Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2023, 03:10
Static task
static1
General
-
Target
9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe
-
Size
789KB
-
MD5
f0a252b3f568776cc920302fd9566559
-
SHA1
482369cb3d345bac2afb1c3175f0a5101c242be0
-
SHA256
9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327
-
SHA512
3a5bd9df081a9b3fee67ac22242123dd68beb7dbb06865e651c43a40c8977ac5fb6fbb41cc56043e126231918fb1a76a1f43bf9f16b1d51c6bd2b84c13e62f9b
-
SSDEEP
12288:kMrKy90J3msBNJGayxx1PsR8MoqQ+iwDmnCvI6TYCap13DQ9/fQK:+ywHyBzLqQaDyQI6TdC13kpoK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it331003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it331003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it331003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it331003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it331003.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it331003.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4500-164-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-165-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-167-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-169-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-171-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-173-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-175-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-177-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-213-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-215-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-217-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-221-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-223-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-225-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/4500-227-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr420691.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2124 ziDP1493.exe 3380 ziDx5649.exe 2616 it331003.exe 4500 jr168604.exe 4980 kp734997.exe 3140 lr420691.exe 4548 oneetx.exe 1744 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it331003.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDP1493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDP1493.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDx5649.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziDx5649.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
pid pid_target Process procid_target 3296 4500 WerFault.exe 90 2316 3140 WerFault.exe 98 3196 3140 WerFault.exe 98 2076 3140 WerFault.exe 98 1684 3140 WerFault.exe 98 3032 3140 WerFault.exe 98 3516 3140 WerFault.exe 98 4564 3140 WerFault.exe 98 436 3140 WerFault.exe 98 4848 3140 WerFault.exe 98 868 3140 WerFault.exe 98 844 4548 WerFault.exe 117 3252 4548 WerFault.exe 117 4836 4548 WerFault.exe 117 5036 4548 WerFault.exe 117 5104 4548 WerFault.exe 117 4036 4548 WerFault.exe 117 4296 4548 WerFault.exe 117 224 4548 WerFault.exe 117 2596 4548 WerFault.exe 117 4968 4548 WerFault.exe 117 1316 4548 WerFault.exe 117 3404 4548 WerFault.exe 117 4800 4548 WerFault.exe 117 2820 4548 WerFault.exe 117 1088 1744 WerFault.exe 151 3672 4548 WerFault.exe 117 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2616 it331003.exe 2616 it331003.exe 4500 jr168604.exe 4500 jr168604.exe 4980 kp734997.exe 4980 kp734997.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2616 it331003.exe Token: SeDebugPrivilege 4500 jr168604.exe Token: SeDebugPrivilege 4980 kp734997.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3140 lr420691.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2124 4964 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe 83 PID 4964 wrote to memory of 2124 4964 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe 83 PID 4964 wrote to memory of 2124 4964 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe 83 PID 2124 wrote to memory of 3380 2124 ziDP1493.exe 84 PID 2124 wrote to memory of 3380 2124 ziDP1493.exe 84 PID 2124 wrote to memory of 3380 2124 ziDP1493.exe 84 PID 3380 wrote to memory of 2616 3380 ziDx5649.exe 85 PID 3380 wrote to memory of 2616 3380 ziDx5649.exe 85 PID 3380 wrote to memory of 4500 3380 ziDx5649.exe 90 PID 3380 wrote to memory of 4500 3380 ziDx5649.exe 90 PID 3380 wrote to memory of 4500 3380 ziDx5649.exe 90 PID 2124 wrote to memory of 4980 2124 ziDP1493.exe 97 PID 2124 wrote to memory of 4980 2124 ziDP1493.exe 97 PID 2124 wrote to memory of 4980 2124 ziDP1493.exe 97 PID 4964 wrote to memory of 3140 4964 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe 98 PID 4964 wrote to memory of 3140 4964 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe 98 PID 4964 wrote to memory of 3140 4964 9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe 98 PID 3140 wrote to memory of 4548 3140 lr420691.exe 117 PID 3140 wrote to memory of 4548 3140 lr420691.exe 117 PID 3140 wrote to memory of 4548 3140 lr420691.exe 117 PID 4548 wrote to memory of 464 4548 oneetx.exe 134 PID 4548 wrote to memory of 464 4548 oneetx.exe 134 PID 4548 wrote to memory of 464 4548 oneetx.exe 134 PID 4548 wrote to memory of 1320 4548 oneetx.exe 148 PID 4548 wrote to memory of 1320 4548 oneetx.exe 148 PID 4548 wrote to memory of 1320 4548 oneetx.exe 148
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe"C:\Users\Admin\AppData\Local\Temp\9aeaf30a686a5cdd4b0acc83076c67acc8f6ca5e1dc36f70e38dabeb15095327.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDP1493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDP1493.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDx5649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDx5649.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it331003.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it331003.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr168604.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr168604.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 14565⤵
- Program crash
PID:3296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp734997.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp734997.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr420691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr420691.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 6963⤵
- Program crash
PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7803⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8563⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8603⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8643⤵
- Program crash
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 9963⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12203⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12363⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 13163⤵
- Program crash
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 6924⤵
- Program crash
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 8484⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 8924⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10524⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10724⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10724⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 11124⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10004⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 7364⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 7324⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 12604⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 10644⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 16124⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 15684⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 16284⤵
- Program crash
PID:3672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7283⤵
- Program crash
PID:868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4500 -ip 45001⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3140 -ip 31401⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3140 -ip 31401⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3140 -ip 31401⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3140 -ip 31401⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3140 -ip 31401⤵PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3140 -ip 31401⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3140 -ip 31401⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3140 -ip 31401⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3140 -ip 31401⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3140 -ip 31401⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4548 -ip 45481⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4548 -ip 45481⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4548 -ip 45481⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4548 -ip 45481⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4548 -ip 45481⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4548 -ip 45481⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4548 -ip 45481⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4548 -ip 45481⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4548 -ip 45481⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4548 -ip 45481⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4548 -ip 45481⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4548 -ip 45481⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4548 -ip 45481⤵PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4548 -ip 45481⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2162⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1744 -ip 17441⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4548 -ip 45481⤵PID:4468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD56300508e058abec227185450c3c9547c
SHA141910122c84dcbdb2efa6c91378ce68731819d07
SHA256ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c
SHA5122216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892
-
Filesize
230KB
MD56300508e058abec227185450c3c9547c
SHA141910122c84dcbdb2efa6c91378ce68731819d07
SHA256ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c
SHA5122216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892
-
Filesize
230KB
MD56300508e058abec227185450c3c9547c
SHA141910122c84dcbdb2efa6c91378ce68731819d07
SHA256ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c
SHA5122216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892
-
Filesize
230KB
MD56300508e058abec227185450c3c9547c
SHA141910122c84dcbdb2efa6c91378ce68731819d07
SHA256ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c
SHA5122216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892
-
Filesize
230KB
MD56300508e058abec227185450c3c9547c
SHA141910122c84dcbdb2efa6c91378ce68731819d07
SHA256ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c
SHA5122216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892
-
Filesize
230KB
MD56300508e058abec227185450c3c9547c
SHA141910122c84dcbdb2efa6c91378ce68731819d07
SHA256ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c
SHA5122216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892
-
Filesize
524KB
MD587361f6bd07f05847d04952163964540
SHA107ffb1a5e92033eebf1703363a65f8fc76ff67f7
SHA2562df6f9ea22696743e60f12c7c7a8e4c16b4940726d0098d20bb2e0725a2a7002
SHA5123a5127dee7fcf1c6f1a49fc5f521e64f8d1c991cce0b78cd422b3bef7d6dc83ed9d830ad0bbdb3b32614467b0e550d7796c986c8b9133ccfb3bccd019aabeca8
-
Filesize
524KB
MD587361f6bd07f05847d04952163964540
SHA107ffb1a5e92033eebf1703363a65f8fc76ff67f7
SHA2562df6f9ea22696743e60f12c7c7a8e4c16b4940726d0098d20bb2e0725a2a7002
SHA5123a5127dee7fcf1c6f1a49fc5f521e64f8d1c991cce0b78cd422b3bef7d6dc83ed9d830ad0bbdb3b32614467b0e550d7796c986c8b9133ccfb3bccd019aabeca8
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
382KB
MD542183588721c9e8dc3f8d0922cbd54ba
SHA1781e310c3937d1da35fae2e3d85d4c70ca6c1dc7
SHA256e639eec2065f69c9c5eb0526b84723189071c797562a0f43545cfd5500868215
SHA5121bf91f94cd552da5a034151933391baf067076fc13d07e3db5cc2d4778fddcfff9fa96ed865b4ab048c7f9ab5a93b881f95434ad1f608d8d0c74dc24eee2cd98
-
Filesize
382KB
MD542183588721c9e8dc3f8d0922cbd54ba
SHA1781e310c3937d1da35fae2e3d85d4c70ca6c1dc7
SHA256e639eec2065f69c9c5eb0526b84723189071c797562a0f43545cfd5500868215
SHA5121bf91f94cd552da5a034151933391baf067076fc13d07e3db5cc2d4778fddcfff9fa96ed865b4ab048c7f9ab5a93b881f95434ad1f608d8d0c74dc24eee2cd98
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
297KB
MD5398d50485bd74d360eaf9e3d0f2409a4
SHA18d03fe3cc16cbb07b3602bbd8d7f34bb501f5dbc
SHA25686c159c2743d5065719d0a109889d34a0cc807f0976ac461480cfd4dfdc62331
SHA512a78f50f7f398ee7545fd33328d895dca0eaa391c854a9065dccce6e5bd8811a64fc3e11ddd29a202328a61e09bb1638aedd62a9d2f90a0bc37bd0e338ea56264
-
Filesize
297KB
MD5398d50485bd74d360eaf9e3d0f2409a4
SHA18d03fe3cc16cbb07b3602bbd8d7f34bb501f5dbc
SHA25686c159c2743d5065719d0a109889d34a0cc807f0976ac461480cfd4dfdc62331
SHA512a78f50f7f398ee7545fd33328d895dca0eaa391c854a9065dccce6e5bd8811a64fc3e11ddd29a202328a61e09bb1638aedd62a9d2f90a0bc37bd0e338ea56264
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5