Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2023, 05:40
Static task
static1
General
-
Target
23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe
-
Size
924KB
-
MD5
9030448d7fb8e9ba842f66041b8ff154
-
SHA1
f991c0a82d3e8e0e8544e1e6f04bb88846207f0f
-
SHA256
23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41
-
SHA512
1d5b50299b75d2d946abdb5cb9d1461557dd80603496d2e2d8055ef55b52c3bb2ccd2aec24c606bc82f28d965dfc7df0c967cad96592647991a41405e01fa760
-
SSDEEP
24576:DyAMY2Wprp2jSWT4f9GyO24oa4kUhzW6TF:WVtjSLzOvoz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr704243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr704243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr704243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr704243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr704243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr704243.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3964-197-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-198-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-200-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-202-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-204-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-206-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-208-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-210-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-212-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-214-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-216-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-218-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-220-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-222-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-224-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-226-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-228-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-230-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/3964-1115-0x0000000004C80000-0x0000000004C90000-memory.dmp family_redline behavioral1/memory/3964-1117-0x0000000004C80000-0x0000000004C90000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si108273.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 3816 un120283.exe 4784 un939296.exe 3696 pr704243.exe 3964 qu080672.exe 3828 rk211870.exe 1864 si108273.exe 1148 oneetx.exe 3812 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1580 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr704243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr704243.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un120283.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un120283.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un939296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un939296.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 1124 3696 WerFault.exe 87 4216 3964 WerFault.exe 93 2684 1864 WerFault.exe 101 1972 1864 WerFault.exe 101 4472 1864 WerFault.exe 101 1936 1864 WerFault.exe 101 4064 1864 WerFault.exe 101 4476 1864 WerFault.exe 101 3452 1864 WerFault.exe 101 4960 1864 WerFault.exe 101 4760 1864 WerFault.exe 101 1792 1864 WerFault.exe 101 2872 1148 WerFault.exe 121 4324 1148 WerFault.exe 121 388 1148 WerFault.exe 121 4220 1148 WerFault.exe 121 1396 1148 WerFault.exe 121 2776 1148 WerFault.exe 121 4516 1148 WerFault.exe 121 488 1148 WerFault.exe 121 4948 1148 WerFault.exe 121 3032 1148 WerFault.exe 121 1740 1148 WerFault.exe 121 3840 1148 WerFault.exe 121 4972 1148 WerFault.exe 121 1124 1148 WerFault.exe 121 4156 1148 WerFault.exe 121 4064 3812 WerFault.exe 157 2780 1148 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3696 pr704243.exe 3696 pr704243.exe 3964 qu080672.exe 3964 qu080672.exe 3828 rk211870.exe 3828 rk211870.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3696 pr704243.exe Token: SeDebugPrivilege 3964 qu080672.exe Token: SeDebugPrivilege 3828 rk211870.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 si108273.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3816 2980 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe 85 PID 2980 wrote to memory of 3816 2980 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe 85 PID 2980 wrote to memory of 3816 2980 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe 85 PID 3816 wrote to memory of 4784 3816 un120283.exe 86 PID 3816 wrote to memory of 4784 3816 un120283.exe 86 PID 3816 wrote to memory of 4784 3816 un120283.exe 86 PID 4784 wrote to memory of 3696 4784 un939296.exe 87 PID 4784 wrote to memory of 3696 4784 un939296.exe 87 PID 4784 wrote to memory of 3696 4784 un939296.exe 87 PID 4784 wrote to memory of 3964 4784 un939296.exe 93 PID 4784 wrote to memory of 3964 4784 un939296.exe 93 PID 4784 wrote to memory of 3964 4784 un939296.exe 93 PID 3816 wrote to memory of 3828 3816 un120283.exe 97 PID 3816 wrote to memory of 3828 3816 un120283.exe 97 PID 3816 wrote to memory of 3828 3816 un120283.exe 97 PID 2980 wrote to memory of 1864 2980 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe 101 PID 2980 wrote to memory of 1864 2980 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe 101 PID 2980 wrote to memory of 1864 2980 23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe 101 PID 1864 wrote to memory of 1148 1864 si108273.exe 121 PID 1864 wrote to memory of 1148 1864 si108273.exe 121 PID 1864 wrote to memory of 1148 1864 si108273.exe 121 PID 1148 wrote to memory of 4700 1148 oneetx.exe 138 PID 1148 wrote to memory of 4700 1148 oneetx.exe 138 PID 1148 wrote to memory of 4700 1148 oneetx.exe 138 PID 1148 wrote to memory of 1580 1148 oneetx.exe 154 PID 1148 wrote to memory of 1580 1148 oneetx.exe 154 PID 1148 wrote to memory of 1580 1148 oneetx.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe"C:\Users\Admin\AppData\Local\Temp\23b5a2544f9bf2a330c2afd6753b53b99bfce99b6a69c27ed3ad17ca246dcf41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un939296.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un939296.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr704243.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr704243.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 10845⤵
- Program crash
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu080672.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu080672.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 16325⤵
- Program crash
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk211870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk211870.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108273.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si108273.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 6963⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 7643⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 8563⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 9683⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 9763⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 9763⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 12043⤵
- Program crash
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 12243⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 13123⤵
- Program crash
PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6924⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 8844⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 8924⤵
- Program crash
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 10964⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 9524⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 9524⤵
- Program crash
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 11284⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 8964⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7484⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 13084⤵
- Program crash
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 13164⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 14604⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 11724⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 16284⤵
- Program crash
PID:1124
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 14644⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 16444⤵
- Program crash
PID:2780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 14043⤵
- Program crash
PID:1792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3696 -ip 36961⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3964 -ip 39641⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1864 -ip 18641⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1864 -ip 18641⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1864 -ip 18641⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1864 -ip 18641⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1864 -ip 18641⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1864 -ip 18641⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1864 -ip 18641⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1864 -ip 18641⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1864 -ip 18641⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1864 -ip 18641⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1148 -ip 11481⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1148 -ip 11481⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1148 -ip 11481⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1148 -ip 11481⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1148 -ip 11481⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1148 -ip 11481⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1148 -ip 11481⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1148 -ip 11481⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1148 -ip 11481⤵PID:3212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1148 -ip 11481⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1148 -ip 11481⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1148 -ip 11481⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1148 -ip 11481⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1148 -ip 11481⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1148 -ip 11481⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 3122⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3812 -ip 38121⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1148 -ip 11481⤵PID:4980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
659KB
MD53eb176b2847b52079fe88793b8eb45e3
SHA16c7e36ce12db3b672248c36449c9c14e1fb4696d
SHA256ded69a5c9bafc81f8582d1041c68f943864f270e582b9b87db2fb85983cfe0c3
SHA512fde3579cde1d025b941d5ebaee5465f550786e9e223bb216a11d960b81cd82c66b068bdacac0dffde0cd81d76b25661bd7ebc9c61307a96f0733f37df22d4e0e
-
Filesize
659KB
MD53eb176b2847b52079fe88793b8eb45e3
SHA16c7e36ce12db3b672248c36449c9c14e1fb4696d
SHA256ded69a5c9bafc81f8582d1041c68f943864f270e582b9b87db2fb85983cfe0c3
SHA512fde3579cde1d025b941d5ebaee5465f550786e9e223bb216a11d960b81cd82c66b068bdacac0dffde0cd81d76b25661bd7ebc9c61307a96f0733f37df22d4e0e
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
517KB
MD561a9eae191280871d232d32f944ae40f
SHA149dd8c10324762aa1592dcca81f395ac4fd99d8b
SHA256488936be3fa85083992c3e73a8ea174918596d9d25e6b7848799236e97065444
SHA512d81fb54264aec921204e1a842c7b17151b6e1f4343e75910c259c4ec31e142b9836fce8df55e90bf4f6d97b4d60fa753c47efaf72c164f44b742f39ce1f3d270
-
Filesize
517KB
MD561a9eae191280871d232d32f944ae40f
SHA149dd8c10324762aa1592dcca81f395ac4fd99d8b
SHA256488936be3fa85083992c3e73a8ea174918596d9d25e6b7848799236e97065444
SHA512d81fb54264aec921204e1a842c7b17151b6e1f4343e75910c259c4ec31e142b9836fce8df55e90bf4f6d97b4d60fa753c47efaf72c164f44b742f39ce1f3d270
-
Filesize
239KB
MD517e70cac140e80a806b8a5e2debd4fb0
SHA13adccbca2dd34d25c133c27fddfa872af52a71ed
SHA256bda9cd190cbeb499f9622c3921dd22c78f4cf4c4bf3f97e7d31977a8786a19e0
SHA5127da73d39906a033fa6c78a0dbc7c6d50bcbe4ae9d1d447cec72a56ca057fb97388a80bbe3398daed7f5e71b9c199e32dee3c201c586a7883810c558fc055009d
-
Filesize
239KB
MD517e70cac140e80a806b8a5e2debd4fb0
SHA13adccbca2dd34d25c133c27fddfa872af52a71ed
SHA256bda9cd190cbeb499f9622c3921dd22c78f4cf4c4bf3f97e7d31977a8786a19e0
SHA5127da73d39906a033fa6c78a0dbc7c6d50bcbe4ae9d1d447cec72a56ca057fb97388a80bbe3398daed7f5e71b9c199e32dee3c201c586a7883810c558fc055009d
-
Filesize
298KB
MD50be847db62b70376910481b6ca26f297
SHA126ef308e67b56731c132a27865fd91667d342907
SHA2568118649360e38a59de9e3f22396dccd3cd682b432fc7773ba07f61c2b115e895
SHA5126ef880fe3625b5a8f8d08ff729074a4622d483cbce3efa9054e529a6153dea237db185e2224a994a1002d89bfb666c8a96466e3676e76d03d378758df6971461
-
Filesize
298KB
MD50be847db62b70376910481b6ca26f297
SHA126ef308e67b56731c132a27865fd91667d342907
SHA2568118649360e38a59de9e3f22396dccd3cd682b432fc7773ba07f61c2b115e895
SHA5126ef880fe3625b5a8f8d08ff729074a4622d483cbce3efa9054e529a6153dea237db185e2224a994a1002d89bfb666c8a96466e3676e76d03d378758df6971461
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5