Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 07:08
Static task
static1
General
-
Target
2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe
-
Size
927KB
-
MD5
11633dd19fd83a1c511a05e77fd756f0
-
SHA1
4d0c4d214272836052bf096d6f64d105575e1b21
-
SHA256
2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da
-
SHA512
cfcac8cb0fc609f162e070e804c4924b3e09282bccfa56d033804f195414cc5cefbab0f5cb83afb9a8ebda4ee02c3130c53250adbc9432a9d37ae4244c674740
-
SSDEEP
24576:IywepRWhnOm347Lffx1qo9+XRqfo+A3R1MamQXdeEinks6:PJ/OnOmIHxeqBBE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr797533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr797533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr797533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr797533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr797533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr797533.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2980-198-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-199-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-207-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-209-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-203-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-211-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-213-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-215-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-217-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-219-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-221-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-223-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-225-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-227-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-229-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-231-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-233-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2980-235-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si966910.exe -
Executes dropped EXE 8 IoCs
pid Process 4544 un838646.exe 1172 un186670.exe 4532 pr797533.exe 2980 qu233074.exe 3444 rk218068.exe 5008 si966910.exe 3784 oneetx.exe 1912 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4860 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr797533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr797533.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un838646.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un838646.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un186670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un186670.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 3716 4532 WerFault.exe 85 1368 2980 WerFault.exe 91 4964 5008 WerFault.exe 100 3664 5008 WerFault.exe 100 740 5008 WerFault.exe 100 1356 5008 WerFault.exe 100 4864 5008 WerFault.exe 100 2120 5008 WerFault.exe 100 3124 5008 WerFault.exe 100 728 5008 WerFault.exe 100 2688 5008 WerFault.exe 100 2428 5008 WerFault.exe 100 4144 3784 WerFault.exe 119 2944 3784 WerFault.exe 119 4272 3784 WerFault.exe 119 3216 3784 WerFault.exe 119 1304 3784 WerFault.exe 119 4032 3784 WerFault.exe 119 1224 3784 WerFault.exe 119 4148 3784 WerFault.exe 119 2680 3784 WerFault.exe 119 1128 3784 WerFault.exe 119 956 3784 WerFault.exe 119 4960 3784 WerFault.exe 119 4520 3784 WerFault.exe 119 460 1912 WerFault.exe 150 4992 3784 WerFault.exe 119 3632 3784 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4532 pr797533.exe 4532 pr797533.exe 2980 qu233074.exe 2980 qu233074.exe 3444 rk218068.exe 3444 rk218068.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4532 pr797533.exe Token: SeDebugPrivilege 2980 qu233074.exe Token: SeDebugPrivilege 3444 rk218068.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5008 si966910.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4544 1188 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe 83 PID 1188 wrote to memory of 4544 1188 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe 83 PID 1188 wrote to memory of 4544 1188 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe 83 PID 4544 wrote to memory of 1172 4544 un838646.exe 84 PID 4544 wrote to memory of 1172 4544 un838646.exe 84 PID 4544 wrote to memory of 1172 4544 un838646.exe 84 PID 1172 wrote to memory of 4532 1172 un186670.exe 85 PID 1172 wrote to memory of 4532 1172 un186670.exe 85 PID 1172 wrote to memory of 4532 1172 un186670.exe 85 PID 1172 wrote to memory of 2980 1172 un186670.exe 91 PID 1172 wrote to memory of 2980 1172 un186670.exe 91 PID 1172 wrote to memory of 2980 1172 un186670.exe 91 PID 4544 wrote to memory of 3444 4544 un838646.exe 98 PID 4544 wrote to memory of 3444 4544 un838646.exe 98 PID 4544 wrote to memory of 3444 4544 un838646.exe 98 PID 1188 wrote to memory of 5008 1188 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe 100 PID 1188 wrote to memory of 5008 1188 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe 100 PID 1188 wrote to memory of 5008 1188 2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe 100 PID 5008 wrote to memory of 3784 5008 si966910.exe 119 PID 5008 wrote to memory of 3784 5008 si966910.exe 119 PID 5008 wrote to memory of 3784 5008 si966910.exe 119 PID 3784 wrote to memory of 4440 3784 oneetx.exe 136 PID 3784 wrote to memory of 4440 3784 oneetx.exe 136 PID 3784 wrote to memory of 4440 3784 oneetx.exe 136 PID 3784 wrote to memory of 4860 3784 oneetx.exe 155 PID 3784 wrote to memory of 4860 3784 oneetx.exe 155 PID 3784 wrote to memory of 4860 3784 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe"C:\Users\Admin\AppData\Local\Temp\2882cb6ad41a81937a833f48f994d6de6807f401cb91949e9629c36731f407da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838646.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838646.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un186670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un186670.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr797533.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr797533.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 10805⤵
- Program crash
PID:3716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu233074.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu233074.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 13485⤵
- Program crash
PID:1368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218068.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966910.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966910.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 7003⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 7523⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 7923⤵
- Program crash
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 8603⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 9723⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 8723⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 12203⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 12523⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 13203⤵
- Program crash
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 6964⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 8324⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 9044⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 10604⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 10684⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 10804⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 10484⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 9924⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 7884⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 7644⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 9084⤵
- Program crash
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 14444⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 11404⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 16364⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 10884⤵
- Program crash
PID:3632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 17563⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4532 -ip 45321⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2980 -ip 29801⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5008 -ip 50081⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5008 -ip 50081⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5008 -ip 50081⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5008 -ip 50081⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5008 -ip 50081⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5008 -ip 50081⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5008 -ip 50081⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5008 -ip 50081⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5008 -ip 50081⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5008 -ip 50081⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3784 -ip 37841⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3784 -ip 37841⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3784 -ip 37841⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3784 -ip 37841⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3784 -ip 37841⤵PID:260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3784 -ip 37841⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3784 -ip 37841⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3784 -ip 37841⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3784 -ip 37841⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3784 -ip 37841⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3784 -ip 37841⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3784 -ip 37841⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3784 -ip 37841⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 3202⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1912 -ip 19121⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3784 -ip 37841⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3784 -ip 37841⤵PID:3212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
663KB
MD5844357beba3700f5627f37a77206a12b
SHA11e31ab0c767924af0a95564876bd8d4c31f69ef9
SHA25628fe95fb727503a84bbccf4c6d74502e89a44522d5acb7e600e3bf609132dbb2
SHA512bdcddbbd13f75b84a05a6375e525653a3e5f7f938df1e222b42bda5f748e1cf7c3bcdb6264034236ddb59d600b8cbc0648d5de363144dd4a9d44dd6d76988108
-
Filesize
663KB
MD5844357beba3700f5627f37a77206a12b
SHA11e31ab0c767924af0a95564876bd8d4c31f69ef9
SHA25628fe95fb727503a84bbccf4c6d74502e89a44522d5acb7e600e3bf609132dbb2
SHA512bdcddbbd13f75b84a05a6375e525653a3e5f7f938df1e222b42bda5f748e1cf7c3bcdb6264034236ddb59d600b8cbc0648d5de363144dd4a9d44dd6d76988108
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
175KB
MD5b2e599dec0856d70ebb2ab2327ae6442
SHA1300323436b47ddafa78cb7e835deb1ab09f13698
SHA256b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43
SHA512c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065
-
Filesize
520KB
MD5fb215fb445318756906d9d67d7e98c7a
SHA18652c6f40bdddbd713169f6d8d5db02328607c5c
SHA256b3cc9bd4ce69844b18a8d01fb9d47f801b4902fad0ae9dd38eea602a7c128d69
SHA5124fbbf0e7e4b1624bee2247e18e9d3845765e593362c974b5d0e7c75138aa90a651df9aaa8339f81e47ca990dc1fc96a4f2fc67913921e4366221b02ceb62948d
-
Filesize
520KB
MD5fb215fb445318756906d9d67d7e98c7a
SHA18652c6f40bdddbd713169f6d8d5db02328607c5c
SHA256b3cc9bd4ce69844b18a8d01fb9d47f801b4902fad0ae9dd38eea602a7c128d69
SHA5124fbbf0e7e4b1624bee2247e18e9d3845765e593362c974b5d0e7c75138aa90a651df9aaa8339f81e47ca990dc1fc96a4f2fc67913921e4366221b02ceb62948d
-
Filesize
240KB
MD588a9a913a5c3e96240f76d016776c6d4
SHA17a220e1e263ad978690c14dbdaa37415abb6c329
SHA25607311c00db64c9a383ccb86b939f4c49c90397efc2c93913bd489659f8bca018
SHA512753da11801a97b2d768b2d9c693b0e7fde10b0b9c45a235f6abdd1ef8b590e10a0b8d4c05ea6500db14868a0a9e02078d698f094a58b4b76fc69fc8f80952362
-
Filesize
240KB
MD588a9a913a5c3e96240f76d016776c6d4
SHA17a220e1e263ad978690c14dbdaa37415abb6c329
SHA25607311c00db64c9a383ccb86b939f4c49c90397efc2c93913bd489659f8bca018
SHA512753da11801a97b2d768b2d9c693b0e7fde10b0b9c45a235f6abdd1ef8b590e10a0b8d4c05ea6500db14868a0a9e02078d698f094a58b4b76fc69fc8f80952362
-
Filesize
299KB
MD529523cfcb6a2f1146d407ff957424cd7
SHA1c6ec35537f629398afbf613af1499e57cf995193
SHA256e14cd899961d6f861574fc6a7b9b907a750333850ea719c4f30af1cf1511c7a5
SHA51205f91dd8d69056070b78d99d4358b29179b284e77458d45ce252275f89c0a482b09278178446c3996ed743276a2e268cc62e61e6773ad5be1a6e4cd0dbb5bce3
-
Filesize
299KB
MD529523cfcb6a2f1146d407ff957424cd7
SHA1c6ec35537f629398afbf613af1499e57cf995193
SHA256e14cd899961d6f861574fc6a7b9b907a750333850ea719c4f30af1cf1511c7a5
SHA51205f91dd8d69056070b78d99d4358b29179b284e77458d45ce252275f89c0a482b09278178446c3996ed743276a2e268cc62e61e6773ad5be1a6e4cd0dbb5bce3
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5