Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 20:37
Static task
static1
General
-
Target
f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe
-
Size
962KB
-
MD5
c3a5072c05b02e857398eca7fc49ee67
-
SHA1
bf578eb3fb2e24047a040be3aa31bdd33c62b64f
-
SHA256
f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee
-
SHA512
3dc46f8c62b5bc121685cc44e5052275f2c195f41f92e49f24fb076b9327374a48e08146b57ac8e01239ea699b08510e5e64ccd4c0e986c9245bb8e2a043cd49
-
SSDEEP
12288:SMrLy90X7BdHHRP3gS8SyFQ/77Ner/CdF897qoQt7L34JbW/tX9+OmH3MpO7GwPF:JysVzV8nI7NebCKeHyW/x4O08phwEG
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it977581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it977581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it977581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it977581.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it977581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it977581.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr474972.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr480390.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 3936 zivC7069.exe 652 ziIH3280.exe 1316 it977581.exe 3584 jr474972.exe 3300 1.exe 4992 kp392607.exe 5104 lr480390.exe 4672 oneetx.exe 4920 oneetx.exe 2568 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4596 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it977581.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivC7069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivC7069.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziIH3280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziIH3280.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3508 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 1516 3584 WerFault.exe 90 4340 5104 WerFault.exe 97 4908 5104 WerFault.exe 97 4432 5104 WerFault.exe 97 2172 5104 WerFault.exe 97 1396 5104 WerFault.exe 97 4512 5104 WerFault.exe 97 2540 5104 WerFault.exe 97 1464 5104 WerFault.exe 97 2544 5104 WerFault.exe 97 4836 5104 WerFault.exe 97 3788 4672 WerFault.exe 119 1288 4672 WerFault.exe 119 2732 4672 WerFault.exe 119 3216 4672 WerFault.exe 119 4896 4672 WerFault.exe 119 4532 4672 WerFault.exe 119 4300 4672 WerFault.exe 119 4704 4672 WerFault.exe 119 5028 4672 WerFault.exe 119 3748 4672 WerFault.exe 119 4456 4672 WerFault.exe 119 568 4920 WerFault.exe 146 4992 4672 WerFault.exe 119 2684 4672 WerFault.exe 119 2264 4672 WerFault.exe 119 4544 4672 WerFault.exe 119 3940 2568 WerFault.exe 158 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1316 it977581.exe 1316 it977581.exe 4992 kp392607.exe 3300 1.exe 3300 1.exe 4992 kp392607.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1316 it977581.exe Token: SeDebugPrivilege 3584 jr474972.exe Token: SeDebugPrivilege 4992 kp392607.exe Token: SeDebugPrivilege 3300 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5104 lr480390.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3936 2604 f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe 84 PID 2604 wrote to memory of 3936 2604 f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe 84 PID 2604 wrote to memory of 3936 2604 f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe 84 PID 3936 wrote to memory of 652 3936 zivC7069.exe 85 PID 3936 wrote to memory of 652 3936 zivC7069.exe 85 PID 3936 wrote to memory of 652 3936 zivC7069.exe 85 PID 652 wrote to memory of 1316 652 ziIH3280.exe 86 PID 652 wrote to memory of 1316 652 ziIH3280.exe 86 PID 652 wrote to memory of 3584 652 ziIH3280.exe 90 PID 652 wrote to memory of 3584 652 ziIH3280.exe 90 PID 652 wrote to memory of 3584 652 ziIH3280.exe 90 PID 3584 wrote to memory of 3300 3584 jr474972.exe 91 PID 3584 wrote to memory of 3300 3584 jr474972.exe 91 PID 3584 wrote to memory of 3300 3584 jr474972.exe 91 PID 3936 wrote to memory of 4992 3936 zivC7069.exe 94 PID 3936 wrote to memory of 4992 3936 zivC7069.exe 94 PID 3936 wrote to memory of 4992 3936 zivC7069.exe 94 PID 2604 wrote to memory of 5104 2604 f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe 97 PID 2604 wrote to memory of 5104 2604 f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe 97 PID 2604 wrote to memory of 5104 2604 f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe 97 PID 5104 wrote to memory of 4672 5104 lr480390.exe 119 PID 5104 wrote to memory of 4672 5104 lr480390.exe 119 PID 5104 wrote to memory of 4672 5104 lr480390.exe 119 PID 4672 wrote to memory of 3312 4672 oneetx.exe 136 PID 4672 wrote to memory of 3312 4672 oneetx.exe 136 PID 4672 wrote to memory of 3312 4672 oneetx.exe 136 PID 4672 wrote to memory of 4596 4672 oneetx.exe 153 PID 4672 wrote to memory of 4596 4672 oneetx.exe 153 PID 4672 wrote to memory of 4596 4672 oneetx.exe 153
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe"C:\Users\Admin\AppData\Local\Temp\f9caabb15f012521a88608cd075e4bcbd490e0c8a6c31b1bd280ad8c9210bdee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivC7069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivC7069.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIH3280.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIH3280.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it977581.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it977581.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr474972.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr474972.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 13805⤵
- Program crash
PID:1516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp392607.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr480390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr480390.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 6963⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 7643⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 8563⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 8643⤵
- Program crash
PID:2172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 9763⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 9883⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 12243⤵
- Program crash
PID:2540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 12243⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 12963⤵
- Program crash
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 6924⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 7924⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 8124⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 10524⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 10724⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 11004⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 10844⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 10004⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 7764⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 6924⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 12964⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 11244⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 16284⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 11124⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 16364⤵
- Program crash
PID:4544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 13643⤵
- Program crash
PID:4836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3584 -ip 35841⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5104 -ip 51041⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5104 -ip 51041⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5104 -ip 51041⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5104 -ip 51041⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5104 -ip 51041⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5104 -ip 51041⤵PID:180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5104 -ip 51041⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5104 -ip 51041⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5104 -ip 51041⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5104 -ip 51041⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4672 -ip 46721⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4672 -ip 46721⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4672 -ip 46721⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4672 -ip 46721⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4672 -ip 46721⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4672 -ip 46721⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4672 -ip 46721⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4672 -ip 46721⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4672 -ip 46721⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4672 -ip 46721⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4672 -ip 46721⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 3162⤵
- Program crash
PID:568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4920 -ip 49201⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4672 -ip 46721⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4672 -ip 46721⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4672 -ip 46721⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4672 -ip 46721⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 3202⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2568 -ip 25681⤵PID:4700
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
679KB
MD5ce7edc50fa338a5bede1809b7ae8c65e
SHA1ee612abe0c478f0e692193b8e7665144c8163c86
SHA2567c5b33e45ea73b0506dc2b8ebad0663dd5a2e06e46628917dba9eee70c17f343
SHA5127b56fb17bc8688bdc1df3964e40ff982db607f8c68ee151cbc30dfb42273178203cbbcf76e2ddb1dad8b7b1558340d18711172b74b95d9f2fd555950eebdbff3
-
Filesize
679KB
MD5ce7edc50fa338a5bede1809b7ae8c65e
SHA1ee612abe0c478f0e692193b8e7665144c8163c86
SHA2567c5b33e45ea73b0506dc2b8ebad0663dd5a2e06e46628917dba9eee70c17f343
SHA5127b56fb17bc8688bdc1df3964e40ff982db607f8c68ee151cbc30dfb42273178203cbbcf76e2ddb1dad8b7b1558340d18711172b74b95d9f2fd555950eebdbff3
-
Filesize
168KB
MD5ebc0aba6a16577965f9817403b6e7b28
SHA1c881d650ee92fca6498a4298dd29687d5adbe2fb
SHA2563ef55da1fe5b64addef1bde336f4334d3248448f30474fbc39bd5adb3956f9cd
SHA512d749da87308367af5d8cd8e104bbb9465e1bc2a7d7c2cb8f383102e9fc568b86bc07c0eea5c48757671f20d86dd6fd8d632e4779230be87a9ec7646735ca4206
-
Filesize
168KB
MD5ebc0aba6a16577965f9817403b6e7b28
SHA1c881d650ee92fca6498a4298dd29687d5adbe2fb
SHA2563ef55da1fe5b64addef1bde336f4334d3248448f30474fbc39bd5adb3956f9cd
SHA512d749da87308367af5d8cd8e104bbb9465e1bc2a7d7c2cb8f383102e9fc568b86bc07c0eea5c48757671f20d86dd6fd8d632e4779230be87a9ec7646735ca4206
-
Filesize
525KB
MD5afcd20e060250afdb11a51b80e6eae16
SHA1ed206f753740a5fad373915ba58e7e5a044b6d14
SHA2564d9e890a3aebf45e48ea9cd7986d3d5775bfb9ea5379aa6537461f102a048622
SHA512050d853ae614e015738c99280c86436dbb0830901c7dd74e90e920196e2b2ed3664733b050b2581c6b62a1801519db407fe7b016f9c89127ccffb6b2404ce184
-
Filesize
525KB
MD5afcd20e060250afdb11a51b80e6eae16
SHA1ed206f753740a5fad373915ba58e7e5a044b6d14
SHA2564d9e890a3aebf45e48ea9cd7986d3d5775bfb9ea5379aa6537461f102a048622
SHA512050d853ae614e015738c99280c86436dbb0830901c7dd74e90e920196e2b2ed3664733b050b2581c6b62a1801519db407fe7b016f9c89127ccffb6b2404ce184
-
Filesize
11KB
MD52154b674f244d75c338daae45fcb7e99
SHA175b5e21fde2bcebb0c521f417232ed50792feb34
SHA2567b240330a66ff49bac6e8f123ed69ee5f1c41b5db6479600eb779db9a734cd31
SHA51281bf7a749a103fefa8d5f83e243224ab2ae4351d884e51e09aa10e1c993d1341e7dee8bc5c4e5aa8ba9d6ca59a10ed70d2b8a2cba4977880839026cc8eec1703
-
Filesize
11KB
MD52154b674f244d75c338daae45fcb7e99
SHA175b5e21fde2bcebb0c521f417232ed50792feb34
SHA2567b240330a66ff49bac6e8f123ed69ee5f1c41b5db6479600eb779db9a734cd31
SHA51281bf7a749a103fefa8d5f83e243224ab2ae4351d884e51e09aa10e1c993d1341e7dee8bc5c4e5aa8ba9d6ca59a10ed70d2b8a2cba4977880839026cc8eec1703
-
Filesize
501KB
MD5dd127f479322f80c0a18b19777efcc3d
SHA1168e677d754a8b95cd5c0c77570c9ed46997a5a0
SHA25682ffaaece57eff14ed5f623f2aead900eb48f4b5df1799c757b0659658393294
SHA512362219462c1b305abe170f673836af6175dd9069d72129c486bf39eababbb92e705bb8c2a876e9bfefb4666648e8579234cf11582bada052e6e0fb82b6b8574b
-
Filesize
501KB
MD5dd127f479322f80c0a18b19777efcc3d
SHA1168e677d754a8b95cd5c0c77570c9ed46997a5a0
SHA25682ffaaece57eff14ed5f623f2aead900eb48f4b5df1799c757b0659658393294
SHA512362219462c1b305abe170f673836af6175dd9069d72129c486bf39eababbb92e705bb8c2a876e9bfefb4666648e8579234cf11582bada052e6e0fb82b6b8574b
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1