Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2023 15:56
Static task
static1
General
-
Target
ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe
-
Size
1.1MB
-
MD5
25400cbbb9e18832cc887633a82685cc
-
SHA1
d5cc8849b716b089febc1d07cda05b867edde174
-
SHA256
ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d
-
SHA512
09a5d37dacb4e6bc30f4b54525e06cf038a46ce9f56c7035fa4b1c14723fe9ea1f73fcba42c57001b9431e55184428158042fc6038239f69917f06fecc703f9f
-
SSDEEP
24576:GyonfPUxXSW8SUT/nvGuowUhuc4VFb8Aw:VonnMSJ3GuKu3rb
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr173282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr173282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr173282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr173282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr173282.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr173282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu658202.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si806401.exe -
Executes dropped EXE 10 IoCs
pid Process 4492 un155149.exe 1456 un764712.exe 2032 pr173282.exe 1972 qu658202.exe 4188 1.exe 4076 rk413974.exe 4604 si806401.exe 3216 oneetx.exe 3932 oneetx.exe 2764 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4280 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr173282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr173282.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un764712.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un155149.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un155149.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un764712.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 1044 2032 WerFault.exe 87 2032 1972 WerFault.exe 93 2188 4604 WerFault.exe 99 4964 4604 WerFault.exe 99 3280 4604 WerFault.exe 99 5012 4604 WerFault.exe 99 4516 4604 WerFault.exe 99 4340 4604 WerFault.exe 99 2052 4604 WerFault.exe 99 4036 4604 WerFault.exe 99 2792 4604 WerFault.exe 99 1920 4604 WerFault.exe 99 820 3216 WerFault.exe 121 3832 3216 WerFault.exe 121 4024 3216 WerFault.exe 121 3948 3216 WerFault.exe 121 3144 3216 WerFault.exe 121 4652 3216 WerFault.exe 121 1488 3216 WerFault.exe 121 4992 3216 WerFault.exe 121 4084 3216 WerFault.exe 121 3812 3216 WerFault.exe 121 3856 3216 WerFault.exe 121 1960 3216 WerFault.exe 121 2104 3216 WerFault.exe 121 4364 3216 WerFault.exe 121 3692 3932 WerFault.exe 151 1104 3216 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2032 pr173282.exe 2032 pr173282.exe 4076 rk413974.exe 4188 1.exe 4188 1.exe 4076 rk413974.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2032 pr173282.exe Token: SeDebugPrivilege 1972 qu658202.exe Token: SeDebugPrivilege 4076 rk413974.exe Token: SeDebugPrivilege 4188 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4604 si806401.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4492 5052 ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe 85 PID 5052 wrote to memory of 4492 5052 ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe 85 PID 5052 wrote to memory of 4492 5052 ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe 85 PID 4492 wrote to memory of 1456 4492 un155149.exe 86 PID 4492 wrote to memory of 1456 4492 un155149.exe 86 PID 4492 wrote to memory of 1456 4492 un155149.exe 86 PID 1456 wrote to memory of 2032 1456 un764712.exe 87 PID 1456 wrote to memory of 2032 1456 un764712.exe 87 PID 1456 wrote to memory of 2032 1456 un764712.exe 87 PID 1456 wrote to memory of 1972 1456 un764712.exe 93 PID 1456 wrote to memory of 1972 1456 un764712.exe 93 PID 1456 wrote to memory of 1972 1456 un764712.exe 93 PID 1972 wrote to memory of 4188 1972 qu658202.exe 94 PID 1972 wrote to memory of 4188 1972 qu658202.exe 94 PID 1972 wrote to memory of 4188 1972 qu658202.exe 94 PID 4492 wrote to memory of 4076 4492 un155149.exe 97 PID 4492 wrote to memory of 4076 4492 un155149.exe 97 PID 4492 wrote to memory of 4076 4492 un155149.exe 97 PID 5052 wrote to memory of 4604 5052 ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe 99 PID 5052 wrote to memory of 4604 5052 ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe 99 PID 5052 wrote to memory of 4604 5052 ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe 99 PID 4604 wrote to memory of 3216 4604 si806401.exe 121 PID 4604 wrote to memory of 3216 4604 si806401.exe 121 PID 4604 wrote to memory of 3216 4604 si806401.exe 121 PID 3216 wrote to memory of 3208 3216 oneetx.exe 139 PID 3216 wrote to memory of 3208 3216 oneetx.exe 139 PID 3216 wrote to memory of 3208 3216 oneetx.exe 139 PID 3216 wrote to memory of 4280 3216 oneetx.exe 154 PID 3216 wrote to memory of 4280 3216 oneetx.exe 154 PID 3216 wrote to memory of 4280 3216 oneetx.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe"C:\Users\Admin\AppData\Local\Temp\ab7f44a0b76fe8fdc6f8cfdab264a464540664ed7b781bbff5178cd5bbade89d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155149.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155149.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un764712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un764712.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr173282.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr173282.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 10845⤵
- Program crash
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu658202.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu658202.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 12085⤵
- Program crash
PID:2032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk413974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk413974.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si806401.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si806401.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 6963⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 7643⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 8563⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 8643⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 8603⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 10003⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 12163⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 12163⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 13163⤵
- Program crash
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6964⤵
- Program crash
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 9044⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 9164⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 9244⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10924⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10804⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 11044⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 9324⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 12524⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6964⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 8884⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10844⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 16204⤵
- Program crash
PID:2104
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 11004⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 16444⤵
- Program crash
PID:1104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 14283⤵
- Program crash
PID:1920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2032 -ip 20321⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1972 -ip 19721⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4604 -ip 46041⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4604 -ip 46041⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4604 -ip 46041⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4604 -ip 46041⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4604 -ip 46041⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4604 -ip 46041⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4604 -ip 46041⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4604 -ip 46041⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4604 -ip 46041⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4604 -ip 46041⤵PID:668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3216 -ip 32161⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3216 -ip 32161⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3216 -ip 32161⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3216 -ip 32161⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3216 -ip 32161⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3216 -ip 32161⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3216 -ip 32161⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3216 -ip 32161⤵PID:2688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3216 -ip 32161⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3216 -ip 32161⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3216 -ip 32161⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3216 -ip 32161⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 3162⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3216 -ip 32161⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3216 -ip 32161⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3932 -ip 39321⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3216 -ip 32161⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
818KB
MD5367decc35379f9e2155e57b309c8c641
SHA1c4807f03a4408ec8f5df1053633da886dae229d8
SHA2565cbd0765d2f2b2fd85e214c0457cedbaaaa481154727c5f699c9c034bdad2e4d
SHA5125244316b7c8ad754b472432e0b64ff04f7de8fd4a70e53e26a3c23b3d5ee86d63f605dd97a53f2da729fe034dbd7dfdf954308e5b26067570daf7bffec572ae0
-
Filesize
818KB
MD5367decc35379f9e2155e57b309c8c641
SHA1c4807f03a4408ec8f5df1053633da886dae229d8
SHA2565cbd0765d2f2b2fd85e214c0457cedbaaaa481154727c5f699c9c034bdad2e4d
SHA5125244316b7c8ad754b472432e0b64ff04f7de8fd4a70e53e26a3c23b3d5ee86d63f605dd97a53f2da729fe034dbd7dfdf954308e5b26067570daf7bffec572ae0
-
Filesize
168KB
MD5e2811b4f6b40a6950c821ceb8edaa4fa
SHA1c569970bbd21f61afefeebd8028739b8563d8ec1
SHA25619714b110605d0f1c447f1b6ce3cba2380fde037badd29125de2a30f99d6150c
SHA51270c3bb197814feb46ddf1671d3f176776d73fe08965680a187b2f1838ff77435daf7d91009a74edcc259382c1a07783f1d75682e05632a4cd6d883d47672b1ed
-
Filesize
168KB
MD5e2811b4f6b40a6950c821ceb8edaa4fa
SHA1c569970bbd21f61afefeebd8028739b8563d8ec1
SHA25619714b110605d0f1c447f1b6ce3cba2380fde037badd29125de2a30f99d6150c
SHA51270c3bb197814feb46ddf1671d3f176776d73fe08965680a187b2f1838ff77435daf7d91009a74edcc259382c1a07783f1d75682e05632a4cd6d883d47672b1ed
-
Filesize
665KB
MD5e5418de07d78655cf9c9443a12857081
SHA13f9c88380236eb426494973e9a34598e1b46eee5
SHA256f2d35dde586ac18a1153ecd23d9dd25af4dcf262a65fe2f0eb70a0badbae2787
SHA51221bd256414c00199801ef5698f6c31c8e9965e0e1d02668e17232a24f40618b1c7a90b1c87f0b3f14f6b8ecd93fff5015d1f35a92c49e3d0f9d1900f212b1fe2
-
Filesize
665KB
MD5e5418de07d78655cf9c9443a12857081
SHA13f9c88380236eb426494973e9a34598e1b46eee5
SHA256f2d35dde586ac18a1153ecd23d9dd25af4dcf262a65fe2f0eb70a0badbae2787
SHA51221bd256414c00199801ef5698f6c31c8e9965e0e1d02668e17232a24f40618b1c7a90b1c87f0b3f14f6b8ecd93fff5015d1f35a92c49e3d0f9d1900f212b1fe2
-
Filesize
317KB
MD503c31f2d58a590fc50beb22241caefb5
SHA109bb7181b3168bfd94ab0f5e0cc46052a1e470d8
SHA2564b294ff4f28fc37cd9df3f532811dc890a8af298b8bec704f48576ca52ede6cf
SHA51226cf5934e0c4bd1f8360f079c00e749697923a2cba518cc66777a32d511a0863f5d1322abadeb4c11474c1384c775789fb072eac5481b82e797499ba874bba11
-
Filesize
317KB
MD503c31f2d58a590fc50beb22241caefb5
SHA109bb7181b3168bfd94ab0f5e0cc46052a1e470d8
SHA2564b294ff4f28fc37cd9df3f532811dc890a8af298b8bec704f48576ca52ede6cf
SHA51226cf5934e0c4bd1f8360f079c00e749697923a2cba518cc66777a32d511a0863f5d1322abadeb4c11474c1384c775789fb072eac5481b82e797499ba874bba11
-
Filesize
501KB
MD52b83750625b54fe47c31f5bb685fe308
SHA185c143b3d193c57f7576995bcb561ae5807ebfba
SHA25647dd01c30c17e5a5dfea115f695823d420d6698f7dea0e52a46150f377c3e556
SHA512889ef8289b64c585dfff3d4be4ac183160a4aac8845af4cd006fed4cc355fa668d6c1fdeae03efe91904a59aa152b3b5d43003421cf10bb96917cd2d4064aa25
-
Filesize
501KB
MD52b83750625b54fe47c31f5bb685fe308
SHA185c143b3d193c57f7576995bcb561ae5807ebfba
SHA25647dd01c30c17e5a5dfea115f695823d420d6698f7dea0e52a46150f377c3e556
SHA512889ef8289b64c585dfff3d4be4ac183160a4aac8845af4cd006fed4cc355fa668d6c1fdeae03efe91904a59aa152b3b5d43003421cf10bb96917cd2d4064aa25
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1