Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 06:47
Static task
static1
General
-
Target
2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe
-
Size
927KB
-
MD5
782742ae6b3800a49bfac02f3b84829a
-
SHA1
0c72935a2673e21b004108bee065f3c5d5ba6d35
-
SHA256
2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd
-
SHA512
6015ec36626f8629ae462ece0e26c51493bc8baedc5cb2a9d0344ab6e40555422f626fa804798deba8bfc760f976d06a523dcf215ca6c5cae3f3c27f2f9a0328
-
SSDEEP
24576:hyRP7s5/vyE6C4v05/j+ZxjiCZbOM3M4I:UOdyS4vaCvZb7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr748877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr748877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr748877.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr748877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr748877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr748877.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4412-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-223-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-225-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-227-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-229-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-231-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-233-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4412-235-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation si293942.exe -
Executes dropped EXE 9 IoCs
pid Process 4960 un925262.exe 4144 un467207.exe 1716 pr748877.exe 4412 qu842203.exe 4500 rk899676.exe 3108 si293942.exe 4468 oneetx.exe 4740 oneetx.exe 1448 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr748877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr748877.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un467207.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un925262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un925262.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un467207.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 1248 1716 WerFault.exe 86 5004 4412 WerFault.exe 93 5100 3108 WerFault.exe 101 972 3108 WerFault.exe 101 1908 3108 WerFault.exe 101 3116 3108 WerFault.exe 101 2232 3108 WerFault.exe 101 1736 3108 WerFault.exe 101 2080 3108 WerFault.exe 101 2016 3108 WerFault.exe 101 4180 3108 WerFault.exe 101 4948 3108 WerFault.exe 101 3932 4468 WerFault.exe 120 1172 4468 WerFault.exe 120 3008 4468 WerFault.exe 120 2916 4468 WerFault.exe 120 4616 4468 WerFault.exe 120 992 4468 WerFault.exe 120 2008 4468 WerFault.exe 120 4888 4468 WerFault.exe 120 4220 4468 WerFault.exe 120 5044 4468 WerFault.exe 120 4412 4468 WerFault.exe 120 1988 4740 WerFault.exe 147 932 4468 WerFault.exe 120 1908 4468 WerFault.exe 120 2200 4468 WerFault.exe 120 2980 1448 WerFault.exe 157 3608 4468 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1716 pr748877.exe 1716 pr748877.exe 4412 qu842203.exe 4412 qu842203.exe 4500 rk899676.exe 4500 rk899676.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1716 pr748877.exe Token: SeDebugPrivilege 4412 qu842203.exe Token: SeDebugPrivilege 4500 rk899676.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3108 si293942.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4960 3288 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe 84 PID 3288 wrote to memory of 4960 3288 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe 84 PID 3288 wrote to memory of 4960 3288 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe 84 PID 4960 wrote to memory of 4144 4960 un925262.exe 85 PID 4960 wrote to memory of 4144 4960 un925262.exe 85 PID 4960 wrote to memory of 4144 4960 un925262.exe 85 PID 4144 wrote to memory of 1716 4144 un467207.exe 86 PID 4144 wrote to memory of 1716 4144 un467207.exe 86 PID 4144 wrote to memory of 1716 4144 un467207.exe 86 PID 4144 wrote to memory of 4412 4144 un467207.exe 93 PID 4144 wrote to memory of 4412 4144 un467207.exe 93 PID 4144 wrote to memory of 4412 4144 un467207.exe 93 PID 4960 wrote to memory of 4500 4960 un925262.exe 100 PID 4960 wrote to memory of 4500 4960 un925262.exe 100 PID 4960 wrote to memory of 4500 4960 un925262.exe 100 PID 3288 wrote to memory of 3108 3288 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe 101 PID 3288 wrote to memory of 3108 3288 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe 101 PID 3288 wrote to memory of 3108 3288 2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe 101 PID 3108 wrote to memory of 4468 3108 si293942.exe 120 PID 3108 wrote to memory of 4468 3108 si293942.exe 120 PID 3108 wrote to memory of 4468 3108 si293942.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe"C:\Users\Admin\AppData\Local\Temp\2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un925262.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un925262.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un467207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un467207.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr748877.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr748877.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 10845⤵
- Program crash
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu842203.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu842203.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 13485⤵
- Program crash
PID:5004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk899676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk899676.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si293942.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si293942.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 6963⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 7643⤵
- Program crash
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 8603⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 9723⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 9963⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 9963⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 12163⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 12323⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 13163⤵
- Program crash
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 6924⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 8604⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 8524⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 10524⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 10604⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 11084⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 11044⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 6844⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 12684⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 12844⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 7644⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 13764⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 16284⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 10804⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 16244⤵
- Program crash
PID:3608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 8683⤵
- Program crash
PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1716 -ip 17161⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4412 -ip 44121⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3108 -ip 31081⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3108 -ip 31081⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3108 -ip 31081⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3108 -ip 31081⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3108 -ip 31081⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3108 -ip 31081⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3108 -ip 31081⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3108 -ip 31081⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3108 -ip 31081⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3108 -ip 31081⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4468 -ip 44681⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4468 -ip 44681⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4468 -ip 44681⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4468 -ip 44681⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4468 -ip 44681⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4468 -ip 44681⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4468 -ip 44681⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4468 -ip 44681⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4468 -ip 44681⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4468 -ip 44681⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4468 -ip 44681⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 3162⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4740 -ip 47401⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4468 -ip 44681⤵PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4468 -ip 44681⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4468 -ip 44681⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 3202⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 1448 -ip 14481⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 4468 -ip 44681⤵PID:1880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
663KB
MD54cf847bbacbd9ea667055b2e935ece96
SHA1ea347cdeb98c16e9d3cdf5ecf683dd0bc40ac6a7
SHA2560094d6db35b53e43c56f4dd2cff76d0fae392e086be927557b18ebd085cbc5b9
SHA5121ec3c8a6e19049d6d63f14bceb7b965c4e97b8494f99a9adf5109aa0a9f31ef0c596b04b72acefa28628fb56b310a492638ac8189cc02cd5070213f0ec94520f
-
Filesize
663KB
MD54cf847bbacbd9ea667055b2e935ece96
SHA1ea347cdeb98c16e9d3cdf5ecf683dd0bc40ac6a7
SHA2560094d6db35b53e43c56f4dd2cff76d0fae392e086be927557b18ebd085cbc5b9
SHA5121ec3c8a6e19049d6d63f14bceb7b965c4e97b8494f99a9adf5109aa0a9f31ef0c596b04b72acefa28628fb56b310a492638ac8189cc02cd5070213f0ec94520f
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
521KB
MD5adf31a97501639f9ae97458767f8ff09
SHA1fad0d75b4f9348f39d73854334f5eb2d0d812778
SHA256df9a6d4626f5ceb9d7b2316a0911b568063c5594520f11a85895b0921318d135
SHA51228bd58fd70d2adee78b1fba66ac5d3df129e05ed243fff23dd9939b37cde9c04b78a445d0a7978a959af676e7e22ac8f8f631bc2e9a5e3042ab9a7c02eb38879
-
Filesize
521KB
MD5adf31a97501639f9ae97458767f8ff09
SHA1fad0d75b4f9348f39d73854334f5eb2d0d812778
SHA256df9a6d4626f5ceb9d7b2316a0911b568063c5594520f11a85895b0921318d135
SHA51228bd58fd70d2adee78b1fba66ac5d3df129e05ed243fff23dd9939b37cde9c04b78a445d0a7978a959af676e7e22ac8f8f631bc2e9a5e3042ab9a7c02eb38879
-
Filesize
240KB
MD554b179ca887e45db06d5b5223f95429a
SHA1b1733120dd4e967dcdb42d7e1434d78dc6bd9d73
SHA2567ed0cd0fafc84f9d816b932bd0709f2d67ef3e37667ab08b8abdd926f1997e03
SHA512aff77a81505a8d2eeca92b63c7948d3cb92e330fff821e4146d5c30049a3dde86540a53809702c0c123d0a4f2d0118f0634a8bc296ca5fb4bbeeb5b65cb1d800
-
Filesize
240KB
MD554b179ca887e45db06d5b5223f95429a
SHA1b1733120dd4e967dcdb42d7e1434d78dc6bd9d73
SHA2567ed0cd0fafc84f9d816b932bd0709f2d67ef3e37667ab08b8abdd926f1997e03
SHA512aff77a81505a8d2eeca92b63c7948d3cb92e330fff821e4146d5c30049a3dde86540a53809702c0c123d0a4f2d0118f0634a8bc296ca5fb4bbeeb5b65cb1d800
-
Filesize
299KB
MD514f49d5b27464f84785a91fead876bcc
SHA1e6dac2aa67132476d271449c1b7209387b830566
SHA256a60c79b1e54abffd0db41345927324b4081c4ebf6b7c76a1064d4e1aad24ddcb
SHA51285706d142c24a3d1174d9f85d0d80bbe9cf2362b8694826c316cb8be55224d6e4ddf039a86c8e07d5a65a8d754b16172770385401271b039dda34d3d6aacace1
-
Filesize
299KB
MD514f49d5b27464f84785a91fead876bcc
SHA1e6dac2aa67132476d271449c1b7209387b830566
SHA256a60c79b1e54abffd0db41345927324b4081c4ebf6b7c76a1064d4e1aad24ddcb
SHA51285706d142c24a3d1174d9f85d0d80bbe9cf2362b8694826c316cb8be55224d6e4ddf039a86c8e07d5a65a8d754b16172770385401271b039dda34d3d6aacace1