Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 05:12
Static task
static1
General
-
Target
38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe
-
Size
1.0MB
-
MD5
a9bf97ca3429bffcd3df83630bf2a3db
-
SHA1
75f275d64b2849689bca681a65d38c0e5a7007f5
-
SHA256
38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980
-
SHA512
7beea7a1d8ca41cdd041b3576451ecc37fb2c9d38516665901aea067026cf56632adaddf01c0c91e0e87d320a4cc15c47b5424af1b8b0f120af5b71c8d81f322
-
SSDEEP
24576:byfXKQgqLoNDMGcKkQAoBpFCv+MTsUZuffFVgPhbF:OfXKQgqLTbolCWisU4Nq
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az628816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az628816.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor4683.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az628816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az628816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az628816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az628816.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor4683.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/3424-235-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-240-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-236-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-241-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline behavioral1/memory/3424-243-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-245-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-247-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-249-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-251-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-253-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-255-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-257-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-259-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-261-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-263-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-265-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3424-267-0x0000000002530000-0x000000000256F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation bu088656.exe -
Executes dropped EXE 11 IoCs
pid Process 2320 kina9741.exe 4840 kina6824.exe 4292 kina0994.exe 2684 az628816.exe 1472 bu088656.exe 3820 oneetx.exe 880 cor4683.exe 2104 oneetx.exe 3424 dbL51s91.exe 2392 ge555530.exe 1336 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az628816.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor4683.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina9741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina9741.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina6824.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina6824.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina0994.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina0994.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 2744 1472 WerFault.exe 87 1580 1472 WerFault.exe 87 2636 1472 WerFault.exe 87 208 1472 WerFault.exe 87 4868 1472 WerFault.exe 87 3608 1472 WerFault.exe 87 3896 1472 WerFault.exe 87 1696 1472 WerFault.exe 87 704 1472 WerFault.exe 87 4244 1472 WerFault.exe 87 2392 3820 WerFault.exe 107 3068 3820 WerFault.exe 107 4400 3820 WerFault.exe 107 4452 3820 WerFault.exe 107 928 3820 WerFault.exe 107 2660 3820 WerFault.exe 107 4424 3820 WerFault.exe 107 3728 3820 WerFault.exe 107 2864 3820 WerFault.exe 107 4848 3820 WerFault.exe 107 4304 3820 WerFault.exe 107 736 3820 WerFault.exe 107 4300 880 WerFault.exe 112 3028 2104 WerFault.exe 137 1340 3424 WerFault.exe 140 3412 3820 WerFault.exe 107 4224 3820 WerFault.exe 107 2664 3820 WerFault.exe 107 1072 1336 WerFault.exe 153 1732 3820 WerFault.exe 107 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2684 az628816.exe 2684 az628816.exe 880 cor4683.exe 880 cor4683.exe 3424 dbL51s91.exe 3424 dbL51s91.exe 2392 ge555530.exe 2392 ge555530.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2684 az628816.exe Token: SeDebugPrivilege 880 cor4683.exe Token: SeDebugPrivilege 3424 dbL51s91.exe Token: SeDebugPrivilege 2392 ge555530.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1472 bu088656.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 896 wrote to memory of 2320 896 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe 83 PID 896 wrote to memory of 2320 896 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe 83 PID 896 wrote to memory of 2320 896 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe 83 PID 2320 wrote to memory of 4840 2320 kina9741.exe 84 PID 2320 wrote to memory of 4840 2320 kina9741.exe 84 PID 2320 wrote to memory of 4840 2320 kina9741.exe 84 PID 4840 wrote to memory of 4292 4840 kina6824.exe 85 PID 4840 wrote to memory of 4292 4840 kina6824.exe 85 PID 4840 wrote to memory of 4292 4840 kina6824.exe 85 PID 4292 wrote to memory of 2684 4292 kina0994.exe 86 PID 4292 wrote to memory of 2684 4292 kina0994.exe 86 PID 4292 wrote to memory of 1472 4292 kina0994.exe 87 PID 4292 wrote to memory of 1472 4292 kina0994.exe 87 PID 4292 wrote to memory of 1472 4292 kina0994.exe 87 PID 1472 wrote to memory of 3820 1472 bu088656.exe 107 PID 1472 wrote to memory of 3820 1472 bu088656.exe 107 PID 1472 wrote to memory of 3820 1472 bu088656.exe 107 PID 4840 wrote to memory of 880 4840 kina6824.exe 112 PID 4840 wrote to memory of 880 4840 kina6824.exe 112 PID 4840 wrote to memory of 880 4840 kina6824.exe 112 PID 3820 wrote to memory of 456 3820 oneetx.exe 127 PID 3820 wrote to memory of 456 3820 oneetx.exe 127 PID 3820 wrote to memory of 456 3820 oneetx.exe 127 PID 2320 wrote to memory of 3424 2320 kina9741.exe 140 PID 2320 wrote to memory of 3424 2320 kina9741.exe 140 PID 2320 wrote to memory of 3424 2320 kina9741.exe 140 PID 896 wrote to memory of 2392 896 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe 145 PID 896 wrote to memory of 2392 896 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe 145 PID 896 wrote to memory of 2392 896 38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe 145 PID 3820 wrote to memory of 2160 3820 oneetx.exe 150 PID 3820 wrote to memory of 2160 3820 oneetx.exe 150 PID 3820 wrote to memory of 2160 3820 oneetx.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe"C:\Users\Admin\AppData\Local\Temp\38171da5df6c35748ea394a698e024f7f85f12005cf5fc0e86f1c005209bd980.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9741.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9741.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6824.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0994.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0994.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az628816.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az628816.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu088656.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu088656.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 6966⤵
- Program crash
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 7806⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8566⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 9686⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 9886⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 9886⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 12046⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 12246⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 13206⤵
- Program crash
PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 6967⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 10047⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 10127⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 10887⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 11127⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 10807⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 11127⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 11087⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 9927⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 12607⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 7527⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 9887⤵
- Program crash
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 11207⤵
- Program crash
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 16287⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 15887⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 16447⤵
- Program crash
PID:1732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 13646⤵
- Program crash
PID:4244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4683.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4683.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 10805⤵
- Program crash
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbL51s91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbL51s91.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 13524⤵
- Program crash
PID:1340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge555530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge555530.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1472 -ip 14721⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1472 -ip 14721⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1472 -ip 14721⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1472 -ip 14721⤵PID:100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1472 -ip 14721⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1472 -ip 14721⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1472 -ip 14721⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1472 -ip 14721⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1472 -ip 14721⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1472 -ip 14721⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3820 -ip 38201⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3820 -ip 38201⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3820 -ip 38201⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3820 -ip 38201⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3820 -ip 38201⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3820 -ip 38201⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3820 -ip 38201⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3820 -ip 38201⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3820 -ip 38201⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3820 -ip 38201⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3820 -ip 38201⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3820 -ip 38201⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 3122⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 880 -ip 8801⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2104 -ip 21041⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3424 -ip 34241⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3820 -ip 38201⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3820 -ip 38201⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3820 -ip 38201⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 3202⤵
- Program crash
PID:1072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1336 -ip 13361⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3820 -ip 38201⤵PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
175KB
MD547b52e7049909e34f093a814f4d0a4aa
SHA1af61fcd6bba0cba8fd43d5082cadd754a58db5c1
SHA256ab6ea41c93266c2e20a168fdc19f03efb8d2296e268868b2898704023318e02d
SHA5124a6315154352c8b16a2fecc70db4ad5a48e6ed9bbc16d7e030c2bb87a9a7314e6c131fb232066267fcb8122c96b8fbb3c639569438c75fb42268c02a199ded43
-
Filesize
175KB
MD547b52e7049909e34f093a814f4d0a4aa
SHA1af61fcd6bba0cba8fd43d5082cadd754a58db5c1
SHA256ab6ea41c93266c2e20a168fdc19f03efb8d2296e268868b2898704023318e02d
SHA5124a6315154352c8b16a2fecc70db4ad5a48e6ed9bbc16d7e030c2bb87a9a7314e6c131fb232066267fcb8122c96b8fbb3c639569438c75fb42268c02a199ded43
-
Filesize
919KB
MD5fcdb30b2cbbc75f31c8d7c3f7a5e2b0e
SHA11ad3f8dc5f13c35265d26df577d03c9e6c541ec7
SHA256c45a8e9898ad5d72d69746550b6edbd994ca8dea1fd8ec3beb5327add39b0e4e
SHA5127322d86713bc81e419e623f081067c845803778ac58cfc210ec651dac86acd481a8c0deca72a586f27938d9740a095f21f277f970e4cfcc160f308d6bc477e4f
-
Filesize
919KB
MD5fcdb30b2cbbc75f31c8d7c3f7a5e2b0e
SHA11ad3f8dc5f13c35265d26df577d03c9e6c541ec7
SHA256c45a8e9898ad5d72d69746550b6edbd994ca8dea1fd8ec3beb5327add39b0e4e
SHA5127322d86713bc81e419e623f081067c845803778ac58cfc210ec651dac86acd481a8c0deca72a586f27938d9740a095f21f277f970e4cfcc160f308d6bc477e4f
-
Filesize
297KB
MD591cca8438f0f59e00b3ceaf34f66426d
SHA14307a1004b42773117bc31df5526025a1b39ce1a
SHA256451b44ef19d90478c2a76688982d4bf5e652b2a252d457cea6fb48e7e4197c8a
SHA51247fee0624dc64ee0f83a1b230060ac8d03bda10edc0d102f784cb59f9464ddc96a466f83ea369c7b84a61262798fd47777a0ab693c42c057faa47a93a753dd0a
-
Filesize
297KB
MD591cca8438f0f59e00b3ceaf34f66426d
SHA14307a1004b42773117bc31df5526025a1b39ce1a
SHA256451b44ef19d90478c2a76688982d4bf5e652b2a252d457cea6fb48e7e4197c8a
SHA51247fee0624dc64ee0f83a1b230060ac8d03bda10edc0d102f784cb59f9464ddc96a466f83ea369c7b84a61262798fd47777a0ab693c42c057faa47a93a753dd0a
-
Filesize
588KB
MD5ea58800ce16c3ec230f1e2defefba425
SHA19385b8c66ec8e2a65f209ce64fc5c115722a71bc
SHA2566fe5b5881e72160c8ac17b1c00a5aa8285d89e07425b3c8cc58eaab7bd09f2b5
SHA512bfeda5e3e1a6968e191db9b1bd6142d6270be4f4c0ab6c3a90c78b405d75add2d8e259ccc972195503fdd1f105548af925e5e39c454fa3e1d5c97f21d4752f48
-
Filesize
588KB
MD5ea58800ce16c3ec230f1e2defefba425
SHA19385b8c66ec8e2a65f209ce64fc5c115722a71bc
SHA2566fe5b5881e72160c8ac17b1c00a5aa8285d89e07425b3c8cc58eaab7bd09f2b5
SHA512bfeda5e3e1a6968e191db9b1bd6142d6270be4f4c0ab6c3a90c78b405d75add2d8e259ccc972195503fdd1f105548af925e5e39c454fa3e1d5c97f21d4752f48
-
Filesize
238KB
MD5886b7cd62fe3ba4a65b95270676807fb
SHA1a2a7c5733e930750e84f9fbf1bd183ded53c3ba2
SHA256e1f7d92c192ceab5df1764827aa8035efb9894ea7fddb328addbcf21048e3059
SHA512a1c36e6ad42a1806eb8593d4a3f8507a3011e147d4acb93d6faf7d4da1c07e16c85800ffc6851696c57507e391be891f6fba4862bf69bf955603154c07edfb3d
-
Filesize
238KB
MD5886b7cd62fe3ba4a65b95270676807fb
SHA1a2a7c5733e930750e84f9fbf1bd183ded53c3ba2
SHA256e1f7d92c192ceab5df1764827aa8035efb9894ea7fddb328addbcf21048e3059
SHA512a1c36e6ad42a1806eb8593d4a3f8507a3011e147d4acb93d6faf7d4da1c07e16c85800ffc6851696c57507e391be891f6fba4862bf69bf955603154c07edfb3d
-
Filesize
315KB
MD561ddd92753660ce28295dc132a8ecfda
SHA108725878d5c7c2e1fcb2ca1bd80eb5c55208cf23
SHA2565480d12d3a9ca534d7d1fa3d65d944c23f967abcda24ece0ce41248c7e9ee2b2
SHA5122ad9c139cfec8db5d55f95f391a7a0d656684a4a83daf72fb1d8f217fe57477427bd0328d1d2735739ddca0de29032e679cfd382ac261edf1f6f1a0ae4cf0c7d
-
Filesize
315KB
MD561ddd92753660ce28295dc132a8ecfda
SHA108725878d5c7c2e1fcb2ca1bd80eb5c55208cf23
SHA2565480d12d3a9ca534d7d1fa3d65d944c23f967abcda24ece0ce41248c7e9ee2b2
SHA5122ad9c139cfec8db5d55f95f391a7a0d656684a4a83daf72fb1d8f217fe57477427bd0328d1d2735739ddca0de29032e679cfd382ac261edf1f6f1a0ae4cf0c7d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5