Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:32
Static task
static1
General
-
Target
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe
-
Size
1.0MB
-
MD5
50572b81143cd7d7834e99916176781e
-
SHA1
3f6869ad66d164302c3faaf1a11f5126216edc21
-
SHA256
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1
-
SHA512
27bdf288a5ba7ced613fa3cad36fb68d453c529c0f709c73ca01c92cb82b2cff1b7bc32707923ee540437adc9ea61db9a8632edc13ebc897e9ab4bfad79a4c96
-
SSDEEP
24576:6y/HPqPEOO30+/lGa+P40pytdGMt9q7hg/maOP:B0G/l12yeMtU+ud
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it223722.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it223722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it223722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it223722.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it223722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it223722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it223722.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr163414.exeoneetx.exejr150980.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr163414.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation jr150980.exe -
Executes dropped EXE 9 IoCs
Processes:
zion5325.exeziEm2144.exeit223722.exejr150980.exe1.exekp393491.exelr163414.exeoneetx.exeoneetx.exepid process 1460 zion5325.exe 2100 ziEm2144.exe 1308 it223722.exe 4956 jr150980.exe 4888 1.exe 4372 kp393491.exe 3572 lr163414.exe 3792 oneetx.exe 1548 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4444 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it223722.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it223722.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exezion5325.exeziEm2144.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zion5325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zion5325.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEm2144.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziEm2144.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4536 4956 WerFault.exe jr150980.exe 1588 3572 WerFault.exe lr163414.exe 1432 3572 WerFault.exe lr163414.exe 4456 3572 WerFault.exe lr163414.exe 4036 3572 WerFault.exe lr163414.exe 2980 3572 WerFault.exe lr163414.exe 1504 3572 WerFault.exe lr163414.exe 3848 3572 WerFault.exe lr163414.exe 4880 3572 WerFault.exe lr163414.exe 1304 3572 WerFault.exe lr163414.exe 4528 3572 WerFault.exe lr163414.exe 2932 3792 WerFault.exe oneetx.exe 1676 3792 WerFault.exe oneetx.exe 2900 3792 WerFault.exe oneetx.exe 3964 3792 WerFault.exe oneetx.exe 4508 3792 WerFault.exe oneetx.exe 4840 3792 WerFault.exe oneetx.exe 4924 3792 WerFault.exe oneetx.exe 840 3792 WerFault.exe oneetx.exe 4956 3792 WerFault.exe oneetx.exe 1288 3792 WerFault.exe oneetx.exe 4828 3792 WerFault.exe oneetx.exe 5068 3792 WerFault.exe oneetx.exe 3024 3792 WerFault.exe oneetx.exe 4372 3792 WerFault.exe oneetx.exe 4280 3792 WerFault.exe oneetx.exe 1432 1548 WerFault.exe oneetx.exe 3984 1548 WerFault.exe oneetx.exe 4796 1548 WerFault.exe oneetx.exe 400 3792 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
it223722.exekp393491.exepid process 1308 it223722.exe 1308 it223722.exe 4372 kp393491.exe 4372 kp393491.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it223722.exejr150980.exekp393491.exedescription pid process Token: SeDebugPrivilege 1308 it223722.exe Token: SeDebugPrivilege 4956 jr150980.exe Token: SeDebugPrivilege 4372 kp393491.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr163414.exepid process 3572 lr163414.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exezion5325.exeziEm2144.exejr150980.exelr163414.exeoneetx.exedescription pid process target process PID 4640 wrote to memory of 1460 4640 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe zion5325.exe PID 4640 wrote to memory of 1460 4640 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe zion5325.exe PID 4640 wrote to memory of 1460 4640 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe zion5325.exe PID 1460 wrote to memory of 2100 1460 zion5325.exe ziEm2144.exe PID 1460 wrote to memory of 2100 1460 zion5325.exe ziEm2144.exe PID 1460 wrote to memory of 2100 1460 zion5325.exe ziEm2144.exe PID 2100 wrote to memory of 1308 2100 ziEm2144.exe it223722.exe PID 2100 wrote to memory of 1308 2100 ziEm2144.exe it223722.exe PID 2100 wrote to memory of 4956 2100 ziEm2144.exe jr150980.exe PID 2100 wrote to memory of 4956 2100 ziEm2144.exe jr150980.exe PID 2100 wrote to memory of 4956 2100 ziEm2144.exe jr150980.exe PID 4956 wrote to memory of 4888 4956 jr150980.exe 1.exe PID 4956 wrote to memory of 4888 4956 jr150980.exe 1.exe PID 4956 wrote to memory of 4888 4956 jr150980.exe 1.exe PID 1460 wrote to memory of 4372 1460 zion5325.exe kp393491.exe PID 1460 wrote to memory of 4372 1460 zion5325.exe kp393491.exe PID 1460 wrote to memory of 4372 1460 zion5325.exe kp393491.exe PID 4640 wrote to memory of 3572 4640 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe lr163414.exe PID 4640 wrote to memory of 3572 4640 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe lr163414.exe PID 4640 wrote to memory of 3572 4640 824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe lr163414.exe PID 3572 wrote to memory of 3792 3572 lr163414.exe oneetx.exe PID 3572 wrote to memory of 3792 3572 lr163414.exe oneetx.exe PID 3572 wrote to memory of 3792 3572 lr163414.exe oneetx.exe PID 3792 wrote to memory of 2376 3792 oneetx.exe schtasks.exe PID 3792 wrote to memory of 2376 3792 oneetx.exe schtasks.exe PID 3792 wrote to memory of 2376 3792 oneetx.exe schtasks.exe PID 3792 wrote to memory of 4444 3792 oneetx.exe rundll32.exe PID 3792 wrote to memory of 4444 3792 oneetx.exe rundll32.exe PID 3792 wrote to memory of 4444 3792 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe"C:\Users\Admin\AppData\Local\Temp\824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zion5325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zion5325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEm2144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEm2144.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it223722.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it223722.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr150980.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr150980.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 13845⤵
- Program crash
PID:4536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp393491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp393491.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr163414.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr163414.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 7003⤵
- Program crash
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 7843⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 8603⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 9723⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 8603⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 8603⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 12203⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 12203⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 13163⤵
- Program crash
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 6964⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 8404⤵
- Program crash
PID:1676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 9124⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 10564⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 11004⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 10724⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 11204⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 9964⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 7204⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 12724⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 7844⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 15284⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 10884⤵
- Program crash
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 16284⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 15324⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 16444⤵
- Program crash
PID:400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 7523⤵
- Program crash
PID:4528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4956 -ip 49561⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3572 -ip 35721⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3572 -ip 35721⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3572 -ip 35721⤵PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3572 -ip 35721⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3572 -ip 35721⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3572 -ip 35721⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3572 -ip 35721⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3572 -ip 35721⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3572 -ip 35721⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3572 -ip 35721⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3792 -ip 37921⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3792 -ip 37921⤵PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3792 -ip 37921⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3792 -ip 37921⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3792 -ip 37921⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3792 -ip 37921⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3792 -ip 37921⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3792 -ip 37921⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3792 -ip 37921⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3792 -ip 37921⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3792 -ip 37921⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3792 -ip 37921⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3792 -ip 37921⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3792 -ip 37921⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 3792 -ip 37921⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 3962⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 4402⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 4402⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 1548 -ip 15481⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1548 -ip 15481⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1548 -ip 15481⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3792 -ip 37921⤵PID:624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD5604b94457af6f7d330a8c2210bdd9d1f
SHA155360631983e84f926d913da65f2d32f813bd5be
SHA2560f3374c901041d49c73da68c77ef58b7bb8791e3ffeacc41fe05ee1aff386e88
SHA5120a87b6e00dd220b057e43eb0d0c8bf291a7e37b84837c3b122bc71a72c785eb8a02e026f70edc5de91374b3ec66f80fafe648ff5cce410695ec5f7edd227046c
-
Filesize
723KB
MD5604b94457af6f7d330a8c2210bdd9d1f
SHA155360631983e84f926d913da65f2d32f813bd5be
SHA2560f3374c901041d49c73da68c77ef58b7bb8791e3ffeacc41fe05ee1aff386e88
SHA5120a87b6e00dd220b057e43eb0d0c8bf291a7e37b84837c3b122bc71a72c785eb8a02e026f70edc5de91374b3ec66f80fafe648ff5cce410695ec5f7edd227046c
-
Filesize
169KB
MD5df75d845416bc0d087839c82a55f59a7
SHA1dcee00517304970cbc50f2b43e2deee28a7d528d
SHA256a2e3f0254e89a4b8aafb9fc5d4badbc99f7b935f87108a9429914abcdd11d213
SHA512b2ae2524fce3e499ec6ca94d5fe7b4961b5ff16928d2455fcdd3c59dbe74f37dbe16b576033182146bbb081d6c96004b6353838093df67d402d5a85159891539
-
Filesize
169KB
MD5df75d845416bc0d087839c82a55f59a7
SHA1dcee00517304970cbc50f2b43e2deee28a7d528d
SHA256a2e3f0254e89a4b8aafb9fc5d4badbc99f7b935f87108a9429914abcdd11d213
SHA512b2ae2524fce3e499ec6ca94d5fe7b4961b5ff16928d2455fcdd3c59dbe74f37dbe16b576033182146bbb081d6c96004b6353838093df67d402d5a85159891539
-
Filesize
569KB
MD56be688a833c8c597df6a84c13d8d7f30
SHA1a264deac5e5199e61f89ed54d5d0edf3d592b470
SHA256a7e8b775865d04f11adcf3e120448f99dc3c388fcd37713230b5c79f1be92c1d
SHA512f7107ea3038b26a526cb3be5f59f29f059a67104f2b18703222e775b5f1a879f321fd9707357c2316e07b0de2537fe9d515aff7aeaf1f06a325d1847cf5a0558
-
Filesize
569KB
MD56be688a833c8c597df6a84c13d8d7f30
SHA1a264deac5e5199e61f89ed54d5d0edf3d592b470
SHA256a7e8b775865d04f11adcf3e120448f99dc3c388fcd37713230b5c79f1be92c1d
SHA512f7107ea3038b26a526cb3be5f59f29f059a67104f2b18703222e775b5f1a879f321fd9707357c2316e07b0de2537fe9d515aff7aeaf1f06a325d1847cf5a0558
-
Filesize
11KB
MD5be21be50397ebbfa05aee727a853fff0
SHA1593c4a31ac230a1fc79d61cb54926481fc4fa1ed
SHA25697fb41b5e11d6781dda4fa6468a3dea76bf1ec5833a887cceb08b34a4dce1dcd
SHA5126c8b93c84902f1c61a487a66d37bc5b371943ad65fc0403630b6ce9e7d475dc119ca7889d4e3400ca6f1d8bed0013f70a2778bf771d0f82090857ad0ccf4b47b
-
Filesize
11KB
MD5be21be50397ebbfa05aee727a853fff0
SHA1593c4a31ac230a1fc79d61cb54926481fc4fa1ed
SHA25697fb41b5e11d6781dda4fa6468a3dea76bf1ec5833a887cceb08b34a4dce1dcd
SHA5126c8b93c84902f1c61a487a66d37bc5b371943ad65fc0403630b6ce9e7d475dc119ca7889d4e3400ca6f1d8bed0013f70a2778bf771d0f82090857ad0ccf4b47b
-
Filesize
588KB
MD5a1e26463e3d006b53f3119e704949af5
SHA1d0a440af6b63b26873e0e7342d7b0ea2bdd8cd62
SHA25692fbf105e4909bd50e13b3c51d492f1bd5b11b7c443b7deec8b9d534dcd2983d
SHA5127a5f9de0666288d5f214fddc752a5fd9e258251f6a6802bda962f0a2aaac1f7a64a61ffe2ae9f984e1520b6cbb0604b04b43a5350e5fba92f574071348cb8328
-
Filesize
588KB
MD5a1e26463e3d006b53f3119e704949af5
SHA1d0a440af6b63b26873e0e7342d7b0ea2bdd8cd62
SHA25692fbf105e4909bd50e13b3c51d492f1bd5b11b7c443b7deec8b9d534dcd2983d
SHA5127a5f9de0666288d5f214fddc752a5fd9e258251f6a6802bda962f0a2aaac1f7a64a61ffe2ae9f984e1520b6cbb0604b04b43a5350e5fba92f574071348cb8328
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1