cb360fd855fb74a20bf098d77
SHA2563bf902399f5dd31fa2bfb68e1a24f25be462006da6f9d7c216f61d1351c4741f
SHA5129069d2f4a4732e47709ccbf6af59f91e0c5deb6ad3d3a619567924f08452b19aced47c72210bd1109fa0ac3035b5e498d3753901b5d54ad94b5e0907e2a8c2ef
-
Filesize
521KB
MD50b40a2f084c3db739c2fab562da6960b
SHA1d73334cfc28c681cb360fd855fb74a20bf098d77
SHA2563bf902399f5dd31fa2bfb68e1a24f25be462006da6f9d7c216f61d1351c4741f
SHA5129069d2f4a4732e47709ccbf6af59f91e0c5deb6ad3d3a619567924f08452b19aced47c72210bd1109fa0ac3035b5e498d3753901b5d54ad94b5e0907e2a8c2ef
-
Filesize
239KB
MD579498c42d2c8cb74faa5d12964c6bf1a
SHA171c56aac184fdf8ca87c241ec3fc9cf51f6b5529
SHA2567bf901d497079b02333b2e0002137aa63c7d08290d1edefaf502a1a60affc453
SHA512872957c66a4d5d1899dafbb0c44e16d6a1f4d0a50028f7c1d42559a425149d73c8b7f6b0d2d8f1703b28cc8e3b2027043b800481ef21da81a1cca18986877342
-
Filesize
239KB
MD579498c42d2c8cb74faa5d12964c6bf1a
SHA171c56aac184fdf8ca87c241ec3fc9cf51f6b5529
SHA2567bf901d497079b02333b2e0002137aa63c7d08290d1edefaf502a1a60affc453
SHA512872957c66a4d5d1899dafbb0c44e16d6a1f4d0a50028f7c1d42559a425149d73c8b7f6b0d2d8f1703b28cc8e3b2027043b800481ef21da81a1cca18986877342
-
Filesize
297KB
MD52ed814bdd4be347a99f0b5776dcf17e1
SHA1870c45ea6eca63b1a0827d45565ebabf26ff2ab2
SHA2568309380415d13fa8e67d7d1d37b818a9c782f8df745b92b6a423dc0d11c57fc6
SHA512a742690cfb253e695cd9bca1da8e036ee843ec769cd699704ebcf8e512458d3fee1e7e027becd68140d77d503c8b8d1bf4ee1d1234978cf25934d5d18b4aade2
-
Filesize
297KB
MD52ed814bdd4be347a99f0b5776dcf17e1
SHA1870c45ea6eca63b1a0827d45565ebabf26ff2ab2
SHA2568309380415d13fa8e67d7d1d37b818a9c782f8df745b92b6a423dc0d11c57fc6
SHA512a742690cfb253e695cd9bca1da8e036ee843ec769cd699704ebcf8e512458d3fee1e7e027becd68140d77d503c8b8d1bf4ee1d1234978cf25934d5d18b4aade2
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5