Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 15:56
Static task
static1
General
-
Target
5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe
-
Size
1.1MB
-
MD5
3d3b3a877808a76217fdfab082656208
-
SHA1
54317c118c6874f27a75777fa292cea16c68e57a
-
SHA256
5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a
-
SHA512
743d81098e95bc5c180595bb1497cef18bbaaea3b636844c29a393322cb39e7b64ee959b7216291b7ac28c94f39f2b6e13830aca71e6854e0f88fe29799555eb
-
SSDEEP
24576:2yzksrQS0cwg6ADB1ne0/NiN1U1BeGmN0+XOQE7sd1ib0hhnnsBjltw4ML7U:Fpr0cw+N1ne0/NiN16BeDN0w+yiAhnsY
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr070481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr070481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr070481.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr070481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr070481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr070481.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu615298.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si735048.exe -
Executes dropped EXE 10 IoCs
pid Process 4268 un970885.exe 1416 un296811.exe 2032 pr070481.exe 4496 qu615298.exe 2604 1.exe 3856 rk591416.exe 496 si735048.exe 820 oneetx.exe 3776 oneetx.exe 2764 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr070481.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr070481.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un970885.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un970885.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un296811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un296811.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 1180 2032 WerFault.exe 87 3544 4496 WerFault.exe 93 5048 496 WerFault.exe 99 3748 496 WerFault.exe 99 4936 496 WerFault.exe 99 5008 496 WerFault.exe 99 4516 496 WerFault.exe 99 4340 496 WerFault.exe 99 4236 496 WerFault.exe 99 1128 496 WerFault.exe 99 4356 496 WerFault.exe 99 232 496 WerFault.exe 99 4392 820 WerFault.exe 122 2840 820 WerFault.exe 122 4800 820 WerFault.exe 122 2400 820 WerFault.exe 122 1116 820 WerFault.exe 122 1456 820 WerFault.exe 122 1516 820 WerFault.exe 122 2800 820 WerFault.exe 122 4616 820 WerFault.exe 122 3208 820 WerFault.exe 122 3824 820 WerFault.exe 122 4268 820 WerFault.exe 122 3632 3776 WerFault.exe 151 4572 820 WerFault.exe 122 1780 820 WerFault.exe 122 4372 820 WerFault.exe 122 4624 2764 WerFault.exe 161 1696 820 WerFault.exe 122 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2032 pr070481.exe 2032 pr070481.exe 3856 rk591416.exe 3856 rk591416.exe 2604 1.exe 2604 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2032 pr070481.exe Token: SeDebugPrivilege 4496 qu615298.exe Token: SeDebugPrivilege 3856 rk591416.exe Token: SeDebugPrivilege 2604 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 496 si735048.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4268 2700 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe 85 PID 2700 wrote to memory of 4268 2700 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe 85 PID 2700 wrote to memory of 4268 2700 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe 85 PID 4268 wrote to memory of 1416 4268 un970885.exe 86 PID 4268 wrote to memory of 1416 4268 un970885.exe 86 PID 4268 wrote to memory of 1416 4268 un970885.exe 86 PID 1416 wrote to memory of 2032 1416 un296811.exe 87 PID 1416 wrote to memory of 2032 1416 un296811.exe 87 PID 1416 wrote to memory of 2032 1416 un296811.exe 87 PID 1416 wrote to memory of 4496 1416 un296811.exe 93 PID 1416 wrote to memory of 4496 1416 un296811.exe 93 PID 1416 wrote to memory of 4496 1416 un296811.exe 93 PID 4496 wrote to memory of 2604 4496 qu615298.exe 94 PID 4496 wrote to memory of 2604 4496 qu615298.exe 94 PID 4496 wrote to memory of 2604 4496 qu615298.exe 94 PID 4268 wrote to memory of 3856 4268 un970885.exe 97 PID 4268 wrote to memory of 3856 4268 un970885.exe 97 PID 4268 wrote to memory of 3856 4268 un970885.exe 97 PID 2700 wrote to memory of 496 2700 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe 99 PID 2700 wrote to memory of 496 2700 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe 99 PID 2700 wrote to memory of 496 2700 5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe 99 PID 496 wrote to memory of 820 496 si735048.exe 122 PID 496 wrote to memory of 820 496 si735048.exe 122 PID 496 wrote to memory of 820 496 si735048.exe 122 PID 820 wrote to memory of 4992 820 oneetx.exe 141 PID 820 wrote to memory of 4992 820 oneetx.exe 141 PID 820 wrote to memory of 4992 820 oneetx.exe 141 PID 820 wrote to memory of 2076 820 oneetx.exe 158 PID 820 wrote to memory of 2076 820 oneetx.exe 158 PID 820 wrote to memory of 2076 820 oneetx.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe"C:\Users\Admin\AppData\Local\Temp\5fd17fd5af7ee5e5a9a3090db00ae3cd1be23a446d8d17482a64be3372ac016a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un970885.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un970885.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un296811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un296811.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr070481.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr070481.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 10885⤵
- Program crash
PID:1180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu615298.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu615298.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 15085⤵
- Program crash
PID:3544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591416.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk591416.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si735048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si735048.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 7123⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 7763⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 8043⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 9643⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 9683⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 9563⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 12083⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 12523⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 13243⤵
- Program crash
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 6964⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 9444⤵
- Program crash
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 9524⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 10924⤵
- Program crash
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 11164⤵
- Program crash
PID:1116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 11044⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 11324⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 10764⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 10164⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 7804⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 7844⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 8964⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 10844⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 16124⤵
- Program crash
PID:1780
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 10924⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 16284⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 8123⤵
- Program crash
PID:232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 20321⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4496 -ip 44961⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 496 -ip 4961⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 496 -ip 4961⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 496 -ip 4961⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 496 -ip 4961⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 496 -ip 4961⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 496 -ip 4961⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 496 -ip 4961⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 496 -ip 4961⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 496 -ip 4961⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 496 -ip 4961⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 820 -ip 8201⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 820 -ip 8201⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 820 -ip 8201⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 820 -ip 8201⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 820 -ip 8201⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 820 -ip 8201⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 820 -ip 8201⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 820 -ip 8201⤵PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 820 -ip 8201⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 820 -ip 8201⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 820 -ip 8201⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 820 -ip 8201⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 3162⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3776 -ip 37761⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 820 -ip 8201⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 820 -ip 8201⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 820 -ip 8201⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 3242⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2764 -ip 27641⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 820 -ip 8201⤵PID:3676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
395KB
MD5110bfc6bb7983910d53531a11cca02a5
SHA13c7b1f2369ecf8188b3941ce77418d25a29a66d1
SHA25618b9210add9e21fee8c90cbffdf2a17dd20d35d4979c857c9add1792d936b853
SHA51213d517bbe4732de84e46e0569a38e573888c8ff516204cfa9b409fc3204af5dfccfab59b8f662cee76a7b96bb73d6a0e7b256828669ffb1b3610aa3a2b73ff29
-
Filesize
852KB
MD5c24eab21130f6eab26372d78931db096
SHA19b452dd5a4b18b6261a29087497c642b0785ed94
SHA256617f9f8c87582ff8fd626e91da863cbc1f1590100a949a3a7860fc9e3ddc1432
SHA512b876c9adcb282f1569136ade33a1dea10a98f8b7fcf518ad3371a06880dd87f9cc8ba9d5702c01459d9a8d2e19e56d69ed61933fae50cb60a27833e8a8cdf3e9
-
Filesize
852KB
MD5c24eab21130f6eab26372d78931db096
SHA19b452dd5a4b18b6261a29087497c642b0785ed94
SHA256617f9f8c87582ff8fd626e91da863cbc1f1590100a949a3a7860fc9e3ddc1432
SHA512b876c9adcb282f1569136ade33a1dea10a98f8b7fcf518ad3371a06880dd87f9cc8ba9d5702c01459d9a8d2e19e56d69ed61933fae50cb60a27833e8a8cdf3e9
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
699KB
MD5c632b90e7bc231f4dbdbd41713927974
SHA177b157a95cc75cbcbbf96902f4e30256fafaf3f9
SHA256dd4094a58ba6c05fcabdad084fa72fbd280ed826c67a9d04fb47af21dc0b5744
SHA512053c87dc3a9dc65d3edb5fad4427cb682680fb050900138e44148af4c728fd9cf06a09ef55d5f9f8a6dac324754e4842c2d778d563c2b59b8cef632ec755cecf
-
Filesize
699KB
MD5c632b90e7bc231f4dbdbd41713927974
SHA177b157a95cc75cbcbbf96902f4e30256fafaf3f9
SHA256dd4094a58ba6c05fcabdad084fa72fbd280ed826c67a9d04fb47af21dc0b5744
SHA512053c87dc3a9dc65d3edb5fad4427cb682680fb050900138e44148af4c728fd9cf06a09ef55d5f9f8a6dac324754e4842c2d778d563c2b59b8cef632ec755cecf
-
Filesize
403KB
MD57eb4d34b2f8ab3dcb0f0a571d905a513
SHA150944030d6047fece928f34fd39e06d490d841bc
SHA25698eccb2b936b5daacf4da2bb99aa8ea98df6717546738aa458e41737f4053e7d
SHA5123627eee40f73762cde092ddb162c99cf781e165718698d7cb58bb19d077db8460261815881db0d34f9bb65fbe2d88d885763c3bc6b9ce6b13ae6e741ace065b5
-
Filesize
403KB
MD57eb4d34b2f8ab3dcb0f0a571d905a513
SHA150944030d6047fece928f34fd39e06d490d841bc
SHA25698eccb2b936b5daacf4da2bb99aa8ea98df6717546738aa458e41737f4053e7d
SHA5123627eee40f73762cde092ddb162c99cf781e165718698d7cb58bb19d077db8460261815881db0d34f9bb65fbe2d88d885763c3bc6b9ce6b13ae6e741ace065b5
-
Filesize
588KB
MD5d0fbede045ef3f8e324aada0bcdadf46
SHA1d36d3e6d1079b99afca90b92f9ef93b7b00280b1
SHA2562346cc92ba10b47dc933b6b42baa73c63fc34c226a2272abfc86415fc6a136f8
SHA512d0ade2ce71bf5c5542cf61a74dbd687ad6626c3f2b017bb813a2bc67ea996c2b194366fa3d913634b68156e0c242e6d52dfcdeb7e93009746e11d62b62a7d1d0
-
Filesize
588KB
MD5d0fbede045ef3f8e324aada0bcdadf46
SHA1d36d3e6d1079b99afca90b92f9ef93b7b00280b1
SHA2562346cc92ba10b47dc933b6b42baa73c63fc34c226a2272abfc86415fc6a136f8
SHA512d0ade2ce71bf5c5542cf61a74dbd687ad6626c3f2b017bb813a2bc67ea996c2b194366fa3d913634b68156e0c242e6d52dfcdeb7e93009746e11d62b62a7d1d0
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1