Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 13:34
Static task
static1
General
-
Target
c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe
-
Size
1.1MB
-
MD5
dbcaa29eaa3a43e220d621f52c67e0ef
-
SHA1
9c1f4424f811c6db5c558d99517ec6c4a9349a77
-
SHA256
c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5
-
SHA512
ebcfbe591e9f699671b8ec3cf7f6279800f94610ebe2eea87adb79690f5351af76a7e72a8fd1b3882ab0845a12fc36902534815cf2a61be32cb0bc9f0ebcbf28
-
SSDEEP
24576:wy6JZpvVmqCPuPKTrXvBAaCbAkSTFN0ZUd6WwdrsDY1d:36XXVPKnXvBzrkBtrse
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr667823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr667823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr667823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr667823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr667823.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr667823.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu585655.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si610865.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 2376 un224517.exe 2884 un343841.exe 2540 pr667823.exe 2732 qu585655.exe 4132 1.exe 5068 rk505982.exe 1828 si610865.exe 3220 oneetx.exe 4080 oneetx.exe 2860 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 672 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr667823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr667823.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un224517.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un343841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un343841.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un224517.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 572 2540 WerFault.exe 85 2496 2732 WerFault.exe 91 1632 1828 WerFault.exe 101 1952 1828 WerFault.exe 101 2272 1828 WerFault.exe 101 2480 1828 WerFault.exe 101 1708 1828 WerFault.exe 101 4344 1828 WerFault.exe 101 1960 1828 WerFault.exe 101 3224 1828 WerFault.exe 101 1936 1828 WerFault.exe 101 4600 3220 WerFault.exe 120 3560 3220 WerFault.exe 120 1892 3220 WerFault.exe 120 1320 3220 WerFault.exe 120 4952 3220 WerFault.exe 120 4064 3220 WerFault.exe 120 3144 3220 WerFault.exe 120 5080 3220 WerFault.exe 120 4976 3220 WerFault.exe 120 1876 3220 WerFault.exe 120 980 3220 WerFault.exe 120 4736 3220 WerFault.exe 120 3324 1828 WerFault.exe 101 4672 3220 WerFault.exe 120 4036 4080 WerFault.exe 149 2620 3220 WerFault.exe 120 2748 3220 WerFault.exe 120 4204 3220 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2540 pr667823.exe 2540 pr667823.exe 4132 1.exe 4132 1.exe 5068 rk505982.exe 5068 rk505982.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2540 pr667823.exe Token: SeDebugPrivilege 2732 qu585655.exe Token: SeDebugPrivilege 4132 1.exe Token: SeDebugPrivilege 5068 rk505982.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1828 si610865.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2376 2472 c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe 83 PID 2472 wrote to memory of 2376 2472 c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe 83 PID 2472 wrote to memory of 2376 2472 c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe 83 PID 2376 wrote to memory of 2884 2376 un224517.exe 84 PID 2376 wrote to memory of 2884 2376 un224517.exe 84 PID 2376 wrote to memory of 2884 2376 un224517.exe 84 PID 2884 wrote to memory of 2540 2884 un343841.exe 85 PID 2884 wrote to memory of 2540 2884 un343841.exe 85 PID 2884 wrote to memory of 2540 2884 un343841.exe 85 PID 2884 wrote to memory of 2732 2884 un343841.exe 91 PID 2884 wrote to memory of 2732 2884 un343841.exe 91 PID 2884 wrote to memory of 2732 2884 un343841.exe 91 PID 2732 wrote to memory of 4132 2732 qu585655.exe 93 PID 2732 wrote to memory of 4132 2732 qu585655.exe 93 PID 2732 wrote to memory of 4132 2732 qu585655.exe 93 PID 2376 wrote to memory of 5068 2376 un224517.exe 96 PID 2376 wrote to memory of 5068 2376 un224517.exe 96 PID 2376 wrote to memory of 5068 2376 un224517.exe 96 PID 2472 wrote to memory of 1828 2472 c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe 101 PID 2472 wrote to memory of 1828 2472 c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe 101 PID 2472 wrote to memory of 1828 2472 c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe 101 PID 1828 wrote to memory of 3220 1828 si610865.exe 120 PID 1828 wrote to memory of 3220 1828 si610865.exe 120 PID 1828 wrote to memory of 3220 1828 si610865.exe 120 PID 3220 wrote to memory of 1072 3220 oneetx.exe 135 PID 3220 wrote to memory of 1072 3220 oneetx.exe 135 PID 3220 wrote to memory of 1072 3220 oneetx.exe 135 PID 3220 wrote to memory of 672 3220 oneetx.exe 156 PID 3220 wrote to memory of 672 3220 oneetx.exe 156 PID 3220 wrote to memory of 672 3220 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe"C:\Users\Admin\AppData\Local\Temp\c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224517.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un343841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un343841.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr667823.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr667823.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 10885⤵
- Program crash
PID:572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu585655.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu585655.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 14445⤵
- Program crash
PID:2496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk505982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk505982.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si610865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si610865.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 6963⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 7803⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 8083⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 8643⤵
- Program crash
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 9803⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 8643⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 12203⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 12083⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 13043⤵
- Program crash
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 6924⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 8764⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 8844⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 10524⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 10924⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 11124⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 10764⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 8804⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 7764⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 13364⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 7764⤵
- Program crash
PID:980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 14324⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 11164⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 14444⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 15884⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 15964⤵
- Program crash
PID:4204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 14243⤵
- Program crash
PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2540 -ip 25401⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2732 -ip 27321⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1828 -ip 18281⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1828 -ip 18281⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1828 -ip 18281⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1828 -ip 18281⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1828 -ip 18281⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1828 -ip 18281⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1828 -ip 18281⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1828 -ip 18281⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1828 -ip 18281⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3220 -ip 32201⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3220 -ip 32201⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3220 -ip 32201⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3220 -ip 32201⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3220 -ip 32201⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3220 -ip 32201⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3220 -ip 32201⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3220 -ip 32201⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3220 -ip 32201⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3220 -ip 32201⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3220 -ip 32201⤵PID:712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3220 -ip 32201⤵PID:488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1828 -ip 18281⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 3202⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3220 -ip 32201⤵PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4080 -ip 40801⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3220 -ip 32201⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3220 -ip 32201⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3220 -ip 32201⤵PID:940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
253KB
MD5ccf548678a6b0c7fa4eb57c8c8d68d8a
SHA1cee33b5a6f8d99181c7f763472e2518f690015d2
SHA25656c2b6454635520e95bf5040b0bb9cfe1f6c2fb9503bd12790aacfe1250ec8fc
SHA51299fe9d93284a80ea536a2456c843a165ee03123d914a9f68e066de1bb432dedb2a48f258286b27c5621e36684b10b6630b3498e110844ca238bcaf260878317b
-
Filesize
809KB
MD5c78c1c5bcbf44572526cdf7fbc8b22a6
SHA1f9343f818a6cdf4550752f576162b2518fdabc6b
SHA256681defe74887feca981323c00ab39bf9d4a044a2ea0ab3a1549e769fbc51c99c
SHA512f12c36cbfb4cedb8b842c71d818997bd0fd9e6e63f85b792e322e9a96515259b0702732471f8ad31a1caf5843368c7607f7ccd286fa89896211c5ffc0f651f05
-
Filesize
809KB
MD5c78c1c5bcbf44572526cdf7fbc8b22a6
SHA1f9343f818a6cdf4550752f576162b2518fdabc6b
SHA256681defe74887feca981323c00ab39bf9d4a044a2ea0ab3a1549e769fbc51c99c
SHA512f12c36cbfb4cedb8b842c71d818997bd0fd9e6e63f85b792e322e9a96515259b0702732471f8ad31a1caf5843368c7607f7ccd286fa89896211c5ffc0f651f05
-
Filesize
168KB
MD54de6cd7369388418ef2d36353f45fd47
SHA10f48f64e78270177f2faf562280f280fb12a09c2
SHA256084603239a937db61b2536b4af2530ece0347d787592829426db041645412650
SHA51223ef7695a348477cf9ca7c9a18e855dc2fd8695edd58dbe38e84f9dd92b2177f5defd615cb840ab2448171a9627589e369c1cdc8312fef4903ce635e4d3333d9
-
Filesize
168KB
MD54de6cd7369388418ef2d36353f45fd47
SHA10f48f64e78270177f2faf562280f280fb12a09c2
SHA256084603239a937db61b2536b4af2530ece0347d787592829426db041645412650
SHA51223ef7695a348477cf9ca7c9a18e855dc2fd8695edd58dbe38e84f9dd92b2177f5defd615cb840ab2448171a9627589e369c1cdc8312fef4903ce635e4d3333d9
-
Filesize
656KB
MD5c26faf17adbd64060c7636da6e517a60
SHA1c5b138ef43042e65d85104a3921b3d27e829d101
SHA256a9e9066efe5da3b4a56e3f83b3759a3eeb80578aea82fb80836f889ee40f56ef
SHA5123d2bda9348c0f2b5ef10f3c456b6e8608e04ad43f837b789fc5d63b619f0003e5517c00fd4695880767f99203bd53a2fad4354a16490fddaa23b258b487acac1
-
Filesize
656KB
MD5c26faf17adbd64060c7636da6e517a60
SHA1c5b138ef43042e65d85104a3921b3d27e829d101
SHA256a9e9066efe5da3b4a56e3f83b3759a3eeb80578aea82fb80836f889ee40f56ef
SHA5123d2bda9348c0f2b5ef10f3c456b6e8608e04ad43f837b789fc5d63b619f0003e5517c00fd4695880767f99203bd53a2fad4354a16490fddaa23b258b487acac1
-
Filesize
261KB
MD506d7dd8b31665ef4c25ca09e791cfc37
SHA1dbe0fbdc3ac96537f97523d666a0c1613be0322d
SHA25629b6be9b61f640f64701e3177fe01c6e799b594d3da8e8e003ddafe98c143c4b
SHA512affae5c792da29e89836db5e993de757cc9a69988151b863f353b4f84f660c8e695f0d2381c17e768225c2ced4a65a40ffc2bc4659d28cf92090eb71462cdb5e
-
Filesize
261KB
MD506d7dd8b31665ef4c25ca09e791cfc37
SHA1dbe0fbdc3ac96537f97523d666a0c1613be0322d
SHA25629b6be9b61f640f64701e3177fe01c6e799b594d3da8e8e003ddafe98c143c4b
SHA512affae5c792da29e89836db5e993de757cc9a69988151b863f353b4f84f660c8e695f0d2381c17e768225c2ced4a65a40ffc2bc4659d28cf92090eb71462cdb5e
-
Filesize
445KB
MD5e64c15bb73c8ef1d4f899f4b7b1a91c8
SHA1445ac2d2c9d70824bd9833a0ab9a281dac539cd6
SHA25642247a0efd18460f9c9b4419e54705da39b7783e3ab4d958ba8b5b3afa091ca3
SHA5124da7f2bb36b4b3ec078eece58e2461d52933394d9734d1efe7ba5e42dcda93fd6cdff83e67d8619456f7a51491f72ff8cf1f7d4f2f1c9da0d9176271899c54b2
-
Filesize
445KB
MD5e64c15bb73c8ef1d4f899f4b7b1a91c8
SHA1445ac2d2c9d70824bd9833a0ab9a281dac539cd6
SHA25642247a0efd18460f9c9b4419e54705da39b7783e3ab4d958ba8b5b3afa091ca3
SHA5124da7f2bb36b4b3ec078eece58e2461d52933394d9734d1efe7ba5e42dcda93fd6cdff83e67d8619456f7a51491f72ff8cf1f7d4f2f1c9da0d9176271899c54b2
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1