Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 21:52
Static task
static1
General
-
Target
5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe
-
Size
1.1MB
-
MD5
c3ae39839dd2f68c16167d152345cc5f
-
SHA1
de25a9e7485cfe930216aef4b17fd609af953e35
-
SHA256
5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9
-
SHA512
c7d0c199b4901afd0b03c5847149f7c1e25d3e2e023d2b230825f335616f68e5c3f6753176f70addc1e3a102dd65bcbb30686e8852527732eda291319a13ef9e
-
SSDEEP
24576:mym+ygUMT+bDdSbBYIeg2HWYThfHH0xBtJBCHmQIpP:1FyFMT+FSbOIeYY9/t+
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr093569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr093569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr093569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr093569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr093569.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr093569.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation qu253171.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si003307.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 3088 un861530.exe 4792 un279339.exe 2036 pr093569.exe 3612 qu253171.exe 3696 1.exe 3160 rk227775.exe 2164 si003307.exe 1224 oneetx.exe 3564 oneetx.exe 2660 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr093569.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr093569.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un279339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un279339.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un861530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un861530.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 488 2036 WerFault.exe 85 4784 3612 WerFault.exe 91 1804 2164 WerFault.exe 101 3508 2164 WerFault.exe 101 1888 2164 WerFault.exe 101 3880 2164 WerFault.exe 101 1644 2164 WerFault.exe 101 2736 2164 WerFault.exe 101 1296 2164 WerFault.exe 101 2376 2164 WerFault.exe 101 2644 2164 WerFault.exe 101 3996 2164 WerFault.exe 101 1652 1224 WerFault.exe 120 3460 1224 WerFault.exe 120 2124 1224 WerFault.exe 120 1848 1224 WerFault.exe 120 3680 1224 WerFault.exe 120 3860 1224 WerFault.exe 120 3360 1224 WerFault.exe 120 4220 1224 WerFault.exe 120 704 1224 WerFault.exe 120 1684 1224 WerFault.exe 120 4872 1224 WerFault.exe 120 4816 1224 WerFault.exe 120 2772 3564 WerFault.exe 147 3648 1224 WerFault.exe 120 1144 1224 WerFault.exe 120 1232 1224 WerFault.exe 120 2556 2660 WerFault.exe 159 3084 1224 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 pr093569.exe 2036 pr093569.exe 3696 1.exe 3696 1.exe 3160 rk227775.exe 3160 rk227775.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2036 pr093569.exe Token: SeDebugPrivilege 3612 qu253171.exe Token: SeDebugPrivilege 3696 1.exe Token: SeDebugPrivilege 3160 rk227775.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 si003307.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3088 2592 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe 83 PID 2592 wrote to memory of 3088 2592 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe 83 PID 2592 wrote to memory of 3088 2592 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe 83 PID 3088 wrote to memory of 4792 3088 un861530.exe 84 PID 3088 wrote to memory of 4792 3088 un861530.exe 84 PID 3088 wrote to memory of 4792 3088 un861530.exe 84 PID 4792 wrote to memory of 2036 4792 un279339.exe 85 PID 4792 wrote to memory of 2036 4792 un279339.exe 85 PID 4792 wrote to memory of 2036 4792 un279339.exe 85 PID 4792 wrote to memory of 3612 4792 un279339.exe 91 PID 4792 wrote to memory of 3612 4792 un279339.exe 91 PID 4792 wrote to memory of 3612 4792 un279339.exe 91 PID 3612 wrote to memory of 3696 3612 qu253171.exe 92 PID 3612 wrote to memory of 3696 3612 qu253171.exe 92 PID 3612 wrote to memory of 3696 3612 qu253171.exe 92 PID 3088 wrote to memory of 3160 3088 un861530.exe 96 PID 3088 wrote to memory of 3160 3088 un861530.exe 96 PID 3088 wrote to memory of 3160 3088 un861530.exe 96 PID 2592 wrote to memory of 2164 2592 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe 101 PID 2592 wrote to memory of 2164 2592 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe 101 PID 2592 wrote to memory of 2164 2592 5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe 101 PID 2164 wrote to memory of 1224 2164 si003307.exe 120 PID 2164 wrote to memory of 1224 2164 si003307.exe 120 PID 2164 wrote to memory of 1224 2164 si003307.exe 120 PID 1224 wrote to memory of 2448 1224 oneetx.exe 137 PID 1224 wrote to memory of 2448 1224 oneetx.exe 137 PID 1224 wrote to memory of 2448 1224 oneetx.exe 137 PID 1224 wrote to memory of 1152 1224 oneetx.exe 156 PID 1224 wrote to memory of 1152 1224 oneetx.exe 156 PID 1224 wrote to memory of 1152 1224 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe"C:\Users\Admin\AppData\Local\Temp\5f38d42d074ed2905a1873932b5fe7f8adea3cefdd4087720dd72a73cfa04fe9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un861530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un861530.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un279339.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un279339.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093569.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093569.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 10845⤵
- Program crash
PID:488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu253171.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu253171.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 13685⤵
- Program crash
PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk227775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk227775.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si003307.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si003307.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 6963⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 7483⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 8563⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 9723⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 9723⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 10083⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 12203⤵
- Program crash
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 12323⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 13163⤵
- Program crash
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 6924⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 8644⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 8924⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 10484⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 10924⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 10924⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 11644⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 9924⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 7764⤵
- Program crash
PID:704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 13204⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 13004⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 14404⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 12124⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 17044⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 16404⤵
- Program crash
PID:1232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 16204⤵
- Program crash
PID:3084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 14163⤵
- Program crash
PID:3996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2036 -ip 20361⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3612 -ip 36121⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2164 -ip 21641⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2164 -ip 21641⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2164 -ip 21641⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2164 -ip 21641⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2164 -ip 21641⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2164 -ip 21641⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2164 -ip 21641⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2164 -ip 21641⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2164 -ip 21641⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2164 -ip 21641⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1224 -ip 12241⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1224 -ip 12241⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1224 -ip 12241⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1224 -ip 12241⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1224 -ip 12241⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1224 -ip 12241⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1224 -ip 12241⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1224 -ip 12241⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1224 -ip 12241⤵PID:576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1224 -ip 12241⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1224 -ip 12241⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 3122⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1224 -ip 12241⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3564 -ip 35641⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1224 -ip 12241⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1224 -ip 12241⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1224 -ip 12241⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 3162⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2660 -ip 26601⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1224 -ip 12241⤵PID:696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
819KB
MD5d47b9baccae38cba8071600025a220d8
SHA1db0f8393eb3357a49baeafcf4798785f7eb56161
SHA25672eac2f1922559fa82b80879d256d7a80536fc7077640a67148a4efce82a03a7
SHA512ac42b2f48d110b3b20b62a62282b4501c988b715e8e9f839c24a42c0757e677478bb8117b295ccba7de71e7ae4f1ed7a915bb623c219b68bdc4b5231bd4cc5a0
-
Filesize
819KB
MD5d47b9baccae38cba8071600025a220d8
SHA1db0f8393eb3357a49baeafcf4798785f7eb56161
SHA25672eac2f1922559fa82b80879d256d7a80536fc7077640a67148a4efce82a03a7
SHA512ac42b2f48d110b3b20b62a62282b4501c988b715e8e9f839c24a42c0757e677478bb8117b295ccba7de71e7ae4f1ed7a915bb623c219b68bdc4b5231bd4cc5a0
-
Filesize
168KB
MD5b0caa768bae607036c0eba6d5d46acf4
SHA116c9ad919a161e53da944b87c1c55feef1c74ebe
SHA256e86f5493f28a767fb283c9ff09bf159564c73d76ce05ad18fd98eedd385dc906
SHA512d09e206d8d95cfd9215739215504a09359ee92631f14330e87f4e6c5e730c838490afbf92078405fe628cce21b82aaf45b1c62f90704b00038459ccf9e13ef02
-
Filesize
168KB
MD5b0caa768bae607036c0eba6d5d46acf4
SHA116c9ad919a161e53da944b87c1c55feef1c74ebe
SHA256e86f5493f28a767fb283c9ff09bf159564c73d76ce05ad18fd98eedd385dc906
SHA512d09e206d8d95cfd9215739215504a09359ee92631f14330e87f4e6c5e730c838490afbf92078405fe628cce21b82aaf45b1c62f90704b00038459ccf9e13ef02
-
Filesize
665KB
MD5c2a974daeacad997bee3ca19fa14669d
SHA1f67741e389c66f60566cd77f23c30c13d63b8bbc
SHA256e469695e8749a7f0446e935d9bbd1997ce676dacb4fa6e62226d573fbea21b41
SHA512e5b80c58c78a9c3bd01eba7cd191e86b9de62472df924a275d4a21a86e667ee4f3eea1a9c59e6c94173d04f97ac12df5e9b326bd79353fe00a353690601d776d
-
Filesize
665KB
MD5c2a974daeacad997bee3ca19fa14669d
SHA1f67741e389c66f60566cd77f23c30c13d63b8bbc
SHA256e469695e8749a7f0446e935d9bbd1997ce676dacb4fa6e62226d573fbea21b41
SHA512e5b80c58c78a9c3bd01eba7cd191e86b9de62472df924a275d4a21a86e667ee4f3eea1a9c59e6c94173d04f97ac12df5e9b326bd79353fe00a353690601d776d
-
Filesize
317KB
MD5360be2b794535dcfebf316232ee01403
SHA1175c70b9ae125e01abf876e3a6ab435404c775b0
SHA256a637ca0c5803760e621e439c5a88f88b8c808e6858b4c93388350b50a0b31880
SHA5121e9029f123e873bf5bb088e5a0226a8ec1b858d4bac14e6f15c5b75646f9e3c8258ec4be1dd541712a298ace28dcae20d0234a5c10a8ee65e003eb6df2dfeb85
-
Filesize
317KB
MD5360be2b794535dcfebf316232ee01403
SHA1175c70b9ae125e01abf876e3a6ab435404c775b0
SHA256a637ca0c5803760e621e439c5a88f88b8c808e6858b4c93388350b50a0b31880
SHA5121e9029f123e873bf5bb088e5a0226a8ec1b858d4bac14e6f15c5b75646f9e3c8258ec4be1dd541712a298ace28dcae20d0234a5c10a8ee65e003eb6df2dfeb85
-
Filesize
501KB
MD550b236bf1a9d2222d3deed9b34bdfeb6
SHA18f978e0caba61353686c158441f5e101d35a1576
SHA256eb80b53a01a0baf3c4d44bdaeb59787b7936146d3f72da545405490c09f093ca
SHA5129ea9399ff7e83808a0aca8653b77d1d9d5a3a36871e65ca0a918f96436cc63e25f71ed65c0ec024c6d9dde804dd19b29d9c98adb292b0f630c2a363e88a7d5b7
-
Filesize
501KB
MD550b236bf1a9d2222d3deed9b34bdfeb6
SHA18f978e0caba61353686c158441f5e101d35a1576
SHA256eb80b53a01a0baf3c4d44bdaeb59787b7936146d3f72da545405490c09f093ca
SHA5129ea9399ff7e83808a0aca8653b77d1d9d5a3a36871e65ca0a918f96436cc63e25f71ed65c0ec024c6d9dde804dd19b29d9c98adb292b0f630c2a363e88a7d5b7
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1