Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 08:45
Static task
static1
General
-
Target
de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe
-
Size
1.1MB
-
MD5
9ea54d8b40d2b2d6b188036f658583db
-
SHA1
5a7f5bbc2355c3573cce0833ffe6515522a505bd
-
SHA256
de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f
-
SHA512
8ad3211f1599a0dac4721b2c60a71a287b578680a1f16da8ffbf3bc47c45df73090cea834ee876ab03232d4eb806ddf882c3e162acef9520b61c580d38b1a562
-
SSDEEP
24576:zyVFIVfOpBEMmyRcX5xEWD3S/vePwtEUVlLaTpfh:GVGVGpqMTQ5xEWrKv54p
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr637773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr637773.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr637773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr637773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr637773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr637773.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu785648.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si826244.exe -
Executes dropped EXE 10 IoCs
pid Process 2076 un354304.exe 2660 un549623.exe 944 pr637773.exe 4120 qu785648.exe 4568 1.exe 3816 rk836883.exe 4624 si826244.exe 2044 oneetx.exe 528 oneetx.exe 640 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3880 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr637773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr637773.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un354304.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un354304.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un549623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un549623.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 1060 944 WerFault.exe 87 4740 4120 WerFault.exe 90 3880 4624 WerFault.exe 96 2980 4624 WerFault.exe 96 4652 4624 WerFault.exe 96 2028 4624 WerFault.exe 96 2068 4624 WerFault.exe 96 656 4624 WerFault.exe 96 1308 4624 WerFault.exe 96 3948 4624 WerFault.exe 96 3544 4624 WerFault.exe 96 4508 4624 WerFault.exe 96 4084 2044 WerFault.exe 115 5100 2044 WerFault.exe 115 496 2044 WerFault.exe 115 484 2044 WerFault.exe 115 848 2044 WerFault.exe 115 2040 2044 WerFault.exe 115 4608 2044 WerFault.exe 115 4296 2044 WerFault.exe 115 2508 2044 WerFault.exe 115 1516 2044 WerFault.exe 115 4300 2044 WerFault.exe 115 4500 2044 WerFault.exe 115 4676 2044 WerFault.exe 115 5016 528 WerFault.exe 146 4004 2044 WerFault.exe 115 2604 2044 WerFault.exe 115 3256 2044 WerFault.exe 115 652 640 WerFault.exe 156 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 944 pr637773.exe 944 pr637773.exe 4568 1.exe 3816 rk836883.exe 4568 1.exe 3816 rk836883.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 944 pr637773.exe Token: SeDebugPrivilege 4120 qu785648.exe Token: SeDebugPrivilege 4568 1.exe Token: SeDebugPrivilege 3816 rk836883.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4624 si826244.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2076 1128 de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe 85 PID 1128 wrote to memory of 2076 1128 de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe 85 PID 1128 wrote to memory of 2076 1128 de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe 85 PID 2076 wrote to memory of 2660 2076 un354304.exe 86 PID 2076 wrote to memory of 2660 2076 un354304.exe 86 PID 2076 wrote to memory of 2660 2076 un354304.exe 86 PID 2660 wrote to memory of 944 2660 un549623.exe 87 PID 2660 wrote to memory of 944 2660 un549623.exe 87 PID 2660 wrote to memory of 944 2660 un549623.exe 87 PID 2660 wrote to memory of 4120 2660 un549623.exe 90 PID 2660 wrote to memory of 4120 2660 un549623.exe 90 PID 2660 wrote to memory of 4120 2660 un549623.exe 90 PID 4120 wrote to memory of 4568 4120 qu785648.exe 91 PID 4120 wrote to memory of 4568 4120 qu785648.exe 91 PID 4120 wrote to memory of 4568 4120 qu785648.exe 91 PID 2076 wrote to memory of 3816 2076 un354304.exe 94 PID 2076 wrote to memory of 3816 2076 un354304.exe 94 PID 2076 wrote to memory of 3816 2076 un354304.exe 94 PID 1128 wrote to memory of 4624 1128 de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe 96 PID 1128 wrote to memory of 4624 1128 de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe 96 PID 1128 wrote to memory of 4624 1128 de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe 96 PID 4624 wrote to memory of 2044 4624 si826244.exe 115 PID 4624 wrote to memory of 2044 4624 si826244.exe 115 PID 4624 wrote to memory of 2044 4624 si826244.exe 115 PID 2044 wrote to memory of 452 2044 oneetx.exe 132 PID 2044 wrote to memory of 452 2044 oneetx.exe 132 PID 2044 wrote to memory of 452 2044 oneetx.exe 132 PID 2044 wrote to memory of 3880 2044 oneetx.exe 151 PID 2044 wrote to memory of 3880 2044 oneetx.exe 151 PID 2044 wrote to memory of 3880 2044 oneetx.exe 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe"C:\Users\Admin\AppData\Local\Temp\de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un354304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un354304.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un549623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un549623.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr637773.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr637773.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 10805⤵
- Program crash
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu785648.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu785648.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 12205⤵
- Program crash
PID:4740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk836883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk836883.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si826244.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si826244.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 6963⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 7643⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 8563⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 9683⤵
- Program crash
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 9643⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 9643⤵
- Program crash
PID:656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 12163⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 12083⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 13123⤵
- Program crash
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 6924⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 8444⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 8924⤵
- Program crash
PID:496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 10604⤵
- Program crash
PID:484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 10484⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 10884⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 11284⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 9924⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7524⤵
- Program crash
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 12844⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 11044⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 15364⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 11724⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 16204⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 10804⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 16364⤵
- Program crash
PID:3256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 13643⤵
- Program crash
PID:4508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 944 -ip 9441⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4120 -ip 41201⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4624 -ip 46241⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4624 -ip 46241⤵PID:708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4624 -ip 46241⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4624 -ip 46241⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4624 -ip 46241⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4624 -ip 46241⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4624 -ip 46241⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4624 -ip 46241⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4624 -ip 46241⤵PID:948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4624 -ip 46241⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2044 -ip 20441⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2044 -ip 20441⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2044 -ip 20441⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2044 -ip 20441⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2044 -ip 20441⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2044 -ip 20441⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2044 -ip 20441⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2044 -ip 20441⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2044 -ip 20441⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2044 -ip 20441⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2044 -ip 20441⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2044 -ip 20441⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2044 -ip 20441⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 3202⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 528 -ip 5281⤵PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2044 -ip 20441⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2044 -ip 20441⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2044 -ip 20441⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 2162⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 640 -ip 6401⤵PID:4148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
253KB
MD52c191400adee287f94c7edfd9225fc16
SHA1f75f7a72378d136b4883b279f0a4da6c698f3912
SHA2568aedf09ae09d53a230fd653b90803b7ec01b3e861f2d1c2490ecaf377a823cba
SHA512ae0f043fba31e46393dfc4503a2b580f27710d66f7bb3500affec8a37b9ddde6a6de008f5ea4045967403825406e1d00536ca3bcfbc1ffe2192f80583fb3ec5a
-
Filesize
806KB
MD545800aeae3487a1d0503f582f98d1139
SHA108a96c072655771f7e870ead49daa776334d03bd
SHA2569fe401498cdb60d7c0c8849f75dbc116a1dc2e5d19d172ac9d7e244a615412cc
SHA512dd5c3569fc56f1c1a9b4467575a93b3d6dd7db2d8b8e694e5219f974264e016c5d5cc87333a8f9cce8d65a04dfe0fead1662456b37cf6449a29a5d9b41b1d1ca
-
Filesize
806KB
MD545800aeae3487a1d0503f582f98d1139
SHA108a96c072655771f7e870ead49daa776334d03bd
SHA2569fe401498cdb60d7c0c8849f75dbc116a1dc2e5d19d172ac9d7e244a615412cc
SHA512dd5c3569fc56f1c1a9b4467575a93b3d6dd7db2d8b8e694e5219f974264e016c5d5cc87333a8f9cce8d65a04dfe0fead1662456b37cf6449a29a5d9b41b1d1ca
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
652KB
MD5a62ae76df5c6dbe0e6940a8192670c70
SHA1818817bd2831af850c4637cee6bbe9cdc2fcd1a0
SHA25654fbfc6a06af8c47edac35ca6c1bde98d2477f6562d2d7997353b3ecb8188606
SHA5125b8dc537d28b803477c5cf1c40d711dbc991b5ef1425cbe014927855563d5b0004c0c0c42757cb2c9c082d4ea2646337a1351979cc7e197c7a88168fc89e51de
-
Filesize
652KB
MD5a62ae76df5c6dbe0e6940a8192670c70
SHA1818817bd2831af850c4637cee6bbe9cdc2fcd1a0
SHA25654fbfc6a06af8c47edac35ca6c1bde98d2477f6562d2d7997353b3ecb8188606
SHA5125b8dc537d28b803477c5cf1c40d711dbc991b5ef1425cbe014927855563d5b0004c0c0c42757cb2c9c082d4ea2646337a1351979cc7e197c7a88168fc89e51de
-
Filesize
262KB
MD58bbeaab853de6e3913b70f9cdcd0ace1
SHA1ae9c658ad878e1ead66103b9b0276169ecffe549
SHA2565589d67d137af9446ce02ad82f44ec85565b027a486f74c9abb5d3a5e7160c9a
SHA51262a18a6439d9977ade79d7859ce89cc02c87ccc07b1d52208d5ba96edf5a5cc07977e5179a511e35df0a52d172a94c85edc75ae7ee3df23e7ba38411f6d06f50
-
Filesize
262KB
MD58bbeaab853de6e3913b70f9cdcd0ace1
SHA1ae9c658ad878e1ead66103b9b0276169ecffe549
SHA2565589d67d137af9446ce02ad82f44ec85565b027a486f74c9abb5d3a5e7160c9a
SHA51262a18a6439d9977ade79d7859ce89cc02c87ccc07b1d52208d5ba96edf5a5cc07977e5179a511e35df0a52d172a94c85edc75ae7ee3df23e7ba38411f6d06f50
-
Filesize
445KB
MD5c9f04721b5b6d6dd337fadf662f2b416
SHA12bb76a4e3939aa6be7ae6e33b1781094cb53b3c7
SHA256b65b888224f0c8529dc2bf4bc28084e443af9fc3a4f3588b1e91961ef470b737
SHA512034d1eca559eebe2b224bc26554e84865aa19fd4f1ea82e3c3f40bf40716a087d5034c7ec42b245d93eb2442f5438d9286d1fb08d0c19cd8beef7fc9225e3cba
-
Filesize
445KB
MD5c9f04721b5b6d6dd337fadf662f2b416
SHA12bb76a4e3939aa6be7ae6e33b1781094cb53b3c7
SHA256b65b888224f0c8529dc2bf4bc28084e443af9fc3a4f3588b1e91961ef470b737
SHA512034d1eca559eebe2b224bc26554e84865aa19fd4f1ea82e3c3f40bf40716a087d5034c7ec42b245d93eb2442f5438d9286d1fb08d0c19cd8beef7fc9225e3cba
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1