Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2023, 05:40
Static task
static1
General
-
Target
096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe
-
Size
789KB
-
MD5
06216140ae27e4e695cf17c4d45c4d26
-
SHA1
5a3131277ddaf39636f2248768cfc84a017e37e1
-
SHA256
096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10
-
SHA512
e4f6559eb9698175bc4e67abdd6bfa7973d87dc206992196ba3b778cb7ec68f23217b6f4c3b07da067d90cd3dd54450a86bafde651c9a361185e94ef7f1e9cbf
-
SSDEEP
24576:2yshDiAhon1tnqJ6MAhxRgupFKDhP7CA:FshLho1J66MM0qFKDhPe
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it435865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it435865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it435865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it435865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it435865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it435865.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4432-165-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-168-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-166-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-170-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-172-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-174-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-176-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-178-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-180-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-184-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-186-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-188-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-190-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-226-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/4432-228-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr486792.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 1528 ziYy0203.exe 4892 ziaW7721.exe 4828 it435865.exe 4432 jr081248.exe 1536 kp138290.exe 2424 lr486792.exe 4756 oneetx.exe 3136 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 808 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it435865.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYy0203.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziaW7721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziaW7721.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYy0203.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 4900 4432 WerFault.exe 90 1760 2424 WerFault.exe 95 2092 2424 WerFault.exe 95 1756 2424 WerFault.exe 95 4276 2424 WerFault.exe 95 2192 2424 WerFault.exe 95 4308 2424 WerFault.exe 95 4152 2424 WerFault.exe 95 856 2424 WerFault.exe 95 1004 2424 WerFault.exe 95 212 2424 WerFault.exe 95 320 4756 WerFault.exe 114 1868 4756 WerFault.exe 114 3444 4756 WerFault.exe 114 1804 4756 WerFault.exe 114 3284 4756 WerFault.exe 114 3804 4756 WerFault.exe 114 1584 4756 WerFault.exe 114 3572 4756 WerFault.exe 114 2340 4756 WerFault.exe 114 3004 4756 WerFault.exe 114 3836 4756 WerFault.exe 114 4864 4756 WerFault.exe 114 4732 4756 WerFault.exe 114 3812 3136 WerFault.exe 145 4284 4756 WerFault.exe 114 4012 4756 WerFault.exe 114 1776 4756 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4828 it435865.exe 4828 it435865.exe 4432 jr081248.exe 4432 jr081248.exe 1536 kp138290.exe 1536 kp138290.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4828 it435865.exe Token: SeDebugPrivilege 4432 jr081248.exe Token: SeDebugPrivilege 1536 kp138290.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 lr486792.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1528 4444 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe 85 PID 4444 wrote to memory of 1528 4444 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe 85 PID 4444 wrote to memory of 1528 4444 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe 85 PID 1528 wrote to memory of 4892 1528 ziYy0203.exe 86 PID 1528 wrote to memory of 4892 1528 ziYy0203.exe 86 PID 1528 wrote to memory of 4892 1528 ziYy0203.exe 86 PID 4892 wrote to memory of 4828 4892 ziaW7721.exe 87 PID 4892 wrote to memory of 4828 4892 ziaW7721.exe 87 PID 4892 wrote to memory of 4432 4892 ziaW7721.exe 90 PID 4892 wrote to memory of 4432 4892 ziaW7721.exe 90 PID 4892 wrote to memory of 4432 4892 ziaW7721.exe 90 PID 1528 wrote to memory of 1536 1528 ziYy0203.exe 94 PID 1528 wrote to memory of 1536 1528 ziYy0203.exe 94 PID 1528 wrote to memory of 1536 1528 ziYy0203.exe 94 PID 4444 wrote to memory of 2424 4444 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe 95 PID 4444 wrote to memory of 2424 4444 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe 95 PID 4444 wrote to memory of 2424 4444 096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe 95 PID 2424 wrote to memory of 4756 2424 lr486792.exe 114 PID 2424 wrote to memory of 4756 2424 lr486792.exe 114 PID 2424 wrote to memory of 4756 2424 lr486792.exe 114 PID 4756 wrote to memory of 3508 4756 oneetx.exe 133 PID 4756 wrote to memory of 3508 4756 oneetx.exe 133 PID 4756 wrote to memory of 3508 4756 oneetx.exe 133 PID 4756 wrote to memory of 808 4756 oneetx.exe 150 PID 4756 wrote to memory of 808 4756 oneetx.exe 150 PID 4756 wrote to memory of 808 4756 oneetx.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe"C:\Users\Admin\AppData\Local\Temp\096dc7798537708aa24c9b1e48e6acd091e6031ececb0450290e935c0d45aa10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYy0203.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYy0203.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziaW7721.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziaW7721.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it435865.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it435865.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr081248.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr081248.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 19925⤵
- Program crash
PID:4900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp138290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp138290.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr486792.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr486792.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 6963⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 7683⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 7963⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 9723⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 9483⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 9483⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 12163⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 12323⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 13123⤵
- Program crash
PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 6924⤵
- Program crash
PID:320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 9444⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10924⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 11004⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 11284⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 11404⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 11884⤵
- Program crash
PID:1584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 9564⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10124⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 8724⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 8844⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 7764⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 12044⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 16244⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 15724⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 16404⤵
- Program crash
PID:1776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 13683⤵
- Program crash
PID:212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4432 -ip 44321⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2424 -ip 24241⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2424 -ip 24241⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2424 -ip 24241⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2424 -ip 24241⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2424 -ip 24241⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2424 -ip 24241⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2424 -ip 24241⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2424 -ip 24241⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2424 -ip 24241⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2424 -ip 24241⤵PID:668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4756 -ip 47561⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4756 -ip 47561⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4756 -ip 47561⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4756 -ip 47561⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4756 -ip 47561⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4756 -ip 47561⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4756 -ip 47561⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4756 -ip 47561⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4756 -ip 47561⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4756 -ip 47561⤵PID:2516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4756 -ip 47561⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4756 -ip 47561⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4756 -ip 47561⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 3162⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3136 -ip 31361⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4756 -ip 47561⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4756 -ip 47561⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4756 -ip 47561⤵PID:2960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
523KB
MD5068f11aefd236fa31434435bbe853434
SHA1da529c356611b569819b391392505c37c85ff616
SHA256b61eaf8b769515418b7e6f8fea17544c7f561de634d541b93e54bd4d0d7105c7
SHA51258c2d6e3269527f0102e7e8633f36f0cb88e1ac01635e75c11583c772021738d8c437f20637291c12fdad6e21228939183ec280c16cadef41cd24d67808c532c
-
Filesize
523KB
MD5068f11aefd236fa31434435bbe853434
SHA1da529c356611b569819b391392505c37c85ff616
SHA256b61eaf8b769515418b7e6f8fea17544c7f561de634d541b93e54bd4d0d7105c7
SHA51258c2d6e3269527f0102e7e8633f36f0cb88e1ac01635e75c11583c772021738d8c437f20637291c12fdad6e21228939183ec280c16cadef41cd24d67808c532c
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
381KB
MD565a2e298e010d8ed23ecf11fe99b26b7
SHA18d128a61cdc828e8e0e45cf100fd0049763e5f47
SHA256933b1e4f26deff176a41cf17afa9f6aab984754f7230f3da798dd4b22384d9f5
SHA5129dc05bf070d8517335b01d62f47c5c111675c060e432896ca0f1dcc09c3f469c3d72ab580e66f5a8f7645e2cfea0c4afe5510151f358247018b99ed59ae1b6d7
-
Filesize
381KB
MD565a2e298e010d8ed23ecf11fe99b26b7
SHA18d128a61cdc828e8e0e45cf100fd0049763e5f47
SHA256933b1e4f26deff176a41cf17afa9f6aab984754f7230f3da798dd4b22384d9f5
SHA5129dc05bf070d8517335b01d62f47c5c111675c060e432896ca0f1dcc09c3f469c3d72ab580e66f5a8f7645e2cfea0c4afe5510151f358247018b99ed59ae1b6d7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
298KB
MD5479f636b4d31a1aced37277ab8b86e89
SHA1066a1d47ada164d6b9631c30afbf7c00673e91d3
SHA2561bd9c622de1e4bcc747ddb82442a42cdfd679244e1faf151e246b75f40beb428
SHA5127568d1f7148484695fad318f47dd415112b8c30e2e34e75b461d2395f60e6ab0733cfd66f3eb025ae3e87ff13a66714d397e25c9a45e0dfd84669c5b21c962ad
-
Filesize
298KB
MD5479f636b4d31a1aced37277ab8b86e89
SHA1066a1d47ada164d6b9631c30afbf7c00673e91d3
SHA2561bd9c622de1e4bcc747ddb82442a42cdfd679244e1faf151e246b75f40beb428
SHA5127568d1f7148484695fad318f47dd415112b8c30e2e34e75b461d2395f60e6ab0733cfd66f3eb025ae3e87ff13a66714d397e25c9a45e0dfd84669c5b21c962ad
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5