Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 05:31
Static task
static1
General
-
Target
67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe
-
Size
1.1MB
-
MD5
bc382df517d986aa5adc05894429a5a5
-
SHA1
c488f9dcac50b2e91dbee79b6b38c23d869c72ea
-
SHA256
67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286
-
SHA512
cc042bc63273aefaab70fff7704f118f3e56c3986a85032285c157f697a5ef0c5f98219806f7c65622be3fbac7923295cac6fd3cf2b7cc4b23b635a37212f0cd
-
SSDEEP
24576:SyF+jQMfsTjFHeQ27LrQCO5qKsYzGY7Dg/szPZkY:5jMfI92HMCO0Ksycgh
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr165963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu262505.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si703570.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 180 un932066.exe 4820 un529257.exe 4228 pr165963.exe 5064 qu262505.exe 64 1.exe 3644 rk918051.exe 4128 si703570.exe 4140 oneetx.exe 1004 oneetx.exe 4112 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1052 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr165963.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un932066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un932066.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un529257.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un529257.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 5108 4228 WerFault.exe 87 408 5064 WerFault.exe 93 3288 4128 WerFault.exe 99 1600 4128 WerFault.exe 99 4608 4128 WerFault.exe 99 680 4128 WerFault.exe 99 2008 4128 WerFault.exe 99 3348 4128 WerFault.exe 99 2604 4128 WerFault.exe 99 4228 4128 WerFault.exe 99 3516 4128 WerFault.exe 99 4500 4128 WerFault.exe 99 2192 4140 WerFault.exe 121 3580 4140 WerFault.exe 121 2820 4140 WerFault.exe 121 3292 4140 WerFault.exe 121 2824 4140 WerFault.exe 121 544 4140 WerFault.exe 121 4176 4140 WerFault.exe 121 408 4140 WerFault.exe 121 3284 4140 WerFault.exe 121 2136 4140 WerFault.exe 121 4652 4140 WerFault.exe 121 4732 4140 WerFault.exe 121 3372 1004 WerFault.exe 151 4924 4140 WerFault.exe 121 3936 4140 WerFault.exe 121 5092 4140 WerFault.exe 121 3632 4112 WerFault.exe 161 1500 4140 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4228 pr165963.exe 4228 pr165963.exe 3644 rk918051.exe 64 1.exe 64 1.exe 3644 rk918051.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4228 pr165963.exe Token: SeDebugPrivilege 5064 qu262505.exe Token: SeDebugPrivilege 3644 rk918051.exe Token: SeDebugPrivilege 64 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4128 si703570.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2188 wrote to memory of 180 2188 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe 85 PID 2188 wrote to memory of 180 2188 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe 85 PID 2188 wrote to memory of 180 2188 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe 85 PID 180 wrote to memory of 4820 180 un932066.exe 86 PID 180 wrote to memory of 4820 180 un932066.exe 86 PID 180 wrote to memory of 4820 180 un932066.exe 86 PID 4820 wrote to memory of 4228 4820 un529257.exe 87 PID 4820 wrote to memory of 4228 4820 un529257.exe 87 PID 4820 wrote to memory of 4228 4820 un529257.exe 87 PID 4820 wrote to memory of 5064 4820 un529257.exe 93 PID 4820 wrote to memory of 5064 4820 un529257.exe 93 PID 4820 wrote to memory of 5064 4820 un529257.exe 93 PID 5064 wrote to memory of 64 5064 qu262505.exe 94 PID 5064 wrote to memory of 64 5064 qu262505.exe 94 PID 5064 wrote to memory of 64 5064 qu262505.exe 94 PID 180 wrote to memory of 3644 180 un932066.exe 97 PID 180 wrote to memory of 3644 180 un932066.exe 97 PID 180 wrote to memory of 3644 180 un932066.exe 97 PID 2188 wrote to memory of 4128 2188 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe 99 PID 2188 wrote to memory of 4128 2188 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe 99 PID 2188 wrote to memory of 4128 2188 67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe 99 PID 4128 wrote to memory of 4140 4128 si703570.exe 121 PID 4128 wrote to memory of 4140 4128 si703570.exe 121 PID 4128 wrote to memory of 4140 4128 si703570.exe 121 PID 4140 wrote to memory of 2972 4140 oneetx.exe 141 PID 4140 wrote to memory of 2972 4140 oneetx.exe 141 PID 4140 wrote to memory of 2972 4140 oneetx.exe 141 PID 4140 wrote to memory of 1052 4140 oneetx.exe 158 PID 4140 wrote to memory of 1052 4140 oneetx.exe 158 PID 4140 wrote to memory of 1052 4140 oneetx.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe"C:\Users\Admin\AppData\Local\Temp\67761d8026008f3bf73ee2068b6f56867fcedf4ab75d7ebce76bbbf80a976286.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932066.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un529257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un529257.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr165963.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr165963.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 10045⤵
- Program crash
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu262505.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu262505.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 13805⤵
- Program crash
PID:408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk918051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk918051.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703570.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 6883⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 7803⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 8563⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 9723⤵
- Program crash
PID:680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 9763⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 9763⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 12083⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 12243⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 13163⤵
- Program crash
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 6924⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 8364⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7884⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 9044⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10524⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10884⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10884⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10924⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10004⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7644⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7444⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 7564⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 11084⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 16284⤵
- Program crash
PID:3936
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 15644⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 16444⤵
- Program crash
PID:1500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 7683⤵
- Program crash
PID:4500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4228 -ip 42281⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5064 -ip 50641⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4128 -ip 41281⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4128 -ip 41281⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4128 -ip 41281⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4128 -ip 41281⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4128 -ip 41281⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4128 -ip 41281⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4128 -ip 41281⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4128 -ip 41281⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4128 -ip 41281⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4128 -ip 41281⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4140 -ip 41401⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4140 -ip 41401⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4140 -ip 41401⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4140 -ip 41401⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4140 -ip 41401⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4140 -ip 41401⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4140 -ip 41401⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4140 -ip 41401⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4140 -ip 41401⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4140 -ip 41401⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4140 -ip 41401⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4140 -ip 41401⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 3122⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1004 -ip 10041⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4140 -ip 41401⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4140 -ip 41401⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4140 -ip 41401⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 3122⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4112 -ip 41121⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4140 -ip 41401⤵PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
253KB
MD5cde2ed0e852d1eb327fcb7f7adbb05ac
SHA129eeda9fb79d8f6749956bd28c539638992a0f1a
SHA256b6311e977fca1786958a1311dd1e90cee50e062999f88fc12110740c4eb5c4f6
SHA51215bd892f087ce893c7c14946dc69c50c57e29ecb7f88795d479b4e1e7ecbf8633090da937e46ae1d6a84727468c426f67b70d983fdecf962b54cc681ab0ae303
-
Filesize
809KB
MD59da7309d9aa88d1f39189e93097f3572
SHA171663b0720f7b75fd34064ac144f92c23896c5ef
SHA2565cdfb031fe919c5f750d369aa8ce8b1901c910603ff7e7837b248246468bcb99
SHA512ba93fb7ce2114be650afacd5d6debbe115da61e1b9db28b24f03f5bbb0fac99b0f9e934ecaa8f5f3d5359b3d1d7509f8ea7123d6c4a6f4240fbc5c3163554d9f
-
Filesize
809KB
MD59da7309d9aa88d1f39189e93097f3572
SHA171663b0720f7b75fd34064ac144f92c23896c5ef
SHA2565cdfb031fe919c5f750d369aa8ce8b1901c910603ff7e7837b248246468bcb99
SHA512ba93fb7ce2114be650afacd5d6debbe115da61e1b9db28b24f03f5bbb0fac99b0f9e934ecaa8f5f3d5359b3d1d7509f8ea7123d6c4a6f4240fbc5c3163554d9f
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
655KB
MD56b549d64382398245c3bebb0c9fa30a6
SHA1ef83d1e22904e4686964010b9f81a1e9ebf75d15
SHA25641aa5977e08eeba68fe3ac98b8b571b756a9a6f27051c702109e04ac4bb131b6
SHA5122c7ce5c05fe25f891c7d67a98b34eb8813a98aa6f85a4814ff7ef8de634e82fc6f354b3e0e7ee6866538bbed79b6a9ace3332082a6f88bd3ad1a7d7f57cadfc1
-
Filesize
655KB
MD56b549d64382398245c3bebb0c9fa30a6
SHA1ef83d1e22904e4686964010b9f81a1e9ebf75d15
SHA25641aa5977e08eeba68fe3ac98b8b571b756a9a6f27051c702109e04ac4bb131b6
SHA5122c7ce5c05fe25f891c7d67a98b34eb8813a98aa6f85a4814ff7ef8de634e82fc6f354b3e0e7ee6866538bbed79b6a9ace3332082a6f88bd3ad1a7d7f57cadfc1
-
Filesize
262KB
MD5abd78520fd0b886cd284d3d2b7a5352a
SHA1edd53a9c82c610f4cf91fa57d426062ba116a3e8
SHA2568ec13a93dff43bd2b1c136a466bc8912136b5b8810307a5178bc71e629a551a3
SHA512d6f36e45e740988026c0b604d44cc9786def7a28ec364901f368b3ae1d4eec7884ef2943f3f8d82a6b14e53adbf6c7a146f4202839d28bc9271de3323b375885
-
Filesize
262KB
MD5abd78520fd0b886cd284d3d2b7a5352a
SHA1edd53a9c82c610f4cf91fa57d426062ba116a3e8
SHA2568ec13a93dff43bd2b1c136a466bc8912136b5b8810307a5178bc71e629a551a3
SHA512d6f36e45e740988026c0b604d44cc9786def7a28ec364901f368b3ae1d4eec7884ef2943f3f8d82a6b14e53adbf6c7a146f4202839d28bc9271de3323b375885
-
Filesize
445KB
MD58700b310790e03a62b82f4034c62d612
SHA18bed31d880da48487cc308dba46c09d40b96eaf8
SHA256f394f7265cdcef726d8843fee1ebf43213bb0733224df44165d83fd9c6f64f02
SHA512ed79bdaeba08ae9426ff72caaed881bd91179d6c27f852b0e18ec77ba76c3cdbfb33ac84336c5858c80b0732ad9d0821fe4b08a5d57b9d7addb7c868e501e0b5
-
Filesize
445KB
MD58700b310790e03a62b82f4034c62d612
SHA18bed31d880da48487cc308dba46c09d40b96eaf8
SHA256f394f7265cdcef726d8843fee1ebf43213bb0733224df44165d83fd9c6f64f02
SHA512ed79bdaeba08ae9426ff72caaed881bd91179d6c27f852b0e18ec77ba76c3cdbfb33ac84336c5858c80b0732ad9d0821fe4b08a5d57b9d7addb7c868e501e0b5
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1