Analysis
-
max time kernel
142s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 03:31
Static task
static1
General
-
Target
009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe
-
Size
1.1MB
-
MD5
baebe382ec81260576ea640a1eaab26f
-
SHA1
9bf8cc1ea60453ebb99f4e8d91841df2e33f6530
-
SHA256
009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6
-
SHA512
3c0f868b131b952fc42bb5f819b9468e742ce420ae135ee7b8d75cef9d07073d931b70eee1ddabea1cd6f856a40f9c3247d93284efb6374c8328ed49e1acf5ed
-
SSDEEP
24576:RylIgbQ2NkQs8cNgK7h0EU6j2zoEvdKc0i:EjL6xD7hJzyUEvdKp
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr737216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr737216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr737216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr737216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr737216.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr737216.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation qu606366.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation si762859.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 5080 un888842.exe 3696 un760355.exe 4720 pr737216.exe 4296 qu606366.exe 1288 1.exe 348 rk388452.exe 3692 si762859.exe 3416 oneetx.exe 2444 oneetx.exe 1116 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr737216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr737216.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un760355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un760355.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un888842.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un888842.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 1060 4720 WerFault.exe 86 4148 4296 WerFault.exe 92 3372 3692 WerFault.exe 98 3840 3692 WerFault.exe 98 3684 3692 WerFault.exe 98 2212 3692 WerFault.exe 98 5100 3692 WerFault.exe 98 4796 3692 WerFault.exe 98 3852 3692 WerFault.exe 98 1444 3692 WerFault.exe 98 4056 3692 WerFault.exe 98 2960 3692 WerFault.exe 98 4308 3416 WerFault.exe 120 404 3416 WerFault.exe 120 4848 3416 WerFault.exe 120 4484 3416 WerFault.exe 120 4500 3416 WerFault.exe 120 3868 3416 WerFault.exe 120 216 3416 WerFault.exe 120 3604 3416 WerFault.exe 120 3796 3416 WerFault.exe 120 1628 3416 WerFault.exe 120 1396 3416 WerFault.exe 120 3816 2444 WerFault.exe 148 4040 3416 WerFault.exe 120 4300 3416 WerFault.exe 120 3688 3416 WerFault.exe 120 4232 1116 WerFault.exe 158 4752 3416 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4720 pr737216.exe 4720 pr737216.exe 1288 1.exe 1288 1.exe 348 rk388452.exe 348 rk388452.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4720 pr737216.exe Token: SeDebugPrivilege 4296 qu606366.exe Token: SeDebugPrivilege 1288 1.exe Token: SeDebugPrivilege 348 rk388452.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3692 si762859.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3404 wrote to memory of 5080 3404 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe 84 PID 3404 wrote to memory of 5080 3404 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe 84 PID 3404 wrote to memory of 5080 3404 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe 84 PID 5080 wrote to memory of 3696 5080 un888842.exe 85 PID 5080 wrote to memory of 3696 5080 un888842.exe 85 PID 5080 wrote to memory of 3696 5080 un888842.exe 85 PID 3696 wrote to memory of 4720 3696 un760355.exe 86 PID 3696 wrote to memory of 4720 3696 un760355.exe 86 PID 3696 wrote to memory of 4720 3696 un760355.exe 86 PID 3696 wrote to memory of 4296 3696 un760355.exe 92 PID 3696 wrote to memory of 4296 3696 un760355.exe 92 PID 3696 wrote to memory of 4296 3696 un760355.exe 92 PID 4296 wrote to memory of 1288 4296 qu606366.exe 93 PID 4296 wrote to memory of 1288 4296 qu606366.exe 93 PID 4296 wrote to memory of 1288 4296 qu606366.exe 93 PID 5080 wrote to memory of 348 5080 un888842.exe 96 PID 5080 wrote to memory of 348 5080 un888842.exe 96 PID 5080 wrote to memory of 348 5080 un888842.exe 96 PID 3404 wrote to memory of 3692 3404 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe 98 PID 3404 wrote to memory of 3692 3404 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe 98 PID 3404 wrote to memory of 3692 3404 009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe 98 PID 3692 wrote to memory of 3416 3692 si762859.exe 120 PID 3692 wrote to memory of 3416 3692 si762859.exe 120 PID 3692 wrote to memory of 3416 3692 si762859.exe 120 PID 3416 wrote to memory of 5088 3416 oneetx.exe 138 PID 3416 wrote to memory of 5088 3416 oneetx.exe 138 PID 3416 wrote to memory of 5088 3416 oneetx.exe 138 PID 3416 wrote to memory of 1656 3416 oneetx.exe 155 PID 3416 wrote to memory of 1656 3416 oneetx.exe 155 PID 3416 wrote to memory of 1656 3416 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe"C:\Users\Admin\AppData\Local\Temp\009fd97a5edf9a5000c4a8e4a0c2b5a601284da973645d96c34c5d25f26b4aa6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888842.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888842.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un760355.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un760355.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr737216.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr737216.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 10805⤵
- Program crash
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu606366.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu606366.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 13845⤵
- Program crash
PID:4148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk388452.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk388452.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si762859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si762859.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 6963⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 7523⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 8563⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 9723⤵
- Program crash
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 10083⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 10083⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 11763⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 12683⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 13163⤵
- Program crash
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 6924⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 8364⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 9084⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 10524⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 10884⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 10884⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 11284⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 9924⤵
- Program crash
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 12844⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 6924⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 7764⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 11484⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 16044⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 13724⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 16204⤵
- Program crash
PID:4752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 14203⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4720 -ip 47201⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4296 -ip 42961⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3692 -ip 36921⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3692 -ip 36921⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3692 -ip 36921⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3692 -ip 36921⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3692 -ip 36921⤵PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3692 -ip 36921⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3692 -ip 36921⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3692 -ip 36921⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3692 -ip 36921⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3692 -ip 36921⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3416 -ip 34161⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3416 -ip 34161⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3416 -ip 34161⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3416 -ip 34161⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3416 -ip 34161⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3416 -ip 34161⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3416 -ip 34161⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3416 -ip 34161⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3416 -ip 34161⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3416 -ip 34161⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3416 -ip 34161⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 3202⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2444 -ip 24441⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3416 -ip 34161⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3416 -ip 34161⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3416 -ip 34161⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 3122⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1116 -ip 11161⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3416 -ip 34161⤵PID:2176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
810KB
MD5541abb700ea98f926d711e4f864cbe0d
SHA19048b607f654269cd4a4c34c270439a5f03fe94f
SHA2563d40a2c6d6c004ad96a05b99a690849fb2aefa53bc3e1fbd6c35f127785c8b57
SHA512822f0d0e23ff84ddb4b605d1f936d31fb02c4a5931d21ca1b9b3205950fa398637949b9da1685b3fa8255aefad54585bf6ee865e98ecd4453ad6b2026ab9b351
-
Filesize
810KB
MD5541abb700ea98f926d711e4f864cbe0d
SHA19048b607f654269cd4a4c34c270439a5f03fe94f
SHA2563d40a2c6d6c004ad96a05b99a690849fb2aefa53bc3e1fbd6c35f127785c8b57
SHA512822f0d0e23ff84ddb4b605d1f936d31fb02c4a5931d21ca1b9b3205950fa398637949b9da1685b3fa8255aefad54585bf6ee865e98ecd4453ad6b2026ab9b351
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
656KB
MD5e22145e54e548c5f2e8421e72e56eee2
SHA1dc3e93d03d632c627d00ef633afa925b9ae359f8
SHA2567d210c4242f31464208401984542fa042cd28eb5f6f4d25073cfcbd4c7c769fd
SHA512697fe36aefa6dbfed9c2fb5d4aff9584177a49a088b112162738a80c8b90bb807b6097f5183aec57a22cc2491d839255c2ca341ab230b04e43249991a5c321ae
-
Filesize
656KB
MD5e22145e54e548c5f2e8421e72e56eee2
SHA1dc3e93d03d632c627d00ef633afa925b9ae359f8
SHA2567d210c4242f31464208401984542fa042cd28eb5f6f4d25073cfcbd4c7c769fd
SHA512697fe36aefa6dbfed9c2fb5d4aff9584177a49a088b112162738a80c8b90bb807b6097f5183aec57a22cc2491d839255c2ca341ab230b04e43249991a5c321ae
-
Filesize
254KB
MD592565103c3932a25cfc459572b3f5d78
SHA1f96b2a68c10db2d69c03507ebb8f4a136f55b3fb
SHA256d07564bf0da6a0e6bf2d7ade1dc649926956fc5bcca72ba71dc62a781734c3f9
SHA512c8f1594b52c0e79c1d2050d0072b36c30be387719f6a482004f318db2d974a9b0a82eed17a90160d77b69999449bca915046fe16d0a5f597ac028674ee6607a9
-
Filesize
254KB
MD592565103c3932a25cfc459572b3f5d78
SHA1f96b2a68c10db2d69c03507ebb8f4a136f55b3fb
SHA256d07564bf0da6a0e6bf2d7ade1dc649926956fc5bcca72ba71dc62a781734c3f9
SHA512c8f1594b52c0e79c1d2050d0072b36c30be387719f6a482004f318db2d974a9b0a82eed17a90160d77b69999449bca915046fe16d0a5f597ac028674ee6607a9
-
Filesize
438KB
MD5936d0501ff012d279d0b150c72807d84
SHA11a632d35173a79ccc8e098b11fdf6daad0208bef
SHA2567d0643cc3f2b3e7b84ef62af1e1c16d9cfae882ef99c0188801993af26c7c7fd
SHA512af52854a321476909aa7d7d70dbd0d0ac4f47104361deb10936cfcc48910dd785f44f80cce3a93aedb83524791ba4e51dc2a51e335d014ceae52681583137f09
-
Filesize
438KB
MD5936d0501ff012d279d0b150c72807d84
SHA11a632d35173a79ccc8e098b11fdf6daad0208bef
SHA2567d0643cc3f2b3e7b84ef62af1e1c16d9cfae882ef99c0188801993af26c7c7fd
SHA512af52854a321476909aa7d7d70dbd0d0ac4f47104361deb10936cfcc48910dd785f44f80cce3a93aedb83524791ba4e51dc2a51e335d014ceae52681583137f09
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1