Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 10:32
Static task
static1
General
-
Target
3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe
-
Size
940KB
-
MD5
7d500b0bc4cf1f648b1d6232e07852f8
-
SHA1
e45a53897500d91355bbc973089eb07ca53916c6
-
SHA256
3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1
-
SHA512
90fbef3033a680d6b492fe951c30e12c10c47f77f99347656a5af36dcb3de246fa20e1bce34d908e51b8e1c60af8a4ef8048d32d6bc33b099c7abf8c378bae58
-
SSDEEP
24576:ZyzI8OEoO1WDr+X0BS4eAC8MVt1i9NqurHndL1:MU8OE/1RmSHArMfeNqex
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it092609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it092609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it092609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it092609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it092609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it092609.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr996238.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr587400.exe -
Executes dropped EXE 10 IoCs
pid Process 4388 ziWm2406.exe 4556 ziLi8322.exe 4016 it092609.exe 216 jr587400.exe 4312 1.exe 2652 kp385865.exe 4768 lr996238.exe 4972 oneetx.exe 2308 oneetx.exe 1900 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1496 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it092609.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziLi8322.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWm2406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWm2406.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLi8322.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5008 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 1444 216 WerFault.exe 89 3008 4768 WerFault.exe 95 4148 4768 WerFault.exe 95 1660 4768 WerFault.exe 95 2340 4768 WerFault.exe 95 916 4768 WerFault.exe 95 4368 4768 WerFault.exe 95 2404 4768 WerFault.exe 95 4732 4768 WerFault.exe 95 676 4768 WerFault.exe 95 400 4768 WerFault.exe 95 2056 4972 WerFault.exe 115 4864 4972 WerFault.exe 115 4300 4972 WerFault.exe 115 4868 4972 WerFault.exe 115 1812 4972 WerFault.exe 115 3716 4972 WerFault.exe 115 3332 4972 WerFault.exe 115 2940 4972 WerFault.exe 115 2660 4972 WerFault.exe 115 4292 4972 WerFault.exe 115 4976 4972 WerFault.exe 115 4932 2308 WerFault.exe 145 4692 4972 WerFault.exe 115 3160 4972 WerFault.exe 115 4180 4972 WerFault.exe 115 5088 1900 WerFault.exe 155 2524 4972 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4016 it092609.exe 4016 it092609.exe 4312 1.exe 2652 kp385865.exe 4312 1.exe 2652 kp385865.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4016 it092609.exe Token: SeDebugPrivilege 216 jr587400.exe Token: SeDebugPrivilege 4312 1.exe Token: SeDebugPrivilege 2652 kp385865.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4768 lr996238.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4388 5000 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe 83 PID 5000 wrote to memory of 4388 5000 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe 83 PID 5000 wrote to memory of 4388 5000 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe 83 PID 4388 wrote to memory of 4556 4388 ziWm2406.exe 84 PID 4388 wrote to memory of 4556 4388 ziWm2406.exe 84 PID 4388 wrote to memory of 4556 4388 ziWm2406.exe 84 PID 4556 wrote to memory of 4016 4556 ziLi8322.exe 85 PID 4556 wrote to memory of 4016 4556 ziLi8322.exe 85 PID 4556 wrote to memory of 216 4556 ziLi8322.exe 89 PID 4556 wrote to memory of 216 4556 ziLi8322.exe 89 PID 4556 wrote to memory of 216 4556 ziLi8322.exe 89 PID 216 wrote to memory of 4312 216 jr587400.exe 90 PID 216 wrote to memory of 4312 216 jr587400.exe 90 PID 216 wrote to memory of 4312 216 jr587400.exe 90 PID 4388 wrote to memory of 2652 4388 ziWm2406.exe 93 PID 4388 wrote to memory of 2652 4388 ziWm2406.exe 93 PID 4388 wrote to memory of 2652 4388 ziWm2406.exe 93 PID 5000 wrote to memory of 4768 5000 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe 95 PID 5000 wrote to memory of 4768 5000 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe 95 PID 5000 wrote to memory of 4768 5000 3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe 95 PID 4768 wrote to memory of 4972 4768 lr996238.exe 115 PID 4768 wrote to memory of 4972 4768 lr996238.exe 115 PID 4768 wrote to memory of 4972 4768 lr996238.exe 115 PID 4972 wrote to memory of 4140 4972 oneetx.exe 135 PID 4972 wrote to memory of 4140 4972 oneetx.exe 135 PID 4972 wrote to memory of 4140 4972 oneetx.exe 135 PID 4972 wrote to memory of 1496 4972 oneetx.exe 152 PID 4972 wrote to memory of 1496 4972 oneetx.exe 152 PID 4972 wrote to memory of 1496 4972 oneetx.exe 152
Processes
-
C:\Users\Admin\AppData\Local\Temp\3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe"C:\Users\Admin\AppData\Local\Temp\3378285a554bb1b488286e8326b301570d24c16b88d1b71ffcf453cd6a3374a1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWm2406.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWm2406.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLi8322.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLi8322.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it092609.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it092609.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr587400.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr587400.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 13765⤵
- Program crash
PID:1444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp385865.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp385865.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr996238.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr996238.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 6963⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7723⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8003⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8083⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 9563⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 9563⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 12163⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 12283⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 13163⤵
- Program crash
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 6924⤵
- Program crash
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8444⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8884⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 10524⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 10724⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 11084⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 11164⤵
- Program crash
PID:3332
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9924⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 6844⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 6924⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 7564⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 11364⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 16364⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 10724⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 16524⤵
- Program crash
PID:2524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 13563⤵
- Program crash
PID:400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 216 -ip 2161⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4768 -ip 47681⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4768 -ip 47681⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4768 -ip 47681⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4768 -ip 47681⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4768 -ip 47681⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4768 -ip 47681⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4768 -ip 47681⤵PID:364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4768 -ip 47681⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4972 -ip 49721⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4972 -ip 49721⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4972 -ip 49721⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4972 -ip 49721⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4972 -ip 49721⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4972 -ip 49721⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4972 -ip 49721⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4972 -ip 49721⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4972 -ip 49721⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4972 -ip 49721⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4972 -ip 49721⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 3122⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2308 -ip 23081⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4972 -ip 49721⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4972 -ip 49721⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4972 -ip 49721⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 3162⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1900 -ip 19001⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4972 -ip 49721⤵PID:960
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
668KB
MD578c32a12117f376303bcec6594f74ed0
SHA15d847ba788b4e4c81b8b944ad050a98b06112695
SHA256519c83e279b7ca7a3d58fc403cfef1203f323e23a3835f84c76e66eb1da9f4d1
SHA5124cfa4dacce45a70d16073d44392a4d63debe90ca4677d1905d75652f75a77062b8e701b7b3cb41e190a80cc715f8cb76d94d33fb919b39e54f32f752855de0bd
-
Filesize
668KB
MD578c32a12117f376303bcec6594f74ed0
SHA15d847ba788b4e4c81b8b944ad050a98b06112695
SHA256519c83e279b7ca7a3d58fc403cfef1203f323e23a3835f84c76e66eb1da9f4d1
SHA5124cfa4dacce45a70d16073d44392a4d63debe90ca4677d1905d75652f75a77062b8e701b7b3cb41e190a80cc715f8cb76d94d33fb919b39e54f32f752855de0bd
-
Filesize
168KB
MD5caa7508a2d8f65f463d2b27b96473452
SHA1f2d9d358f32d61bf595d6307cee1c7d817d448b4
SHA256dae35cb01a51b04e1b439958f2f17453a8681375f7d3ffc40f6a98905e3c844b
SHA5121ee5baebb1f787971f53f5c2d91731d8ddf8a05ed9f16f0eca1f0cff592753960ed3990d4cafc111e0b6b4f9b4d0d431b7a19c592b53a30c8d3584afec5acf38
-
Filesize
168KB
MD5caa7508a2d8f65f463d2b27b96473452
SHA1f2d9d358f32d61bf595d6307cee1c7d817d448b4
SHA256dae35cb01a51b04e1b439958f2f17453a8681375f7d3ffc40f6a98905e3c844b
SHA5121ee5baebb1f787971f53f5c2d91731d8ddf8a05ed9f16f0eca1f0cff592753960ed3990d4cafc111e0b6b4f9b4d0d431b7a19c592b53a30c8d3584afec5acf38
-
Filesize
515KB
MD535ee8c0e20fb201f6e8329bf98a40439
SHA1d18db6a331c61f1bc05cf5de67d5ac51ff4b7f5f
SHA2564f82479d4a7b57744a8919df1c5293bad5116516f327d1b964369d1908fbc0b8
SHA512049123068a8c82f511994e50ce72246fabf11b809527f190750a403d1a4c14af40d676dc50d786749ee3a67179b82e1aafdf54b3c305054deeac64473ca3125e
-
Filesize
515KB
MD535ee8c0e20fb201f6e8329bf98a40439
SHA1d18db6a331c61f1bc05cf5de67d5ac51ff4b7f5f
SHA2564f82479d4a7b57744a8919df1c5293bad5116516f327d1b964369d1908fbc0b8
SHA512049123068a8c82f511994e50ce72246fabf11b809527f190750a403d1a4c14af40d676dc50d786749ee3a67179b82e1aafdf54b3c305054deeac64473ca3125e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
445KB
MD54384f107c991a070cb18c7cebd3d5b2b
SHA1014a9e592135c19ff30e52e9c7311827daa91e15
SHA2563339d72bc0fe6d139fc4565d51594dfe96bc72607636f7d261d3226d22b0e72f
SHA512734a917597d27fd17016a62ed43c2650616e75f5daf01ac780628c7d74f9c99cf77932abee7e0ae75877e5d7de3ca77de994b28f1993eb053ac6dfa81d84b206
-
Filesize
445KB
MD54384f107c991a070cb18c7cebd3d5b2b
SHA1014a9e592135c19ff30e52e9c7311827daa91e15
SHA2563339d72bc0fe6d139fc4565d51594dfe96bc72607636f7d261d3226d22b0e72f
SHA512734a917597d27fd17016a62ed43c2650616e75f5daf01ac780628c7d74f9c99cf77932abee7e0ae75877e5d7de3ca77de994b28f1993eb053ac6dfa81d84b206
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1