Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 09:58
Static task
static1
General
-
Target
9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe
-
Size
1.1MB
-
MD5
f0ae044fe01382ddd427ee4333897531
-
SHA1
3d374703ec4f5c65b7d342608541067ed8ac542c
-
SHA256
9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29
-
SHA512
928a1998699dc74a61b1a9fc0478847d3eb837d6b26286f16557af7e5e989b4087223c325aeaad88cca5b777c4d4d3d88f45165ac4c1abedb28c4bece903d513
-
SSDEEP
24576:dyQBclZLuuKgXhEE+3KBRkJVbWcTKrXZ7El6Njzkk55zY:4IzZgRxRkObZ7bpw+
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr143860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr143860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr143860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr143860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr143860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr143860.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si090644.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu642254.exe -
Executes dropped EXE 10 IoCs
pid Process 1496 un740576.exe 1240 un420001.exe 4392 pr143860.exe 3824 qu642254.exe 1008 1.exe 2640 rk142857.exe 4112 si090644.exe 348 oneetx.exe 4692 oneetx.exe 5028 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4144 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr143860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr143860.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un740576.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un740576.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un420001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un420001.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 4632 4392 WerFault.exe 85 1272 3824 WerFault.exe 91 1140 4112 WerFault.exe 98 4100 4112 WerFault.exe 98 4500 4112 WerFault.exe 98 1488 4112 WerFault.exe 98 4120 4112 WerFault.exe 98 4456 4112 WerFault.exe 98 1972 4112 WerFault.exe 98 2424 4112 WerFault.exe 98 5052 4112 WerFault.exe 98 2148 4112 WerFault.exe 98 2696 348 WerFault.exe 121 3372 348 WerFault.exe 121 4348 348 WerFault.exe 121 988 348 WerFault.exe 121 2280 348 WerFault.exe 121 3860 348 WerFault.exe 121 1432 348 WerFault.exe 121 4908 348 WerFault.exe 121 4312 348 WerFault.exe 121 4004 348 WerFault.exe 121 4924 348 WerFault.exe 121 3648 348 WerFault.exe 121 3460 4692 WerFault.exe 149 5100 348 WerFault.exe 121 4232 348 WerFault.exe 121 1488 348 WerFault.exe 121 4456 5028 WerFault.exe 159 3872 348 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4392 pr143860.exe 4392 pr143860.exe 2640 rk142857.exe 1008 1.exe 2640 rk142857.exe 1008 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4392 pr143860.exe Token: SeDebugPrivilege 3824 qu642254.exe Token: SeDebugPrivilege 2640 rk142857.exe Token: SeDebugPrivilege 1008 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4112 si090644.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4240 wrote to memory of 1496 4240 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe 83 PID 4240 wrote to memory of 1496 4240 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe 83 PID 4240 wrote to memory of 1496 4240 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe 83 PID 1496 wrote to memory of 1240 1496 un740576.exe 84 PID 1496 wrote to memory of 1240 1496 un740576.exe 84 PID 1496 wrote to memory of 1240 1496 un740576.exe 84 PID 1240 wrote to memory of 4392 1240 un420001.exe 85 PID 1240 wrote to memory of 4392 1240 un420001.exe 85 PID 1240 wrote to memory of 4392 1240 un420001.exe 85 PID 1240 wrote to memory of 3824 1240 un420001.exe 91 PID 1240 wrote to memory of 3824 1240 un420001.exe 91 PID 1240 wrote to memory of 3824 1240 un420001.exe 91 PID 3824 wrote to memory of 1008 3824 qu642254.exe 92 PID 3824 wrote to memory of 1008 3824 qu642254.exe 92 PID 3824 wrote to memory of 1008 3824 qu642254.exe 92 PID 1496 wrote to memory of 2640 1496 un740576.exe 95 PID 1496 wrote to memory of 2640 1496 un740576.exe 95 PID 1496 wrote to memory of 2640 1496 un740576.exe 95 PID 4240 wrote to memory of 4112 4240 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe 98 PID 4240 wrote to memory of 4112 4240 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe 98 PID 4240 wrote to memory of 4112 4240 9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe 98 PID 4112 wrote to memory of 348 4112 si090644.exe 121 PID 4112 wrote to memory of 348 4112 si090644.exe 121 PID 4112 wrote to memory of 348 4112 si090644.exe 121 PID 348 wrote to memory of 4428 348 oneetx.exe 139 PID 348 wrote to memory of 4428 348 oneetx.exe 139 PID 348 wrote to memory of 4428 348 oneetx.exe 139 PID 348 wrote to memory of 4144 348 oneetx.exe 156 PID 348 wrote to memory of 4144 348 oneetx.exe 156 PID 348 wrote to memory of 4144 348 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe"C:\Users\Admin\AppData\Local\Temp\9ce40a759603e65a72b71e976cf1305cddd06e56d028988a5e97c02cdb2a8f29.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740576.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un420001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un420001.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr143860.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr143860.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 10845⤵
- Program crash
PID:4632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu642254.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu642254.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 13845⤵
- Program crash
PID:1272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk142857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk142857.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si090644.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si090644.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 6963⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 7803⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 8563⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 8643⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 9643⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 9643⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 12283⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 12163⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 13243⤵
- Program crash
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 6924⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 9484⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 10724⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 11204⤵
- Program crash
PID:988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 11284⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 11124⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 11684⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 10964⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 10124⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 13004⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 10844⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 13084⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 11884⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 16284⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 15684⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 16364⤵
- Program crash
PID:3872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 13643⤵
- Program crash
PID:2148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4392 -ip 43921⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3824 -ip 38241⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4112 -ip 41121⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4112 -ip 41121⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4112 -ip 41121⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4112 -ip 41121⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4112 -ip 41121⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4112 -ip 41121⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4112 -ip 41121⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4112 -ip 41121⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4112 -ip 41121⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4112 -ip 41121⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 348 -ip 3481⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 348 -ip 3481⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 348 -ip 3481⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 348 -ip 3481⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 348 -ip 3481⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 348 -ip 3481⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 348 -ip 3481⤵PID:3332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 348 -ip 3481⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 348 -ip 3481⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 348 -ip 3481⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 348 -ip 3481⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 348 -ip 3481⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 3242⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4692 -ip 46921⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 348 -ip 3481⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 348 -ip 3481⤵PID:528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 348 -ip 3481⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 3162⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 5028 -ip 50281⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 348 -ip 3481⤵PID:1928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
805KB
MD5a2d03d80296846d0675d76681068b20b
SHA10af199d860fe76c2cb024eb5cb49e6526896abc9
SHA25676d8a6264de619572f4e9888ea67319466e56cc6a0b3609c3ebb9e2890785b13
SHA512775c8e11146678ea275368d388a9189100acc59df23489d0d948d6cd83b3dd94fb15059d39d63fa642d2735b0268809d12fa7d21dfa30ee4ac06d71b404e5568
-
Filesize
805KB
MD5a2d03d80296846d0675d76681068b20b
SHA10af199d860fe76c2cb024eb5cb49e6526896abc9
SHA25676d8a6264de619572f4e9888ea67319466e56cc6a0b3609c3ebb9e2890785b13
SHA512775c8e11146678ea275368d388a9189100acc59df23489d0d948d6cd83b3dd94fb15059d39d63fa642d2735b0268809d12fa7d21dfa30ee4ac06d71b404e5568
-
Filesize
168KB
MD536e905a0c583a132dcfc96acdb88af17
SHA111a27e04f5f61f838cd66353743ef05ee93b4c64
SHA25616413d5fce6efc99fbb47a8d6378e33561245f61806d1c4fd021dc1be37f89e5
SHA512ab64ffc43c551ac6cfb9dc7094a25552a84bf24a2967537172b63b1da280a4ebe0c64454abd027714890648a1e8f3756e4b07958c09a0e8aae13f870139da027
-
Filesize
168KB
MD536e905a0c583a132dcfc96acdb88af17
SHA111a27e04f5f61f838cd66353743ef05ee93b4c64
SHA25616413d5fce6efc99fbb47a8d6378e33561245f61806d1c4fd021dc1be37f89e5
SHA512ab64ffc43c551ac6cfb9dc7094a25552a84bf24a2967537172b63b1da280a4ebe0c64454abd027714890648a1e8f3756e4b07958c09a0e8aae13f870139da027
-
Filesize
651KB
MD5245c6f2a78188f182c0e18a418636452
SHA1a8c59a168161064f1fd011ae93d15f87366fe048
SHA2560c247a7fe6e5a75c89915a2c15066b8fa4f339617438c6082cef5269a4e4ce23
SHA512899e978dac9e2bf1097a37e63d5aee48e2e3a10a071ecd4f3ac7ce190de043c459aeae2e5b0a7582387ba606939d94ea140884c2b55389f4d66f4a067f5f6e4d
-
Filesize
651KB
MD5245c6f2a78188f182c0e18a418636452
SHA1a8c59a168161064f1fd011ae93d15f87366fe048
SHA2560c247a7fe6e5a75c89915a2c15066b8fa4f339617438c6082cef5269a4e4ce23
SHA512899e978dac9e2bf1097a37e63d5aee48e2e3a10a071ecd4f3ac7ce190de043c459aeae2e5b0a7582387ba606939d94ea140884c2b55389f4d66f4a067f5f6e4d
-
Filesize
288KB
MD58fa12b8333a1b22908f6d220bc22a3f0
SHA1a01100880949c2102c18f5fcfab345a89b7888d6
SHA2563faa9c52c514c43c8b056a6449d56e5cb096dd1d32cf7ac6daec62251a110cd7
SHA5126323015a91fc15cf2ad28847d42ad37177a4dadea102d18ef56e1ca37cd0f65b2b239782e5a16da76ed79635317f4bc2f0126795d50ce8b8bebfd53baf04ea21
-
Filesize
288KB
MD58fa12b8333a1b22908f6d220bc22a3f0
SHA1a01100880949c2102c18f5fcfab345a89b7888d6
SHA2563faa9c52c514c43c8b056a6449d56e5cb096dd1d32cf7ac6daec62251a110cd7
SHA5126323015a91fc15cf2ad28847d42ad37177a4dadea102d18ef56e1ca37cd0f65b2b239782e5a16da76ed79635317f4bc2f0126795d50ce8b8bebfd53baf04ea21
-
Filesize
472KB
MD5bab74389559ae4e9fbfa53b2282a269f
SHA179065d76776e1eaef979d8b410702e534776d5be
SHA256b0170a1f54e33772e3f4b4b5f1799579817265788ed635ce877f60677ba81589
SHA5125d09bd19b6fe6e577e1e930b15a713a5ac5043c82a95f6bbff4051cca8df9aee8468b427af32df8a3372928fcbef7d4e31a0c8043dc6e281c8d025cc11cf84a2
-
Filesize
472KB
MD5bab74389559ae4e9fbfa53b2282a269f
SHA179065d76776e1eaef979d8b410702e534776d5be
SHA256b0170a1f54e33772e3f4b4b5f1799579817265788ed635ce877f60677ba81589
SHA5125d09bd19b6fe6e577e1e930b15a713a5ac5043c82a95f6bbff4051cca8df9aee8468b427af32df8a3372928fcbef7d4e31a0c8043dc6e281c8d025cc11cf84a2
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1