Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 09:06
Static task
static1
General
-
Target
fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe
-
Size
1.1MB
-
MD5
6c517d4938304e04c9a715210ec73640
-
SHA1
12d4b29af3bea4b981306c36f18872327cceaace
-
SHA256
fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8
-
SHA512
8e5a9040ae94ec1a42cfceef072e2fb8ee3521c70fa3dd093e60cd758f7fe78d65e99d566c56a79176f4b5f6d535aa9b3df19597ab6938faa9897f07cb8e296f
-
SSDEEP
24576:Ay4b8rytaAqKZAJ6vb9S+RxYwFhZbVjcuotO:HW8eta5SAQvb4+1B5ox
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr136535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr136535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr136535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr136535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr136535.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr136535.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation qu953773.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation si810596.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 5112 un029730.exe 3752 un666102.exe 528 pr136535.exe 1164 qu953773.exe 3312 1.exe 3980 rk593824.exe 4300 si810596.exe 2692 oneetx.exe 4576 oneetx.exe 4184 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4708 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr136535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr136535.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un029730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un029730.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un666102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un666102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 2400 528 WerFault.exe 86 928 1164 WerFault.exe 92 3492 4300 WerFault.exe 99 3908 4300 WerFault.exe 99 1928 4300 WerFault.exe 99 448 4300 WerFault.exe 99 4548 4300 WerFault.exe 99 3808 4300 WerFault.exe 99 2132 4300 WerFault.exe 99 884 4300 WerFault.exe 99 4736 4300 WerFault.exe 99 4872 4300 WerFault.exe 99 2500 2692 WerFault.exe 121 2264 2692 WerFault.exe 121 4608 2692 WerFault.exe 121 3076 2692 WerFault.exe 121 4180 2692 WerFault.exe 121 2084 2692 WerFault.exe 121 4984 2692 WerFault.exe 121 3144 2692 WerFault.exe 121 2956 2692 WerFault.exe 121 5096 2692 WerFault.exe 121 4168 2692 WerFault.exe 121 856 2692 WerFault.exe 121 4732 4576 WerFault.exe 150 4992 2692 WerFault.exe 121 916 2692 WerFault.exe 121 1852 2692 WerFault.exe 121 32 4184 WerFault.exe 160 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 528 pr136535.exe 528 pr136535.exe 3980 rk593824.exe 3312 1.exe 3980 rk593824.exe 3312 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 528 pr136535.exe Token: SeDebugPrivilege 1164 qu953773.exe Token: SeDebugPrivilege 3980 rk593824.exe Token: SeDebugPrivilege 3312 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4300 si810596.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4144 wrote to memory of 5112 4144 fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe 84 PID 4144 wrote to memory of 5112 4144 fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe 84 PID 4144 wrote to memory of 5112 4144 fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe 84 PID 5112 wrote to memory of 3752 5112 un029730.exe 85 PID 5112 wrote to memory of 3752 5112 un029730.exe 85 PID 5112 wrote to memory of 3752 5112 un029730.exe 85 PID 3752 wrote to memory of 528 3752 un666102.exe 86 PID 3752 wrote to memory of 528 3752 un666102.exe 86 PID 3752 wrote to memory of 528 3752 un666102.exe 86 PID 3752 wrote to memory of 1164 3752 un666102.exe 92 PID 3752 wrote to memory of 1164 3752 un666102.exe 92 PID 3752 wrote to memory of 1164 3752 un666102.exe 92 PID 1164 wrote to memory of 3312 1164 qu953773.exe 93 PID 1164 wrote to memory of 3312 1164 qu953773.exe 93 PID 1164 wrote to memory of 3312 1164 qu953773.exe 93 PID 5112 wrote to memory of 3980 5112 un029730.exe 96 PID 5112 wrote to memory of 3980 5112 un029730.exe 96 PID 5112 wrote to memory of 3980 5112 un029730.exe 96 PID 4144 wrote to memory of 4300 4144 fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe 99 PID 4144 wrote to memory of 4300 4144 fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe 99 PID 4144 wrote to memory of 4300 4144 fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe 99 PID 4300 wrote to memory of 2692 4300 si810596.exe 121 PID 4300 wrote to memory of 2692 4300 si810596.exe 121 PID 4300 wrote to memory of 2692 4300 si810596.exe 121 PID 2692 wrote to memory of 5076 2692 oneetx.exe 138 PID 2692 wrote to memory of 5076 2692 oneetx.exe 138 PID 2692 wrote to memory of 5076 2692 oneetx.exe 138 PID 2692 wrote to memory of 4708 2692 oneetx.exe 155 PID 2692 wrote to memory of 4708 2692 oneetx.exe 155 PID 2692 wrote to memory of 4708 2692 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe"C:\Users\Admin\AppData\Local\Temp\fc5f9774e0a506e44f0c9919e654996c523bb1a67f5d0ba664b9c2723e5ef2f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un666102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un666102.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr136535.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr136535.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 10845⤵
- Program crash
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu953773.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu953773.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 13165⤵
- Program crash
PID:928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk593824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk593824.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si810596.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si810596.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 7003⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 7843⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 8603⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 8723⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 9923⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 9923⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 12243⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 12723⤵
- Program crash
PID:884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 13203⤵
- Program crash
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 6964⤵
- Program crash
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 8324⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 9164⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10564⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10964⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10964⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10804⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10044⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 12964⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 13364⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 13924⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10564⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 16124⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 15684⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 16284⤵
- Program crash
PID:1852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 13643⤵
- Program crash
PID:4872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 528 -ip 5281⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1164 -ip 11641⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4300 -ip 43001⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4300 -ip 43001⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4300 -ip 43001⤵PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4300 -ip 43001⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4300 -ip 43001⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4300 -ip 43001⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4300 -ip 43001⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4300 -ip 43001⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4300 -ip 43001⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4300 -ip 43001⤵PID:524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2692 -ip 26921⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2692 -ip 26921⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2692 -ip 26921⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2692 -ip 26921⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2692 -ip 26921⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2692 -ip 26921⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2692 -ip 26921⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2692 -ip 26921⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2692 -ip 26921⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2692 -ip 26921⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2692 -ip 26921⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2692 -ip 26921⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 3162⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4576 -ip 45761⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2692 -ip 26921⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2692 -ip 26921⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2692 -ip 26921⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 3202⤵
- Program crash
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4184 -ip 41841⤵PID:4288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
394KB
MD5ebf7ff9f3f96b4718f9e5eb30cd5b321
SHA1e4de845797c7ad102d2297fbc2a0c531f11e50e9
SHA2562f858eca392e3cdb6198148dbb2b56c02df24b192e3e24899c73547fd2d9db73
SHA512be746c679c9d2d5256e55ca87b3c019cf5a68fe059e1bb1eff72fc04ea6e78f48e48fe1ec3da82ffa6050472a8f74598fd420e2eb281d61e6d29a80f8ef25f19
-
Filesize
853KB
MD56a57d9d74b2b31c3be48b65ae40ca4f1
SHA1945a40e7e38d6bd65f6446a4a87e637ae6c995e2
SHA256c407d737d1a4dc11a9956b773bc123108a9a57609ad665eb6bfcac06010f4e46
SHA512babb7742b50074c7744b2c07e0c89b61aa13fbfd6b63fac2950e2acd61a30f1b96a1c1cb34247906cec70d72351df2419ba5a1b35b7066ffed76bfb43f534db9
-
Filesize
853KB
MD56a57d9d74b2b31c3be48b65ae40ca4f1
SHA1945a40e7e38d6bd65f6446a4a87e637ae6c995e2
SHA256c407d737d1a4dc11a9956b773bc123108a9a57609ad665eb6bfcac06010f4e46
SHA512babb7742b50074c7744b2c07e0c89b61aa13fbfd6b63fac2950e2acd61a30f1b96a1c1cb34247906cec70d72351df2419ba5a1b35b7066ffed76bfb43f534db9
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
699KB
MD555ce9d813bb053ff440252b5f1e31128
SHA18056f36ae314aea69ebb89e8e4f46ed60a501ffa
SHA2560a3934d7d118fe0b031f63e402be71060b96b3dfb0b4353a89407f2f8f7003a8
SHA5127579038173b0c958cba50fceb7102fb6a135b9c2a6f1bbfa86ed2f2484875c755cc428b06d17344c0bac9183ac4f63f18fd9f822562a9cf39b01a60ca7633161
-
Filesize
699KB
MD555ce9d813bb053ff440252b5f1e31128
SHA18056f36ae314aea69ebb89e8e4f46ed60a501ffa
SHA2560a3934d7d118fe0b031f63e402be71060b96b3dfb0b4353a89407f2f8f7003a8
SHA5127579038173b0c958cba50fceb7102fb6a135b9c2a6f1bbfa86ed2f2484875c755cc428b06d17344c0bac9183ac4f63f18fd9f822562a9cf39b01a60ca7633161
-
Filesize
402KB
MD54915ad1190f13d4f3d4bf6f07a65c5db
SHA122fd060a2bd5742fc30a09ba1f36c62632d094dd
SHA256b85fabea1aab7c8293aaa58aa8c1fbff7a4c32302a2951e8cb2f8583f8e016a1
SHA5127eb85f4edb4b5ec4439162b51f1ae0dc1f9cccdba86e28259569ddc284410f8c7512228afa3d418e627adf2a0c2e40d6a6582df5f26aa32af8eb5cb9d862ea70
-
Filesize
402KB
MD54915ad1190f13d4f3d4bf6f07a65c5db
SHA122fd060a2bd5742fc30a09ba1f36c62632d094dd
SHA256b85fabea1aab7c8293aaa58aa8c1fbff7a4c32302a2951e8cb2f8583f8e016a1
SHA5127eb85f4edb4b5ec4439162b51f1ae0dc1f9cccdba86e28259569ddc284410f8c7512228afa3d418e627adf2a0c2e40d6a6582df5f26aa32af8eb5cb9d862ea70
-
Filesize
586KB
MD5b8a2342254a63b8129f2c58a8cf1a39e
SHA1b18691750ed762bab0959820ba1d01d41351b9f8
SHA25621219d8d5348c4dda7d5c45fbfe951d8638c551f31332217fa5a0e1ca4c0d82e
SHA512532f7f540d1fdc243d780755cc03c375cb0a038d9b15e8e8a368893a70c13f0559cda0e8af41cef0fdd59db0ef2c5cbb997912f528ae3bd6b8576b3b367f1857
-
Filesize
586KB
MD5b8a2342254a63b8129f2c58a8cf1a39e
SHA1b18691750ed762bab0959820ba1d01d41351b9f8
SHA25621219d8d5348c4dda7d5c45fbfe951d8638c551f31332217fa5a0e1ca4c0d82e
SHA512532f7f540d1fdc243d780755cc03c375cb0a038d9b15e8e8a368893a70c13f0559cda0e8af41cef0fdd59db0ef2c5cbb997912f528ae3bd6b8576b3b367f1857
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1