Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2023, 02:21
Static task
static1
General
-
Target
fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe
-
Size
945KB
-
MD5
7cec8ffe0ab885f40cd8d5d18c5fece1
-
SHA1
cc42770098a5cffcd3480a38cb245bd8ba790da5
-
SHA256
fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397
-
SHA512
c807efe1b9066ce3bafb9361b8713630c8b949a184de6fb70125811d3ae3c023e8b9a9ff190383b419eab783948e17307fbb4955365c78069664e3a2fadeca2f
-
SSDEEP
24576:By5Pej+4VSTuCntqACw1SM2lLyrCtRfMsd:05PejIuOUOE7LKC/ks
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it107096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it107096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it107096.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it107096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it107096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it107096.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation jr480724.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr196465.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 4948 zivO5365.exe 4424 ziiJ3431.exe 224 it107096.exe 1364 jr480724.exe 4868 1.exe 4500 kp070356.exe 2840 lr196465.exe 4116 oneetx.exe 2832 oneetx.exe 4064 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4460 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it107096.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziiJ3431.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivO5365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivO5365.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiJ3431.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 1172 1364 WerFault.exe 93 2132 2840 WerFault.exe 100 3704 2840 WerFault.exe 100 1404 2840 WerFault.exe 100 400 2840 WerFault.exe 100 2000 2840 WerFault.exe 100 5076 2840 WerFault.exe 100 1448 2840 WerFault.exe 100 4568 2840 WerFault.exe 100 4444 2840 WerFault.exe 100 1168 2840 WerFault.exe 100 3768 4116 WerFault.exe 122 3224 4116 WerFault.exe 122 2768 4116 WerFault.exe 122 1792 4116 WerFault.exe 122 60 4116 WerFault.exe 122 3444 4116 WerFault.exe 122 1916 4116 WerFault.exe 122 624 4116 WerFault.exe 122 1156 4116 WerFault.exe 122 4040 4116 WerFault.exe 122 2788 4116 WerFault.exe 122 3528 4116 WerFault.exe 122 1632 2832 WerFault.exe 151 3704 4116 WerFault.exe 122 4104 4116 WerFault.exe 122 3944 4116 WerFault.exe 122 1608 4064 WerFault.exe 161 4984 4116 WerFault.exe 122 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 224 it107096.exe 224 it107096.exe 4868 1.exe 4500 kp070356.exe 4868 1.exe 4500 kp070356.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 224 it107096.exe Token: SeDebugPrivilege 1364 jr480724.exe Token: SeDebugPrivilege 4868 1.exe Token: SeDebugPrivilege 4500 kp070356.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 lr196465.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4948 5084 fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe 87 PID 5084 wrote to memory of 4948 5084 fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe 87 PID 5084 wrote to memory of 4948 5084 fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe 87 PID 4948 wrote to memory of 4424 4948 zivO5365.exe 88 PID 4948 wrote to memory of 4424 4948 zivO5365.exe 88 PID 4948 wrote to memory of 4424 4948 zivO5365.exe 88 PID 4424 wrote to memory of 224 4424 ziiJ3431.exe 89 PID 4424 wrote to memory of 224 4424 ziiJ3431.exe 89 PID 4424 wrote to memory of 1364 4424 ziiJ3431.exe 93 PID 4424 wrote to memory of 1364 4424 ziiJ3431.exe 93 PID 4424 wrote to memory of 1364 4424 ziiJ3431.exe 93 PID 1364 wrote to memory of 4868 1364 jr480724.exe 94 PID 1364 wrote to memory of 4868 1364 jr480724.exe 94 PID 1364 wrote to memory of 4868 1364 jr480724.exe 94 PID 4948 wrote to memory of 4500 4948 zivO5365.exe 97 PID 4948 wrote to memory of 4500 4948 zivO5365.exe 97 PID 4948 wrote to memory of 4500 4948 zivO5365.exe 97 PID 5084 wrote to memory of 2840 5084 fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe 100 PID 5084 wrote to memory of 2840 5084 fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe 100 PID 5084 wrote to memory of 2840 5084 fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe 100 PID 2840 wrote to memory of 4116 2840 lr196465.exe 122 PID 2840 wrote to memory of 4116 2840 lr196465.exe 122 PID 2840 wrote to memory of 4116 2840 lr196465.exe 122 PID 4116 wrote to memory of 3448 4116 oneetx.exe 139 PID 4116 wrote to memory of 3448 4116 oneetx.exe 139 PID 4116 wrote to memory of 3448 4116 oneetx.exe 139 PID 4116 wrote to memory of 4460 4116 oneetx.exe 158 PID 4116 wrote to memory of 4460 4116 oneetx.exe 158 PID 4116 wrote to memory of 4460 4116 oneetx.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe"C:\Users\Admin\AppData\Local\Temp\fdce0e7fe216574f5bd52703a90e28babaa1ace52bc12ff2d4eeeb8cedc2b397.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivO5365.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivO5365.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziiJ3431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziiJ3431.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it107096.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it107096.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480724.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480724.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 10725⤵
- Program crash
PID:1172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp070356.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp070356.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr196465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr196465.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 7123⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 7963⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 8683⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 9763⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 10123⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 10043⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 12243⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 12723⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 13243⤵
- Program crash
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 7084⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 8724⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 9084⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 10564⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 10644⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 11164⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 11244⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 9964⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 8684⤵
- Program crash
PID:1156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 7004⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 8924⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 14684⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 10844⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 16284⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 15884⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 16444⤵
- Program crash
PID:4984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 13803⤵
- Program crash
PID:1168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1364 -ip 13641⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2840 -ip 28401⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2840 -ip 28401⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2840 -ip 28401⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2840 -ip 28401⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2840 -ip 28401⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2840 -ip 28401⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2840 -ip 28401⤵PID:728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2840 -ip 28401⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2840 -ip 28401⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2840 -ip 28401⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4116 -ip 41161⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4116 -ip 41161⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4116 -ip 41161⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4116 -ip 41161⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4116 -ip 41161⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4116 -ip 41161⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4116 -ip 41161⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4116 -ip 41161⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4116 -ip 41161⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4116 -ip 41161⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4116 -ip 41161⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4116 -ip 41161⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 4242⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2832 -ip 28321⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4116 -ip 41161⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4116 -ip 41161⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4116 -ip 41161⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 4242⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4064 -ip 40641⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4116 -ip 41161⤵PID:2692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
670KB
MD5725203428bb6b5d6c50fcb6cbffe2251
SHA1e9b57fbd727c22a6fc9bc1c926fc0415e7447301
SHA25678b5c5c51e556ff82e90e81af71b55b6976bde143933688c6825c5092251dba7
SHA512fb108c48dd11e5c2da424a472d53500a60b068bef4ee9b3ed3c99cd32c9125de721a0c98128fe6709252405d43151c58bcf69548bb4f803ff9d04fef1c995c90
-
Filesize
670KB
MD5725203428bb6b5d6c50fcb6cbffe2251
SHA1e9b57fbd727c22a6fc9bc1c926fc0415e7447301
SHA25678b5c5c51e556ff82e90e81af71b55b6976bde143933688c6825c5092251dba7
SHA512fb108c48dd11e5c2da424a472d53500a60b068bef4ee9b3ed3c99cd32c9125de721a0c98128fe6709252405d43151c58bcf69548bb4f803ff9d04fef1c995c90
-
Filesize
168KB
MD5af70b8b8fc90e59906d0c7e0cb036af7
SHA1dd4268d3663967a3fbaed463257da8d182e68754
SHA256266f555863d9243b09bc0f8a44793637d0353880dcf563ad219575ff3bb59633
SHA512adfcbf7f7ace6b5d8a18a46892d31ac1f210f07752b40cca07b19f4bcea237e2fcdbafb5c809c776a5844b1b538130a2ef94704b3af3bf5682e3385c690291ae
-
Filesize
168KB
MD5af70b8b8fc90e59906d0c7e0cb036af7
SHA1dd4268d3663967a3fbaed463257da8d182e68754
SHA256266f555863d9243b09bc0f8a44793637d0353880dcf563ad219575ff3bb59633
SHA512adfcbf7f7ace6b5d8a18a46892d31ac1f210f07752b40cca07b19f4bcea237e2fcdbafb5c809c776a5844b1b538130a2ef94704b3af3bf5682e3385c690291ae
-
Filesize
516KB
MD5f6fd9bc4810a0872118e89afce4376d0
SHA116836ce2d6bb8b6251bb5ced5d7e33cf7f969d8a
SHA256166757a1ea62896503a06cbdcadc71d72fcff73138ac947f6f2a92e5f1f1c5d2
SHA5129aac80f215a4fb643b2a1cf50ad702e3ba6727bf38fa7b141cfc4544db61c82393715c89838c1f3d126b25ce9354abacd419a474a54a0318b6ff3becd0910441
-
Filesize
516KB
MD5f6fd9bc4810a0872118e89afce4376d0
SHA116836ce2d6bb8b6251bb5ced5d7e33cf7f969d8a
SHA256166757a1ea62896503a06cbdcadc71d72fcff73138ac947f6f2a92e5f1f1c5d2
SHA5129aac80f215a4fb643b2a1cf50ad702e3ba6727bf38fa7b141cfc4544db61c82393715c89838c1f3d126b25ce9354abacd419a474a54a0318b6ff3becd0910441
-
Filesize
11KB
MD527ce2d170ab35b1ab3b0cc00b8ae9a69
SHA1b5de7fba219dfad61b56bfbafc3022cf05959bf7
SHA256911c3a02cac4d3f21ce97ddcff973ba819b691c6ef7f117257631022370f731d
SHA512974f63ffb1dfe203463180281d293d7279648a40e60288c9de3b2a49d36315c4120c5ef02873daa91a07257623d79ebfe9907904c8b665eff591a93a439dfe61
-
Filesize
11KB
MD527ce2d170ab35b1ab3b0cc00b8ae9a69
SHA1b5de7fba219dfad61b56bfbafc3022cf05959bf7
SHA256911c3a02cac4d3f21ce97ddcff973ba819b691c6ef7f117257631022370f731d
SHA512974f63ffb1dfe203463180281d293d7279648a40e60288c9de3b2a49d36315c4120c5ef02873daa91a07257623d79ebfe9907904c8b665eff591a93a439dfe61
-
Filesize
482KB
MD5088d9f3fbd272ed68636ca0ba8486c9a
SHA13b85bc6be916049bd836c720f83a87b9316673c8
SHA2565b83657a9de09c6653abebba9fda703cbe2f033f5d420d426dd5469c0ffc6028
SHA512f95c99b89bcb0d828406f0c037e4b527ecd9c4fa09b5e228cc523dcfd7811e2482ddc5ff0a911e1f4331cd7f921656169b046ca4bd8aacf3c1cfb7b4b6fd6429
-
Filesize
482KB
MD5088d9f3fbd272ed68636ca0ba8486c9a
SHA13b85bc6be916049bd836c720f83a87b9316673c8
SHA2565b83657a9de09c6653abebba9fda703cbe2f033f5d420d426dd5469c0ffc6028
SHA512f95c99b89bcb0d828406f0c037e4b527ecd9c4fa09b5e228cc523dcfd7811e2482ddc5ff0a911e1f4331cd7f921656169b046ca4bd8aacf3c1cfb7b4b6fd6429
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1