Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2023 14:46
Static task
static1
General
-
Target
187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe
-
Size
1.1MB
-
MD5
f80b4f915aace5b0ede345bf227d2d96
-
SHA1
4aeeb87b85a4daf1e08dab31ac9eac53913dd584
-
SHA256
187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c
-
SHA512
e74f8f746b53817e4a4fb4f2c1662f376a9bd79b1b2a5fb075279abe3204762fb1fbdb8abb05f6cfc3066dfe9a5bd83a59b3498ce2773b9596319d72a0c1eacc
-
SSDEEP
24576:9yCFFpeejZyLTFjdDG85pA3sTRyHyuFEQUxv005tXe:Y0neewLhhDPE3DFEv
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr809115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr809115.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr809115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr809115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr809115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr809115.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu375275.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si367221.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 1656 un019468.exe 4324 un036163.exe 4432 pr809115.exe 1996 qu375275.exe 2036 1.exe 3968 rk318765.exe 4972 si367221.exe 4176 oneetx.exe 1364 oneetx.exe 3872 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4872 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr809115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr809115.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un019468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un019468.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un036163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un036163.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 244 4432 WerFault.exe 86 1364 1996 WerFault.exe 89 2092 4972 WerFault.exe 95 1500 4972 WerFault.exe 95 3660 4972 WerFault.exe 95 2916 4972 WerFault.exe 95 1360 4972 WerFault.exe 95 3272 4972 WerFault.exe 95 4552 4972 WerFault.exe 95 2020 4972 WerFault.exe 95 4344 4972 WerFault.exe 95 3344 4176 WerFault.exe 114 5012 4176 WerFault.exe 114 1180 4176 WerFault.exe 114 2724 4176 WerFault.exe 114 2468 4176 WerFault.exe 114 2464 4176 WerFault.exe 114 4468 4176 WerFault.exe 114 4184 4176 WerFault.exe 114 2112 4176 WerFault.exe 114 2168 4176 WerFault.exe 114 4856 4176 WerFault.exe 114 1284 4972 WerFault.exe 95 3884 1364 WerFault.exe 141 4616 4176 WerFault.exe 114 2824 4176 WerFault.exe 114 2036 4176 WerFault.exe 114 4688 4176 WerFault.exe 114 4112 3872 WerFault.exe 151 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4432 pr809115.exe 4432 pr809115.exe 2036 1.exe 3968 rk318765.exe 2036 1.exe 3968 rk318765.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4432 pr809115.exe Token: SeDebugPrivilege 1996 qu375275.exe Token: SeDebugPrivilege 2036 1.exe Token: SeDebugPrivilege 3968 rk318765.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4972 si367221.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1656 2604 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe 84 PID 2604 wrote to memory of 1656 2604 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe 84 PID 2604 wrote to memory of 1656 2604 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe 84 PID 1656 wrote to memory of 4324 1656 un019468.exe 85 PID 1656 wrote to memory of 4324 1656 un019468.exe 85 PID 1656 wrote to memory of 4324 1656 un019468.exe 85 PID 4324 wrote to memory of 4432 4324 un036163.exe 86 PID 4324 wrote to memory of 4432 4324 un036163.exe 86 PID 4324 wrote to memory of 4432 4324 un036163.exe 86 PID 4324 wrote to memory of 1996 4324 un036163.exe 89 PID 4324 wrote to memory of 1996 4324 un036163.exe 89 PID 4324 wrote to memory of 1996 4324 un036163.exe 89 PID 1996 wrote to memory of 2036 1996 qu375275.exe 90 PID 1996 wrote to memory of 2036 1996 qu375275.exe 90 PID 1996 wrote to memory of 2036 1996 qu375275.exe 90 PID 1656 wrote to memory of 3968 1656 un019468.exe 93 PID 1656 wrote to memory of 3968 1656 un019468.exe 93 PID 1656 wrote to memory of 3968 1656 un019468.exe 93 PID 2604 wrote to memory of 4972 2604 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe 95 PID 2604 wrote to memory of 4972 2604 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe 95 PID 2604 wrote to memory of 4972 2604 187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe 95 PID 4972 wrote to memory of 4176 4972 si367221.exe 114 PID 4972 wrote to memory of 4176 4972 si367221.exe 114 PID 4972 wrote to memory of 4176 4972 si367221.exe 114 PID 4176 wrote to memory of 1464 4176 oneetx.exe 129 PID 4176 wrote to memory of 1464 4176 oneetx.exe 129 PID 4176 wrote to memory of 1464 4176 oneetx.exe 129 PID 4176 wrote to memory of 4872 4176 oneetx.exe 148 PID 4176 wrote to memory of 4872 4176 oneetx.exe 148 PID 4176 wrote to memory of 4872 4176 oneetx.exe 148
Processes
-
C:\Users\Admin\AppData\Local\Temp\187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe"C:\Users\Admin\AppData\Local\Temp\187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un019468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un019468.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un036163.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un036163.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr809115.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr809115.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 10845⤵
- Program crash
PID:244
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu375275.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu375275.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 15005⤵
- Program crash
PID:1364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk318765.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk318765.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367221.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 6963⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 7243⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8123⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9603⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8643⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9763⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12163⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12443⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12403⤵
- Program crash
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6924⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 7924⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 9164⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10524⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10884⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10884⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10964⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 9924⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 7644⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 12724⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 7284⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 11124⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 16244⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 11324⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 16044⤵
- Program crash
PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8683⤵
- Program crash
PID:1284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4432 -ip 44321⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1996 -ip 19961⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4972 -ip 49721⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4972 -ip 49721⤵PID:524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4972 -ip 49721⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4972 -ip 49721⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4972 -ip 49721⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4972 -ip 49721⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4972 -ip 49721⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4972 -ip 49721⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4972 -ip 49721⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4176 -ip 41761⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4176 -ip 41761⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4176 -ip 41761⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4176 -ip 41761⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4176 -ip 41761⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4176 -ip 41761⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4176 -ip 41761⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4176 -ip 41761⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4176 -ip 41761⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4176 -ip 41761⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4176 -ip 41761⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4972 -ip 49721⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 3202⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1364 -ip 13641⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4176 -ip 41761⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4176 -ip 41761⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4176 -ip 41761⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 3162⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4176 -ip 41761⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3872 -ip 38721⤵PID:8
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
810KB
MD598887515051d66ad1878f5d532e551d7
SHA1fa89481aecb2136bd5f1207b859b536013f499d1
SHA2566b829cb4c8626c66b102d81b4a84e370d7ed2e9c509c6d4ed2751327aba2f7ce
SHA5125c4edc43523b96e84f6010d11255f51e1aba777164a54e7b122b5e8229489a492a6c42c85edd5cba9cccfcbae438c5622db77aaa7af6fb21c858a73490525d00
-
Filesize
810KB
MD598887515051d66ad1878f5d532e551d7
SHA1fa89481aecb2136bd5f1207b859b536013f499d1
SHA2566b829cb4c8626c66b102d81b4a84e370d7ed2e9c509c6d4ed2751327aba2f7ce
SHA5125c4edc43523b96e84f6010d11255f51e1aba777164a54e7b122b5e8229489a492a6c42c85edd5cba9cccfcbae438c5622db77aaa7af6fb21c858a73490525d00
-
Filesize
168KB
MD546e4d499ab01fd2eb65e185c9c5f1574
SHA16a67c0026616c57d38d833ecb0a4b31be7deb8d1
SHA256d38a883d51fea30d8ef944232ed7f52a05f1e4b9861c73188a496cadec065665
SHA512df522a9071f324b83870358a7b354973adc9b00c527e9e978be7bc98ee22ce4cc9bee0ad1726d6026ca317ee393b2d9dc9ce783154cd934f0fc4b3ca04daae47
-
Filesize
168KB
MD546e4d499ab01fd2eb65e185c9c5f1574
SHA16a67c0026616c57d38d833ecb0a4b31be7deb8d1
SHA256d38a883d51fea30d8ef944232ed7f52a05f1e4b9861c73188a496cadec065665
SHA512df522a9071f324b83870358a7b354973adc9b00c527e9e978be7bc98ee22ce4cc9bee0ad1726d6026ca317ee393b2d9dc9ce783154cd934f0fc4b3ca04daae47
-
Filesize
656KB
MD518fed05ca6ed7d5ec4bb4d97a6e8126a
SHA1dc5e2550f14a8a2772be21d44c8abb63116b1b8a
SHA256963f1e039b1e55b50eb7d41e21971e242699e50d293389e785d11cca7c8dab9e
SHA512d802596a7f2111492f8425e02a3a2affb6d04482218b0d72fab52b83aa1c892b1fef816ff9c2f65da9599cb8c806c8cea2afd60eb2ea584ea55978f547b0505c
-
Filesize
656KB
MD518fed05ca6ed7d5ec4bb4d97a6e8126a
SHA1dc5e2550f14a8a2772be21d44c8abb63116b1b8a
SHA256963f1e039b1e55b50eb7d41e21971e242699e50d293389e785d11cca7c8dab9e
SHA512d802596a7f2111492f8425e02a3a2affb6d04482218b0d72fab52b83aa1c892b1fef816ff9c2f65da9599cb8c806c8cea2afd60eb2ea584ea55978f547b0505c
-
Filesize
261KB
MD55e38af1f315b8305b7616631b161eabe
SHA1f600b0c48d0ba953db14f3c8bfb09d8881281213
SHA25631d27b11c9b948d1b3c2f2e6b0b612db8d9578a4270a13a3c45ca71389235fc0
SHA512e85b01f59b94d8e54826c26357147683f70bde3b7df2bf5adb3af0d80d5586ba14d917183c2d9807073315a627757b276a30b3c821ceca3c32005a4b23cb82dc
-
Filesize
261KB
MD55e38af1f315b8305b7616631b161eabe
SHA1f600b0c48d0ba953db14f3c8bfb09d8881281213
SHA25631d27b11c9b948d1b3c2f2e6b0b612db8d9578a4270a13a3c45ca71389235fc0
SHA512e85b01f59b94d8e54826c26357147683f70bde3b7df2bf5adb3af0d80d5586ba14d917183c2d9807073315a627757b276a30b3c821ceca3c32005a4b23cb82dc
-
Filesize
445KB
MD587f19e33d91ee3f445c07529ac7c6e3e
SHA1809769ed95a9584e76c5d89d42241c86cdab59d7
SHA2567ec55bf7b0702b5dde372b28d12eefad9a60b08e32d9c0c45424a9737755cee8
SHA5125717c937701a13197b8ea99bb539fe2d9ff18d6e9f780217f24ea0df7a69994fc14958df04a727878e04928653e88006354d26723a8299d3fdefbb9d2908ed61
-
Filesize
445KB
MD587f19e33d91ee3f445c07529ac7c6e3e
SHA1809769ed95a9584e76c5d89d42241c86cdab59d7
SHA2567ec55bf7b0702b5dde372b28d12eefad9a60b08e32d9c0c45424a9737755cee8
SHA5125717c937701a13197b8ea99bb539fe2d9ff18d6e9f780217f24ea0df7a69994fc14958df04a727878e04928653e88006354d26723a8299d3fdefbb9d2908ed61
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1