Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 15:02
Static task
static1
General
-
Target
913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe
-
Size
1.1MB
-
MD5
36db18085e8cf0df4c4e5fa6aed4f7f9
-
SHA1
0a41a2454d114ab7c89823fef6a810b60a81a1b5
-
SHA256
913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248
-
SHA512
024eef23b7c50c1f085c33981a868a0129f008309989f456243af61a63ca3e1297c521d651bda313f8b2287b8910c72a5aae3c5151c1ef2153d617094bde6fe7
-
SSDEEP
24576:SyROChV/Ts7zfuqT/p4WZU4AuHYhb3UqEJ9rmRFh:5RzH/4zmqDp4iouojRF
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr714774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr714774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr714774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr714774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr714774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr714774.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu838485.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si185658.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 1432 un169378.exe 1900 un333218.exe 1428 pr714774.exe 1748 qu838485.exe 3948 1.exe 3492 rk279881.exe 4700 si185658.exe 3600 oneetx.exe 4592 oneetx.exe 3940 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4956 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr714774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr714774.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un169378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un169378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un333218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un333218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 4644 1428 WerFault.exe 86 5052 1748 WerFault.exe 92 1784 4700 WerFault.exe 98 212 4700 WerFault.exe 98 1692 4700 WerFault.exe 98 2464 4700 WerFault.exe 98 3856 4700 WerFault.exe 98 3172 4700 WerFault.exe 98 1952 4700 WerFault.exe 98 340 4700 WerFault.exe 98 2388 4700 WerFault.exe 98 3792 3600 WerFault.exe 120 3148 3600 WerFault.exe 120 3104 3600 WerFault.exe 120 3660 3600 WerFault.exe 120 4752 3600 WerFault.exe 120 3268 3600 WerFault.exe 120 2100 3600 WerFault.exe 120 1228 3600 WerFault.exe 120 4196 3600 WerFault.exe 120 4368 3600 WerFault.exe 120 4324 3600 WerFault.exe 120 1492 3600 WerFault.exe 120 3332 4700 WerFault.exe 98 1064 4592 WerFault.exe 148 248 3600 WerFault.exe 120 4248 3600 WerFault.exe 120 4788 3600 WerFault.exe 120 1372 3940 WerFault.exe 160 1488 3600 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1428 pr714774.exe 1428 pr714774.exe 3492 rk279881.exe 3948 1.exe 3948 1.exe 3492 rk279881.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1428 pr714774.exe Token: SeDebugPrivilege 1748 qu838485.exe Token: SeDebugPrivilege 3492 rk279881.exe Token: SeDebugPrivilege 3948 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4700 si185658.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1432 3532 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe 84 PID 3532 wrote to memory of 1432 3532 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe 84 PID 3532 wrote to memory of 1432 3532 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe 84 PID 1432 wrote to memory of 1900 1432 un169378.exe 85 PID 1432 wrote to memory of 1900 1432 un169378.exe 85 PID 1432 wrote to memory of 1900 1432 un169378.exe 85 PID 1900 wrote to memory of 1428 1900 un333218.exe 86 PID 1900 wrote to memory of 1428 1900 un333218.exe 86 PID 1900 wrote to memory of 1428 1900 un333218.exe 86 PID 1900 wrote to memory of 1748 1900 un333218.exe 92 PID 1900 wrote to memory of 1748 1900 un333218.exe 92 PID 1900 wrote to memory of 1748 1900 un333218.exe 92 PID 1748 wrote to memory of 3948 1748 qu838485.exe 93 PID 1748 wrote to memory of 3948 1748 qu838485.exe 93 PID 1748 wrote to memory of 3948 1748 qu838485.exe 93 PID 1432 wrote to memory of 3492 1432 un169378.exe 96 PID 1432 wrote to memory of 3492 1432 un169378.exe 96 PID 1432 wrote to memory of 3492 1432 un169378.exe 96 PID 3532 wrote to memory of 4700 3532 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe 98 PID 3532 wrote to memory of 4700 3532 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe 98 PID 3532 wrote to memory of 4700 3532 913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe 98 PID 4700 wrote to memory of 3600 4700 si185658.exe 120 PID 4700 wrote to memory of 3600 4700 si185658.exe 120 PID 4700 wrote to memory of 3600 4700 si185658.exe 120 PID 3600 wrote to memory of 3320 3600 oneetx.exe 136 PID 3600 wrote to memory of 3320 3600 oneetx.exe 136 PID 3600 wrote to memory of 3320 3600 oneetx.exe 136 PID 3600 wrote to memory of 4956 3600 oneetx.exe 157 PID 3600 wrote to memory of 4956 3600 oneetx.exe 157 PID 3600 wrote to memory of 4956 3600 oneetx.exe 157
Processes
-
C:\Users\Admin\AppData\Local\Temp\913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe"C:\Users\Admin\AppData\Local\Temp\913819891ca262b34c108763ec2e6b16817c2fca6abfd2085ce928f612723248.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un169378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un169378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un333218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un333218.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr714774.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr714774.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 10805⤵
- Program crash
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu838485.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu838485.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 13885⤵
- Program crash
PID:5052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk279881.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk279881.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si185658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si185658.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 6963⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 7803⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 7963⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 9603⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 9763⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 9763⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 12163⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 12283⤵
- Program crash
PID:340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 13123⤵
- Program crash
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 6924⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 8324⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 9044⤵
- Program crash
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 10524⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 10604⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 10804⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 11124⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 8884⤵
- Program crash
PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 7884⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 7284⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 7764⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 15364⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 10924⤵
- Program crash
PID:248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 16364⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 15404⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 16444⤵
- Program crash
PID:1488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 14163⤵
- Program crash
PID:3332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1428 -ip 14281⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1748 -ip 17481⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4700 -ip 47001⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4700 -ip 47001⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4700 -ip 47001⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4700 -ip 47001⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4700 -ip 47001⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4700 -ip 47001⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4700 -ip 47001⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4700 -ip 47001⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4700 -ip 47001⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3600 -ip 36001⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3600 -ip 36001⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3600 -ip 36001⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3600 -ip 36001⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3600 -ip 36001⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3600 -ip 36001⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3600 -ip 36001⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3600 -ip 36001⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3600 -ip 36001⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3600 -ip 36001⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3600 -ip 36001⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3600 -ip 36001⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 3122⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4700 -ip 47001⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4592 -ip 45921⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3600 -ip 36001⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3600 -ip 36001⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3600 -ip 36001⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 1802⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3940 -ip 39401⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3600 -ip 36001⤵PID:1288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
809KB
MD5b754dd5c1bee1f8f4d73b87258713fca
SHA1ead9bac18ef53a30fe87d4b5d8d2949cd8ad67c4
SHA256652657859d7ef3f9193aa14057b9afafc1652f84730e14d07879ff2926ca7358
SHA5122867e26e2a46e81d4b3efe84a271a294996f950e57370a85015e95557dddb4c25f818e77f72f699bac2254927151cb1f6bb76e952534d712d18e1036be4fb300
-
Filesize
809KB
MD5b754dd5c1bee1f8f4d73b87258713fca
SHA1ead9bac18ef53a30fe87d4b5d8d2949cd8ad67c4
SHA256652657859d7ef3f9193aa14057b9afafc1652f84730e14d07879ff2926ca7358
SHA5122867e26e2a46e81d4b3efe84a271a294996f950e57370a85015e95557dddb4c25f818e77f72f699bac2254927151cb1f6bb76e952534d712d18e1036be4fb300
-
Filesize
168KB
MD5789ceeb4ab0cbf1e1e5a60cb69bdd743
SHA1ece37d693558e65a43ce485d4054f3374033c281
SHA256184d3d76bea288eb839d70de76cbab453b13a8052e7a45627bcad2d9aad9dabd
SHA512398b4d0f62240843653e0fe97a018888f02b4b843f06674faa4d3abb72e3b31fd2ce55ce60fb349df1b1b1af8bd3bbb9095fd4d1b4376682a8b9c8680f5302a9
-
Filesize
168KB
MD5789ceeb4ab0cbf1e1e5a60cb69bdd743
SHA1ece37d693558e65a43ce485d4054f3374033c281
SHA256184d3d76bea288eb839d70de76cbab453b13a8052e7a45627bcad2d9aad9dabd
SHA512398b4d0f62240843653e0fe97a018888f02b4b843f06674faa4d3abb72e3b31fd2ce55ce60fb349df1b1b1af8bd3bbb9095fd4d1b4376682a8b9c8680f5302a9
-
Filesize
655KB
MD5cc21e70dbe67d705010989ccc5bc5fe6
SHA1aaeae7df1d31102edc66fb7fbf2fd850a228d6e3
SHA25601ab55154459eea9355d5df31186f37aa96eab93f15eeedfd2cd98d441dcaef5
SHA51219247d35a67bbb8e63a206b53017789785fb3795277f57520d9d3ecb95d80ca0798e0d9c69ef26e137886909aabc52141f29edc44a382e4bb5d32fd1f90b90b7
-
Filesize
655KB
MD5cc21e70dbe67d705010989ccc5bc5fe6
SHA1aaeae7df1d31102edc66fb7fbf2fd850a228d6e3
SHA25601ab55154459eea9355d5df31186f37aa96eab93f15eeedfd2cd98d441dcaef5
SHA51219247d35a67bbb8e63a206b53017789785fb3795277f57520d9d3ecb95d80ca0798e0d9c69ef26e137886909aabc52141f29edc44a382e4bb5d32fd1f90b90b7
-
Filesize
261KB
MD56f289a12bc92a636ed08e1ef75dff1ce
SHA16e0419941b74e62827ccb23a360736df08e393c1
SHA2567dc4e30532a4845d385481bc3138f67af709c36d77504aca5f34733b9e369ecd
SHA512f5fdeaff8089062bc930365d8d8e2a626bc9612c8777a1d9c2905e53abd0424b3e3b521d53a0696bb49f9d6551221bc7f7983a3d23862badb438a69a1187855f
-
Filesize
261KB
MD56f289a12bc92a636ed08e1ef75dff1ce
SHA16e0419941b74e62827ccb23a360736df08e393c1
SHA2567dc4e30532a4845d385481bc3138f67af709c36d77504aca5f34733b9e369ecd
SHA512f5fdeaff8089062bc930365d8d8e2a626bc9612c8777a1d9c2905e53abd0424b3e3b521d53a0696bb49f9d6551221bc7f7983a3d23862badb438a69a1187855f
-
Filesize
445KB
MD52c2ad7582408ffc9be9dab0b80f0a15b
SHA13ce364692ebede0d71486eeb78a97a2609615e54
SHA256c1e86015af82f37c983650a1d517aede5b48c3513738b0c63bb9eb6226e244c8
SHA5125f8425a36625a60c26c6a61f18e0bda1e8c9a81b989943bbf13c9aefa736d62a6ca097385a5e95f15a0ecdb3189a2878cff6e0766724d31689e896ab7609a4ad
-
Filesize
445KB
MD52c2ad7582408ffc9be9dab0b80f0a15b
SHA13ce364692ebede0d71486eeb78a97a2609615e54
SHA256c1e86015af82f37c983650a1d517aede5b48c3513738b0c63bb9eb6226e244c8
SHA5125f8425a36625a60c26c6a61f18e0bda1e8c9a81b989943bbf13c9aefa736d62a6ca097385a5e95f15a0ecdb3189a2878cff6e0766724d31689e896ab7609a4ad
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1