Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 20:58
Static task
static1
General
-
Target
271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe
-
Size
1.2MB
-
MD5
180e002e6385cead9062e1c409016094
-
SHA1
3a8c156424c32c291a0eff4a61cd975a32e86ab9
-
SHA256
271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da
-
SHA512
75b1e3ae04b5e37a9d255fefacbb6debec456a797f38f0c0467bebd493ff071bdc82975cbad157af619631fde56275056357ece3887585a8b0d60536ee431977
-
SSDEEP
24576:8ysmVXoP5nkKcpfXyGysQTbjEV833IgO0nnXJXPQea39:rsmVYRBcpibsQTbg2xOQnt
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr529193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr529193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr529193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr529193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr529193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr529193.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation qu931573.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation si723704.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 4676 un342316.exe 3012 un285991.exe 1344 pr529193.exe 3088 qu931573.exe 4840 1.exe 5060 rk936480.exe 2256 si723704.exe 2024 oneetx.exe 1976 oneetx.exe 2288 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4920 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr529193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr529193.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un285991.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un342316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un342316.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un285991.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3028 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 4512 1344 WerFault.exe 86 4020 3088 WerFault.exe 92 3252 2256 WerFault.exe 99 1356 2256 WerFault.exe 99 3384 2256 WerFault.exe 99 4656 2256 WerFault.exe 99 2528 2256 WerFault.exe 99 4368 2256 WerFault.exe 99 5108 2256 WerFault.exe 99 4520 2256 WerFault.exe 99 2164 2256 WerFault.exe 99 2040 2256 WerFault.exe 99 740 2024 WerFault.exe 121 3752 2024 WerFault.exe 121 4332 2024 WerFault.exe 121 1952 2024 WerFault.exe 121 1504 2024 WerFault.exe 121 780 2024 WerFault.exe 121 1920 2024 WerFault.exe 121 2468 2024 WerFault.exe 121 3056 2024 WerFault.exe 121 2208 2024 WerFault.exe 121 2552 2024 WerFault.exe 121 1044 2024 WerFault.exe 121 2404 1976 WerFault.exe 150 4732 2024 WerFault.exe 121 464 2024 WerFault.exe 121 3980 2024 WerFault.exe 121 1680 2024 WerFault.exe 121 4356 2288 WerFault.exe 162 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1344 pr529193.exe 1344 pr529193.exe 5060 rk936480.exe 4840 1.exe 4840 1.exe 5060 rk936480.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1344 pr529193.exe Token: SeDebugPrivilege 3088 qu931573.exe Token: SeDebugPrivilege 5060 rk936480.exe Token: SeDebugPrivilege 4840 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 si723704.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4676 3196 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe 84 PID 3196 wrote to memory of 4676 3196 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe 84 PID 3196 wrote to memory of 4676 3196 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe 84 PID 4676 wrote to memory of 3012 4676 un342316.exe 85 PID 4676 wrote to memory of 3012 4676 un342316.exe 85 PID 4676 wrote to memory of 3012 4676 un342316.exe 85 PID 3012 wrote to memory of 1344 3012 un285991.exe 86 PID 3012 wrote to memory of 1344 3012 un285991.exe 86 PID 3012 wrote to memory of 1344 3012 un285991.exe 86 PID 3012 wrote to memory of 3088 3012 un285991.exe 92 PID 3012 wrote to memory of 3088 3012 un285991.exe 92 PID 3012 wrote to memory of 3088 3012 un285991.exe 92 PID 3088 wrote to memory of 4840 3088 qu931573.exe 93 PID 3088 wrote to memory of 4840 3088 qu931573.exe 93 PID 3088 wrote to memory of 4840 3088 qu931573.exe 93 PID 4676 wrote to memory of 5060 4676 un342316.exe 96 PID 4676 wrote to memory of 5060 4676 un342316.exe 96 PID 4676 wrote to memory of 5060 4676 un342316.exe 96 PID 3196 wrote to memory of 2256 3196 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe 99 PID 3196 wrote to memory of 2256 3196 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe 99 PID 3196 wrote to memory of 2256 3196 271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe 99 PID 2256 wrote to memory of 2024 2256 si723704.exe 121 PID 2256 wrote to memory of 2024 2256 si723704.exe 121 PID 2256 wrote to memory of 2024 2256 si723704.exe 121 PID 2024 wrote to memory of 4152 2024 oneetx.exe 138 PID 2024 wrote to memory of 4152 2024 oneetx.exe 138 PID 2024 wrote to memory of 4152 2024 oneetx.exe 138 PID 2024 wrote to memory of 4920 2024 oneetx.exe 157 PID 2024 wrote to memory of 4920 2024 oneetx.exe 157 PID 2024 wrote to memory of 4920 2024 oneetx.exe 157
Processes
-
C:\Users\Admin\AppData\Local\Temp\271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe"C:\Users\Admin\AppData\Local\Temp\271087d11a7e8a9ded5b7b1414292d990581fd6ce262d3d17519e582f3e6b9da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un285991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un285991.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr529193.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr529193.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 10845⤵
- Program crash
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu931573.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu931573.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 13765⤵
- Program crash
PID:4020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk936480.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk936480.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si723704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si723704.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 7003⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 7323⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 8163⤵
- Program crash
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 9563⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 9643⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 8163⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 11563⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 12683⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 13163⤵
- Program crash
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 6964⤵
- Program crash
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 8324⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 8964⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10564⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10764⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10764⤵
- Program crash
PID:780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10884⤵
- Program crash
PID:1920
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 10044⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 7284⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 12844⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 7844⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 14484⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 11044⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 16444⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 13644⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 14484⤵
- Program crash
PID:1680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 12843⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1344 -ip 13441⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3088 -ip 30881⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2256 -ip 22561⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2256 -ip 22561⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2256 -ip 22561⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2256 -ip 22561⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2256 -ip 22561⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2256 -ip 22561⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2256 -ip 22561⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2256 -ip 22561⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2256 -ip 22561⤵PID:904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2256 -ip 22561⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2024 -ip 20241⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2024 -ip 20241⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2024 -ip 20241⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2024 -ip 20241⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2024 -ip 20241⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2024 -ip 20241⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2024 -ip 20241⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2024 -ip 20241⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2024 -ip 20241⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2024 -ip 20241⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2024 -ip 20241⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2024 -ip 20241⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 3202⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1976 -ip 19761⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2024 -ip 20241⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2024 -ip 20241⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2024 -ip 20241⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2024 -ip 20241⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 3322⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2288 -ip 22881⤵PID:4216
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
397KB
MD54a2ba15d8cfb0599592019cc2f143d18
SHA1ec8ceac9cb62662e79e1af88e8d8b2e19402917a
SHA25660d885fc6a21a9eaabbd5344013ff5fcabadc3faaaa3f064528801b7e6ae7908
SHA5129384120b5dd0f9a2dfc8b618af86d58ef7a9f31f86710eae75c7f0fd1cfea6634b4eccbc6f5e039330e29ae1bb495a99b1e47d51980269a38a5c792d2e84f8d6
-
Filesize
864KB
MD5618ec73624ade523f44fc2ea08422a4e
SHA17c43934b10625604b19b72e31209be0a0bb81141
SHA2565eddae46c555e804f32d9b36686d96a3bee1a5b3faeb572a5670b4dcc34fafcf
SHA5125d830fb66a54adede3cdd792f2f8414cbd266fecad95198f48276307f2c2f3b5a0a6faecdce88ebfc9c6cd44bbf735a73e67bbfbabedf1be433e8bfeff94b293
-
Filesize
864KB
MD5618ec73624ade523f44fc2ea08422a4e
SHA17c43934b10625604b19b72e31209be0a0bb81141
SHA2565eddae46c555e804f32d9b36686d96a3bee1a5b3faeb572a5670b4dcc34fafcf
SHA5125d830fb66a54adede3cdd792f2f8414cbd266fecad95198f48276307f2c2f3b5a0a6faecdce88ebfc9c6cd44bbf735a73e67bbfbabedf1be433e8bfeff94b293
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
711KB
MD54143900254b93b6b967839717fa0d819
SHA191d8405e0ad09657df1026fdcc7a4d7bbda2349a
SHA2564462831e5cbf2af53cad596c8494b48c9501c35ca850fea02763a0df6cafa2d8
SHA5123e1c51c280575197409290cbe4a9ac70f72ca6c2cb4f20fc922fe139d4cb4d920c194a9038590514101bbf3bb6d1d9650833732588dbe371bb0e266220405719
-
Filesize
711KB
MD54143900254b93b6b967839717fa0d819
SHA191d8405e0ad09657df1026fdcc7a4d7bbda2349a
SHA2564462831e5cbf2af53cad596c8494b48c9501c35ca850fea02763a0df6cafa2d8
SHA5123e1c51c280575197409290cbe4a9ac70f72ca6c2cb4f20fc922fe139d4cb4d920c194a9038590514101bbf3bb6d1d9650833732588dbe371bb0e266220405719
-
Filesize
405KB
MD5e9f1057cebbcfecf40b6cecbc05f73e0
SHA1196687f9e9d922ce79925aa6a39f7462530b2058
SHA25684020b7763dacdda91cde280e2b19902694715e862bba34ed312760f417afdcc
SHA512e975fc976bc7fa70356ace52a9d3eb4bfe6261b8694626ed557c291c202e8bcf610883a53fddcff542e183400d4c83f5de09d491aa9f29a637d0ecf2d1f05fbb
-
Filesize
405KB
MD5e9f1057cebbcfecf40b6cecbc05f73e0
SHA1196687f9e9d922ce79925aa6a39f7462530b2058
SHA25684020b7763dacdda91cde280e2b19902694715e862bba34ed312760f417afdcc
SHA512e975fc976bc7fa70356ace52a9d3eb4bfe6261b8694626ed557c291c202e8bcf610883a53fddcff542e183400d4c83f5de09d491aa9f29a637d0ecf2d1f05fbb
-
Filesize
588KB
MD5c9b837ed08cf8013a767acf0482e9672
SHA1140fb59c74efd4b5dd805952c856594031463615
SHA256c8747f6071a37643530e1593bf2054440fa7fa61f61703fda02105a7c9fb56b7
SHA512787705ac3ddcd004d681f4dc03cca6ea3c331ef0d6aa802c98363e1fdb0b8fd3f17cbd9a236b6aea6bbb2f42f52c752cf58ceb2f340feb7ead70a6d159b78ed2
-
Filesize
588KB
MD5c9b837ed08cf8013a767acf0482e9672
SHA1140fb59c74efd4b5dd805952c856594031463615
SHA256c8747f6071a37643530e1593bf2054440fa7fa61f61703fda02105a7c9fb56b7
SHA512787705ac3ddcd004d681f4dc03cca6ea3c331ef0d6aa802c98363e1fdb0b8fd3f17cbd9a236b6aea6bbb2f42f52c752cf58ceb2f340feb7ead70a6d159b78ed2
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1