Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 04:12
Static task
static1
General
-
Target
5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe
-
Size
1.2MB
-
MD5
b2be3348fc58dc12e34c1f20ac3492d9
-
SHA1
0d9e6df4a30807b4047015fe16f03ad9808b5620
-
SHA256
5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25
-
SHA512
636b3e099d315cc93245cd67a977c653349dafb7995706ac8e29f49404b45cabac2d79754e4baedc9be526885eb6eda86d12286fd07a4a97bcb59c4986863f41
-
SSDEEP
24576:+yzWXa92Ge5+xKa9ra5lD0rcVVZB+huvLzFim8GdFrpWI7doY2bPhJxk:NaK9Te+xKaFaHqmVVP38G1doTNJ
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr868450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr868450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr868450.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr868450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr868450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr868450.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu582266.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si858110.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 856 un714007.exe 4404 un788114.exe 1204 pr868450.exe 4336 qu582266.exe 3960 1.exe 3328 rk890178.exe 936 si858110.exe 3656 oneetx.exe 448 oneetx.exe 4332 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1616 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr868450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr868450.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un714007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un714007.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un788114.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un788114.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 5036 1204 WerFault.exe 86 2220 4336 WerFault.exe 92 3636 936 WerFault.exe 98 4700 936 WerFault.exe 98 3416 936 WerFault.exe 98 3916 936 WerFault.exe 98 3060 936 WerFault.exe 98 3592 936 WerFault.exe 98 1900 936 WerFault.exe 98 4328 936 WerFault.exe 98 3840 936 WerFault.exe 98 3112 936 WerFault.exe 98 4348 3656 WerFault.exe 120 4552 3656 WerFault.exe 120 1388 3656 WerFault.exe 120 2472 3656 WerFault.exe 120 3052 3656 WerFault.exe 120 412 3656 WerFault.exe 120 4976 3656 WerFault.exe 120 4652 3656 WerFault.exe 120 2848 3656 WerFault.exe 120 1552 3656 WerFault.exe 120 4696 3656 WerFault.exe 120 4604 3656 WerFault.exe 120 4372 448 WerFault.exe 150 4000 3656 WerFault.exe 120 2564 3656 WerFault.exe 120 3592 3656 WerFault.exe 120 4828 4332 WerFault.exe 160 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1204 pr868450.exe 1204 pr868450.exe 3960 1.exe 3328 rk890178.exe 3328 rk890178.exe 3960 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1204 pr868450.exe Token: SeDebugPrivilege 4336 qu582266.exe Token: SeDebugPrivilege 3960 1.exe Token: SeDebugPrivilege 3328 rk890178.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 936 si858110.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1916 wrote to memory of 856 1916 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe 84 PID 1916 wrote to memory of 856 1916 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe 84 PID 1916 wrote to memory of 856 1916 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe 84 PID 856 wrote to memory of 4404 856 un714007.exe 85 PID 856 wrote to memory of 4404 856 un714007.exe 85 PID 856 wrote to memory of 4404 856 un714007.exe 85 PID 4404 wrote to memory of 1204 4404 un788114.exe 86 PID 4404 wrote to memory of 1204 4404 un788114.exe 86 PID 4404 wrote to memory of 1204 4404 un788114.exe 86 PID 4404 wrote to memory of 4336 4404 un788114.exe 92 PID 4404 wrote to memory of 4336 4404 un788114.exe 92 PID 4404 wrote to memory of 4336 4404 un788114.exe 92 PID 4336 wrote to memory of 3960 4336 qu582266.exe 93 PID 4336 wrote to memory of 3960 4336 qu582266.exe 93 PID 4336 wrote to memory of 3960 4336 qu582266.exe 93 PID 856 wrote to memory of 3328 856 un714007.exe 96 PID 856 wrote to memory of 3328 856 un714007.exe 96 PID 856 wrote to memory of 3328 856 un714007.exe 96 PID 1916 wrote to memory of 936 1916 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe 98 PID 1916 wrote to memory of 936 1916 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe 98 PID 1916 wrote to memory of 936 1916 5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe 98 PID 936 wrote to memory of 3656 936 si858110.exe 120 PID 936 wrote to memory of 3656 936 si858110.exe 120 PID 936 wrote to memory of 3656 936 si858110.exe 120 PID 3656 wrote to memory of 4192 3656 oneetx.exe 138 PID 3656 wrote to memory of 4192 3656 oneetx.exe 138 PID 3656 wrote to memory of 4192 3656 oneetx.exe 138 PID 3656 wrote to memory of 1616 3656 oneetx.exe 155 PID 3656 wrote to memory of 1616 3656 oneetx.exe 155 PID 3656 wrote to memory of 1616 3656 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe"C:\Users\Admin\AppData\Local\Temp\5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714007.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un788114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un788114.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr868450.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr868450.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 10965⤵
- Program crash
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu582266.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu582266.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 13885⤵
- Program crash
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk890178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk890178.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858110.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858110.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 7003⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 7843⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 8003⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 8083⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 9723⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 9683⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 12203⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 12483⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 13203⤵
- Program crash
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 6964⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 8364⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 8964⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 10644⤵
- Program crash
PID:2472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 10724⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 11084⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 10764⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 9964⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 12924⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 7564⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 13204⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 11124⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 15964⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 10644⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 16284⤵
- Program crash
PID:3592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 7523⤵
- Program crash
PID:3112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1204 -ip 12041⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4336 -ip 43361⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 936 -ip 9361⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 936 -ip 9361⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 936 -ip 9361⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 936 -ip 9361⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 936 -ip 9361⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 936 -ip 9361⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 936 -ip 9361⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 936 -ip 9361⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 936 -ip 9361⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 936 -ip 9361⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3656 -ip 36561⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3656 -ip 36561⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3656 -ip 36561⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3656 -ip 36561⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3656 -ip 36561⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3656 -ip 36561⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3656 -ip 36561⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3656 -ip 36561⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3656 -ip 36561⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3656 -ip 36561⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3656 -ip 36561⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3656 -ip 36561⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 3202⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 448 -ip 4481⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3656 -ip 36561⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3656 -ip 36561⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 3656 -ip 36561⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 3162⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 4332 -ip 43321⤵PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
861KB
MD5cb7a7853f5e7fdab6df486ba8f83aa6b
SHA18748128366aa408fd2fc41006b60d55cc19d946d
SHA2565beb2d2c9d2c376372e9daab5efd64b0f5dc91c4b34fc5b7d5103bf1beef69a9
SHA5127172211cb3e90f6e6302a084d51f1ab7378f148aa44a67a98704c930358454a644a8c51d9a2296025781461c8a9290859f481abbb72a5c64cad145e5b0b4c4ba
-
Filesize
861KB
MD5cb7a7853f5e7fdab6df486ba8f83aa6b
SHA18748128366aa408fd2fc41006b60d55cc19d946d
SHA2565beb2d2c9d2c376372e9daab5efd64b0f5dc91c4b34fc5b7d5103bf1beef69a9
SHA5127172211cb3e90f6e6302a084d51f1ab7378f148aa44a67a98704c930358454a644a8c51d9a2296025781461c8a9290859f481abbb72a5c64cad145e5b0b4c4ba
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
709KB
MD5ea446ef737d41e8374e011e087e2d76f
SHA1bac245ad686faa6daa04ff5f2f561ca4135cd9ee
SHA256fa8694f30678134019e150b4d170d5256a81c7cb3a111644b947e44724a91148
SHA512e7e95094c5fb154ff2a404681d140cda1c8bcc036e15ea125a0b659987d89c2005d51ab6a4a1188a58a7df8659d86bee7760eba2a9878b7dbad02f64999407f1
-
Filesize
709KB
MD5ea446ef737d41e8374e011e087e2d76f
SHA1bac245ad686faa6daa04ff5f2f561ca4135cd9ee
SHA256fa8694f30678134019e150b4d170d5256a81c7cb3a111644b947e44724a91148
SHA512e7e95094c5fb154ff2a404681d140cda1c8bcc036e15ea125a0b659987d89c2005d51ab6a4a1188a58a7df8659d86bee7760eba2a9878b7dbad02f64999407f1
-
Filesize
404KB
MD58c174da7a966ee977c8fdffb46743ca1
SHA1c204b7b5b65360f72465acf59fb0fb7011d8a7ca
SHA256029d17d3ad5b2f167f7a959cf089f4ffdef28dd446f1db106430a373368214ae
SHA51295b0d3f97dce8a8ee925febb1d1bd322c3035365ca1f4e860d35132b86ca6ec6f84ee44ba447d4c3082c8edf5f2c2e7b7f040056ff4ca1531c887db9c0dd461c
-
Filesize
404KB
MD58c174da7a966ee977c8fdffb46743ca1
SHA1c204b7b5b65360f72465acf59fb0fb7011d8a7ca
SHA256029d17d3ad5b2f167f7a959cf089f4ffdef28dd446f1db106430a373368214ae
SHA51295b0d3f97dce8a8ee925febb1d1bd322c3035365ca1f4e860d35132b86ca6ec6f84ee44ba447d4c3082c8edf5f2c2e7b7f040056ff4ca1531c887db9c0dd461c
-
Filesize
588KB
MD5d27218abb4f2a7e843563c462a4d1cd5
SHA1f57b878a4d760e2c7235d6861b252da529ca9a76
SHA25663b411fd182195a62f649dfab57d211e5e0ffefeb552f5374fdc3f1e6a61ef48
SHA512be4bfe5a28b22f77fc67c3c5798db510782ae8f8e88f46fc987ff724e02cf95d2ec79caec497c03a169b9d3c392b29b1d6456c34e81404aecce7dbda14d82f32
-
Filesize
588KB
MD5d27218abb4f2a7e843563c462a4d1cd5
SHA1f57b878a4d760e2c7235d6861b252da529ca9a76
SHA25663b411fd182195a62f649dfab57d211e5e0ffefeb552f5374fdc3f1e6a61ef48
SHA512be4bfe5a28b22f77fc67c3c5798db510782ae8f8e88f46fc987ff724e02cf95d2ec79caec497c03a169b9d3c392b29b1d6456c34e81404aecce7dbda14d82f32
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1