Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 05:12
Static task
static1
General
-
Target
2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe
-
Size
789KB
-
MD5
a339ee9eafce043680533113daf54fca
-
SHA1
b895064373f65c0f36e73b8d26c5064926be2f9f
-
SHA256
2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d
-
SHA512
c6d87b062769399f3242189193a4f796d0d2ac7883c7896ffc1e19c29eace0d8f77136aad1c6bd6f9f535a87e0fced0e7f7f345afffead6d1424e8006f3dbade
-
SSDEEP
12288:XMrYy90YLTTbFd3EGjfYlV394jsKtpE1xH+immmJhOeBmZREtV6fYVrVg4MHXSG1:7ypLTTQmYlPpxHcmKO1DEmfYVvwSe
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it502602.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it502602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it502602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it502602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it502602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it502602.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3732-161-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-162-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-164-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-166-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-168-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-170-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-174-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-172-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-181-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-186-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-188-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-184-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-192-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-194-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-190-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-177-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-202-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-200-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-198-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-196-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-204-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-206-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-208-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-210-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-212-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-220-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-226-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-224-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-222-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-218-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-228-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-216-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/3732-214-0x0000000002740000-0x000000000277F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr720523.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 5108 zink5186.exe 4432 zixl1263.exe 4876 it502602.exe 3732 jr694348.exe 2092 kp058788.exe 4704 lr720523.exe 3916 oneetx.exe 2588 oneetx.exe 2136 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 8 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it502602.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zixl1263.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zink5186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zink5186.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zixl1263.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 4924 3732 WerFault.exe 90 1340 4704 WerFault.exe 98 460 4704 WerFault.exe 98 4448 4704 WerFault.exe 98 260 4704 WerFault.exe 98 2136 4704 WerFault.exe 98 4760 4704 WerFault.exe 98 3336 4704 WerFault.exe 98 2860 4704 WerFault.exe 98 900 4704 WerFault.exe 98 2084 4704 WerFault.exe 98 1680 3916 WerFault.exe 117 3696 3916 WerFault.exe 117 4372 3916 WerFault.exe 117 3832 3916 WerFault.exe 117 4972 3916 WerFault.exe 117 1696 3916 WerFault.exe 117 1928 3916 WerFault.exe 117 1208 3916 WerFault.exe 117 4484 3916 WerFault.exe 117 5004 3916 WerFault.exe 117 1984 3916 WerFault.exe 117 3732 3916 WerFault.exe 117 4600 2588 WerFault.exe 146 1356 3916 WerFault.exe 117 2164 3916 WerFault.exe 117 4144 3916 WerFault.exe 117 724 2136 WerFault.exe 156 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4876 it502602.exe 4876 it502602.exe 3732 jr694348.exe 3732 jr694348.exe 2092 kp058788.exe 2092 kp058788.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4876 it502602.exe Token: SeDebugPrivilege 3732 jr694348.exe Token: SeDebugPrivilege 2092 kp058788.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4704 lr720523.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3524 wrote to memory of 5108 3524 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe 83 PID 3524 wrote to memory of 5108 3524 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe 83 PID 3524 wrote to memory of 5108 3524 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe 83 PID 5108 wrote to memory of 4432 5108 zink5186.exe 84 PID 5108 wrote to memory of 4432 5108 zink5186.exe 84 PID 5108 wrote to memory of 4432 5108 zink5186.exe 84 PID 4432 wrote to memory of 4876 4432 zixl1263.exe 85 PID 4432 wrote to memory of 4876 4432 zixl1263.exe 85 PID 4432 wrote to memory of 3732 4432 zixl1263.exe 90 PID 4432 wrote to memory of 3732 4432 zixl1263.exe 90 PID 4432 wrote to memory of 3732 4432 zixl1263.exe 90 PID 5108 wrote to memory of 2092 5108 zink5186.exe 96 PID 5108 wrote to memory of 2092 5108 zink5186.exe 96 PID 5108 wrote to memory of 2092 5108 zink5186.exe 96 PID 3524 wrote to memory of 4704 3524 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe 98 PID 3524 wrote to memory of 4704 3524 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe 98 PID 3524 wrote to memory of 4704 3524 2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe 98 PID 4704 wrote to memory of 3916 4704 lr720523.exe 117 PID 4704 wrote to memory of 3916 4704 lr720523.exe 117 PID 4704 wrote to memory of 3916 4704 lr720523.exe 117 PID 3916 wrote to memory of 3788 3916 oneetx.exe 134 PID 3916 wrote to memory of 3788 3916 oneetx.exe 134 PID 3916 wrote to memory of 3788 3916 oneetx.exe 134 PID 3916 wrote to memory of 8 3916 oneetx.exe 151 PID 3916 wrote to memory of 8 3916 oneetx.exe 151 PID 3916 wrote to memory of 8 3916 oneetx.exe 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe"C:\Users\Admin\AppData\Local\Temp\2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zink5186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zink5186.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixl1263.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixl1263.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it502602.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it502602.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr694348.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr694348.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 11485⤵
- Program crash
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp058788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp058788.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr720523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr720523.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 6963⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 7723⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 8563⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9683⤵
- Program crash
PID:260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9763⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9763⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 12083⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 12443⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 13203⤵
- Program crash
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 6924⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 8364⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 8484⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10524⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10924⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10924⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 11124⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 9924⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 9244⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 12724⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 12964⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 11164⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 16124⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 11164⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 16284⤵
- Program crash
PID:4144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 8643⤵
- Program crash
PID:2084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3732 -ip 37321⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4704 -ip 47041⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4704 -ip 47041⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4704 -ip 47041⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4704 -ip 47041⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4704 -ip 47041⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4704 -ip 47041⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4704 -ip 47041⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4704 -ip 47041⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4704 -ip 47041⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4704 -ip 47041⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3916 -ip 39161⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3916 -ip 39161⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3916 -ip 39161⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3916 -ip 39161⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3916 -ip 39161⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3916 -ip 39161⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3916 -ip 39161⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3916 -ip 39161⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3916 -ip 39161⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3916 -ip 39161⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3916 -ip 39161⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3916 -ip 39161⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 3162⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2588 -ip 25881⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3916 -ip 39161⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3916 -ip 39161⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3916 -ip 39161⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 3162⤵
- Program crash
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2136 -ip 21361⤵PID:620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
230KB
MD5a7caa96759620dc55b4a298fe90efeb6
SHA1480d06b4464cd8f4ffac02d582d11ccc474dd38e
SHA25694414772252da78304fb7834e79efe93179f5e62a9293b8c350ea3dd9d1d5575
SHA51259faeb9232b72e324ef0a8ca25f2c54f742bf9238f00688ab78ce4cf67c2117aada695030300ca5d7a2b1ff694248e6c2e534da4a71147b3002c337aed9b574d
-
Filesize
524KB
MD50271cf2e74ae8a9ac2262a3b14fd90c6
SHA16047475bcc1d8583ed3f2ee4cc16841fa2a293c9
SHA2569a374ebf1f08cce774e8dcfed8ffb82f4568a7f6839916b12ca128b7f2902d02
SHA5127a667e460384a61591ea2a719fd54c70cb4a94dfa88ae34190d4b4103e4bd2a713cda5d4e0f03ea54461051f2aeb1dcd32014904d042106bfeeb8dca80695e88
-
Filesize
524KB
MD50271cf2e74ae8a9ac2262a3b14fd90c6
SHA16047475bcc1d8583ed3f2ee4cc16841fa2a293c9
SHA2569a374ebf1f08cce774e8dcfed8ffb82f4568a7f6839916b12ca128b7f2902d02
SHA5127a667e460384a61591ea2a719fd54c70cb4a94dfa88ae34190d4b4103e4bd2a713cda5d4e0f03ea54461051f2aeb1dcd32014904d042106bfeeb8dca80695e88
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
382KB
MD5d26d516c721b6bbb2ea76fce3b71e2a6
SHA119ebcfb65e35439ac13a21a8ebfc7e92c8b9eba9
SHA25600e5cfbe239f67bfeda00cf42545a154746d49d120fa39f6e299a088ef83a6e0
SHA51222c97cd8c120c9c4f0a0b872e119e1dc3cef6944d9fbb2444fe0ce0bbaceacfa8eec2d54848092c644e83cc1e7c560278cdc04823d9f030c75c2d4467dbb100a
-
Filesize
382KB
MD5d26d516c721b6bbb2ea76fce3b71e2a6
SHA119ebcfb65e35439ac13a21a8ebfc7e92c8b9eba9
SHA25600e5cfbe239f67bfeda00cf42545a154746d49d120fa39f6e299a088ef83a6e0
SHA51222c97cd8c120c9c4f0a0b872e119e1dc3cef6944d9fbb2444fe0ce0bbaceacfa8eec2d54848092c644e83cc1e7c560278cdc04823d9f030c75c2d4467dbb100a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
297KB
MD5b307cbc470f229fa5868b34eec702cf1
SHA167112832683a5992fc8b13e8a9f37a84832f9750
SHA256d5482d91b40438878c5dc50cac85fc9c3d0b634e5a2e28d3ef344184ff92066a
SHA512f96370a08aaecc1c6fdde3616f7b4cf981f4b4a1c69374640ba3970c30d953e378eb51023af1c04c23592228b5d87c0342d7cc1a7c1db2a144263ad4773adf1a
-
Filesize
297KB
MD5b307cbc470f229fa5868b34eec702cf1
SHA167112832683a5992fc8b13e8a9f37a84832f9750
SHA256d5482d91b40438878c5dc50cac85fc9c3d0b634e5a2e28d3ef344184ff92066a
SHA512f96370a08aaecc1c6fdde3616f7b4cf981f4b4a1c69374640ba3970c30d953e378eb51023af1c04c23592228b5d87c0342d7cc1a7c1db2a144263ad4773adf1a
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5