Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2023, 00:12
Static task
static1
General
-
Target
e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe
-
Size
925KB
-
MD5
9c444a90a279892ede7a161a5a3e92b0
-
SHA1
e07b1f3780c5142f76959306b82064b1035150c4
-
SHA256
e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2
-
SHA512
731f87190b808adbcb12e347ed64a221a0af24f8b82a5366835ef3f36286092200800c9dd51e92359fa9c69f46369d82262b71a67f123fa9edce71c7aede3f55
-
SSDEEP
24576:1yvStK261h5b9hC8J8cNMuEPzaxy0t95Ag3kZfx/Ej:QvgK261h5q8GcNYzXi5L3kZpM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr640292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr640292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr640292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr640292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr640292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr640292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4628-198-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-199-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-201-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-203-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-205-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-207-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-209-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-211-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-213-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-215-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-217-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-219-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-221-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-223-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-225-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-227-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-229-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-231-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/4628-1118-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation si935677.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1328 un801414.exe 3396 un440190.exe 1504 pr640292.exe 4628 qu600537.exe 1252 rk565211.exe 2784 si935677.exe 3236 oneetx.exe 4880 oneetx.exe 4820 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr640292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr640292.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un440190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un440190.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un801414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un801414.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3420 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 1176 1504 WerFault.exe 87 1700 4628 WerFault.exe 93 464 2784 WerFault.exe 101 3896 2784 WerFault.exe 101 4252 2784 WerFault.exe 101 472 2784 WerFault.exe 101 3028 2784 WerFault.exe 101 1836 2784 WerFault.exe 101 832 2784 WerFault.exe 101 836 2784 WerFault.exe 101 3340 2784 WerFault.exe 101 2156 2784 WerFault.exe 101 3820 3236 WerFault.exe 121 2008 3236 WerFault.exe 121 3292 3236 WerFault.exe 121 1684 3236 WerFault.exe 121 2232 3236 WerFault.exe 121 884 3236 WerFault.exe 121 2168 3236 WerFault.exe 121 4724 3236 WerFault.exe 121 3808 3236 WerFault.exe 121 2896 3236 WerFault.exe 121 1348 3236 WerFault.exe 121 3016 4880 WerFault.exe 148 2588 3236 WerFault.exe 121 4588 3236 WerFault.exe 121 3348 3236 WerFault.exe 121 1504 4820 WerFault.exe 158 968 3236 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1504 pr640292.exe 1504 pr640292.exe 4628 qu600537.exe 4628 qu600537.exe 1252 rk565211.exe 1252 rk565211.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1504 pr640292.exe Token: SeDebugPrivilege 4628 qu600537.exe Token: SeDebugPrivilege 1252 rk565211.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 si935677.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1328 1988 e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe 85 PID 1988 wrote to memory of 1328 1988 e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe 85 PID 1988 wrote to memory of 1328 1988 e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe 85 PID 1328 wrote to memory of 3396 1328 un801414.exe 86 PID 1328 wrote to memory of 3396 1328 un801414.exe 86 PID 1328 wrote to memory of 3396 1328 un801414.exe 86 PID 3396 wrote to memory of 1504 3396 un440190.exe 87 PID 3396 wrote to memory of 1504 3396 un440190.exe 87 PID 3396 wrote to memory of 1504 3396 un440190.exe 87 PID 3396 wrote to memory of 4628 3396 un440190.exe 93 PID 3396 wrote to memory of 4628 3396 un440190.exe 93 PID 3396 wrote to memory of 4628 3396 un440190.exe 93 PID 1328 wrote to memory of 1252 1328 un801414.exe 97 PID 1328 wrote to memory of 1252 1328 un801414.exe 97 PID 1328 wrote to memory of 1252 1328 un801414.exe 97 PID 1988 wrote to memory of 2784 1988 e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe 101 PID 1988 wrote to memory of 2784 1988 e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe 101 PID 1988 wrote to memory of 2784 1988 e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe 101 PID 2784 wrote to memory of 3236 2784 si935677.exe 121 PID 2784 wrote to memory of 3236 2784 si935677.exe 121 PID 2784 wrote to memory of 3236 2784 si935677.exe 121 PID 3236 wrote to memory of 3184 3236 oneetx.exe 138 PID 3236 wrote to memory of 3184 3236 oneetx.exe 138 PID 3236 wrote to memory of 3184 3236 oneetx.exe 138 PID 3236 wrote to memory of 1744 3236 oneetx.exe 155 PID 3236 wrote to memory of 1744 3236 oneetx.exe 155 PID 3236 wrote to memory of 1744 3236 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe"C:\Users\Admin\AppData\Local\Temp\e35812b32e9406d99849d81fd9d8a5ce3363985e1ccf4be66c67ae4479d1ffb2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801414.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801414.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un440190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un440190.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr640292.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr640292.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 10165⤵
- Program crash
PID:1176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu600537.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu600537.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 19205⤵
- Program crash
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk565211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk565211.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si935677.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si935677.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6803⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 7803⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 8563⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 9523⤵
- Program crash
PID:472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 9923⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 9563⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 12083⤵
- Program crash
PID:832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 12243⤵
- Program crash
PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 13123⤵
- Program crash
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 6924⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 7924⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 8924⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10524⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10724⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10804⤵
- Program crash
PID:884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 11364⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 9924⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 9124⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 12804⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 9124⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10924⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 16124⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 15404⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 15804⤵
- Program crash
PID:968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 14283⤵
- Program crash
PID:2156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1504 -ip 15041⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4628 -ip 46281⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2784 -ip 27841⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2784 -ip 27841⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2784 -ip 27841⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2784 -ip 27841⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2784 -ip 27841⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2784 -ip 27841⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2784 -ip 27841⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2784 -ip 27841⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2784 -ip 27841⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2784 -ip 27841⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3236 -ip 32361⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3236 -ip 32361⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3236 -ip 32361⤵PID:2988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3236 -ip 32361⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3236 -ip 32361⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3236 -ip 32361⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3236 -ip 32361⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3236 -ip 32361⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3236 -ip 32361⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3236 -ip 32361⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3236 -ip 32361⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 3202⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4880 -ip 48801⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3236 -ip 32361⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3236 -ip 32361⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3236 -ip 32361⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 3122⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4820 -ip 48201⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3236 -ip 32361⤵PID:1964
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
230KB
MD54be9d89cb3308ce100c56b5bdbccafac
SHA1274f57114096a555ece5bcd983fd670f4f971ece
SHA2569f5400b19dabef76d3c52058cb5709d323dfd42387cc2202cde0e92016e3bdc9
SHA5121095ae9191de62663ce440bc9adfab1ea609c1458d547e43ec309561fde518f45f0820bb699f0c9a771cc9c3a2703b86086a3767c5e2d10bf829f2a668f8175f
-
Filesize
661KB
MD59affcde906ad86105d3a0f288e937512
SHA12509c4f553bfd9f8213f2ab587129a0afee0ca70
SHA2560f39d5e3ead7e64e6ff24e2f0912a347a844a1d617468e254932e9202d1a9c26
SHA512cfa2585af0ac5352bc13ec936de8c7286dcf508bb44557f9b9003ad3feeee407312fc2dd8ae05d9c2a42390dc1777b76232a7604d75345896b279c55b7432161
-
Filesize
661KB
MD59affcde906ad86105d3a0f288e937512
SHA12509c4f553bfd9f8213f2ab587129a0afee0ca70
SHA2560f39d5e3ead7e64e6ff24e2f0912a347a844a1d617468e254932e9202d1a9c26
SHA512cfa2585af0ac5352bc13ec936de8c7286dcf508bb44557f9b9003ad3feeee407312fc2dd8ae05d9c2a42390dc1777b76232a7604d75345896b279c55b7432161
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
518KB
MD5326f39138a3714d2dfc4101c9459b1c6
SHA15722f28c39973ea57bf59bf581f40bf6a9635137
SHA2566727e464f846c6c67610dba07b82bdb0a28fe892847852cf1bac131228d2a316
SHA512fb7baeec2baf619b0547c34e1a14d5650fd2b41a89f0fae2520527ae9e5224fbc759dc526add57dc3f744ce9d46f9e2cf03a248c2c6a66e57d41ea9d98922259
-
Filesize
518KB
MD5326f39138a3714d2dfc4101c9459b1c6
SHA15722f28c39973ea57bf59bf581f40bf6a9635137
SHA2566727e464f846c6c67610dba07b82bdb0a28fe892847852cf1bac131228d2a316
SHA512fb7baeec2baf619b0547c34e1a14d5650fd2b41a89f0fae2520527ae9e5224fbc759dc526add57dc3f744ce9d46f9e2cf03a248c2c6a66e57d41ea9d98922259
-
Filesize
238KB
MD5c44f8bc49074b6e5c41477c53b19353c
SHA1e33b9ebaba304b61452648bff1aa4ed1b5001b50
SHA256bbceec745f62f7e24b4cad7a5ca55f264ef5a25b7840cf34e6b3101a89242efa
SHA51264c8b484bdfcbcfd0e35a6b1ffaa1b3f68c4e93a348216bed1a02c8216a0be5f36a3ec935ee0ce852f7ad3d33477285d4b89e72d1abee99f06a36baaae500563
-
Filesize
238KB
MD5c44f8bc49074b6e5c41477c53b19353c
SHA1e33b9ebaba304b61452648bff1aa4ed1b5001b50
SHA256bbceec745f62f7e24b4cad7a5ca55f264ef5a25b7840cf34e6b3101a89242efa
SHA51264c8b484bdfcbcfd0e35a6b1ffaa1b3f68c4e93a348216bed1a02c8216a0be5f36a3ec935ee0ce852f7ad3d33477285d4b89e72d1abee99f06a36baaae500563
-
Filesize
297KB
MD5f0f75b4770bf1f025200fee125f83d95
SHA1c45dcc8946399c05d63864ba08338999d39ce94e
SHA2560feacf0d7852e8abecf6c5a8efc8ce5a5635b051f746e334a8a0f540641726d7
SHA512ddc0394938219aa7c99fbb72fd9dcdaa7ad684a156fed43c69456501a7bfcc2528e61a16b4f76900fd11001b7da3938fe0684042fdcbaf6c9dc297e63e17b648
-
Filesize
297KB
MD5f0f75b4770bf1f025200fee125f83d95
SHA1c45dcc8946399c05d63864ba08338999d39ce94e
SHA2560feacf0d7852e8abecf6c5a8efc8ce5a5635b051f746e334a8a0f540641726d7
SHA512ddc0394938219aa7c99fbb72fd9dcdaa7ad684a156fed43c69456501a7bfcc2528e61a16b4f76900fd11001b7da3938fe0684042fdcbaf6c9dc297e63e17b648
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5