Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:40
Static task
static1
General
-
Target
b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe
-
Size
1.0MB
-
MD5
e00bb4e3a52af387a562d50aefcf638c
-
SHA1
c283e5ba10d53666ea82a51a9bf8ad0741435bd2
-
SHA256
b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af
-
SHA512
7a7eefdc2aca182c7bf2f1c0291deb6a5200452f6e5a1d20b3e2d8a1c2364f330b55c30ff0c424c87b20ea910f655e1917dadf90de5c1c11443ef296ddabcc44
-
SSDEEP
24576:+y02Nfsqs7/3/1rrUPiB2XuFkH2gSY3rGDrxu:N0Gfsq4PRcXOkW2rY
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it955032.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it955032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it955032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it955032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it955032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it955032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it955032.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr030653.exelr590295.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation jr030653.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr590295.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
zipi5751.exeziZU1031.exeit955032.exejr030653.exe1.exekp782944.exelr590295.exeoneetx.exeoneetx.exepid process 2484 zipi5751.exe 840 ziZU1031.exe 2508 it955032.exe 2168 jr030653.exe 2788 1.exe 868 kp782944.exe 3876 lr590295.exe 4768 oneetx.exe 2076 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4788 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it955032.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it955032.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exezipi5751.exeziZU1031.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipi5751.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipi5751.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziZU1031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziZU1031.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 760 2168 WerFault.exe jr030653.exe 1132 3876 WerFault.exe lr590295.exe 4716 3876 WerFault.exe lr590295.exe 4332 3876 WerFault.exe lr590295.exe 1940 3876 WerFault.exe lr590295.exe 2440 3876 WerFault.exe lr590295.exe 1796 3876 WerFault.exe lr590295.exe 2552 3876 WerFault.exe lr590295.exe 2872 3876 WerFault.exe lr590295.exe 2832 3876 WerFault.exe lr590295.exe 3540 3876 WerFault.exe lr590295.exe 2008 4768 WerFault.exe oneetx.exe 4996 4768 WerFault.exe oneetx.exe 3940 4768 WerFault.exe oneetx.exe 2796 4768 WerFault.exe oneetx.exe 4040 4768 WerFault.exe oneetx.exe 4948 4768 WerFault.exe oneetx.exe 1792 4768 WerFault.exe oneetx.exe 1680 4768 WerFault.exe oneetx.exe 2492 4768 WerFault.exe oneetx.exe 3356 4768 WerFault.exe oneetx.exe 1420 4768 WerFault.exe oneetx.exe 1900 4768 WerFault.exe oneetx.exe 948 4768 WerFault.exe oneetx.exe 5032 4768 WerFault.exe oneetx.exe 4304 4768 WerFault.exe oneetx.exe 1912 2076 WerFault.exe oneetx.exe 4612 2076 WerFault.exe oneetx.exe 4960 2076 WerFault.exe oneetx.exe 2840 4768 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it955032.exekp782944.exe1.exepid process 2508 it955032.exe 2508 it955032.exe 868 kp782944.exe 2788 1.exe 2788 1.exe 868 kp782944.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it955032.exejr030653.exekp782944.exe1.exedescription pid process Token: SeDebugPrivilege 2508 it955032.exe Token: SeDebugPrivilege 2168 jr030653.exe Token: SeDebugPrivilege 868 kp782944.exe Token: SeDebugPrivilege 2788 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr590295.exepid process 3876 lr590295.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exezipi5751.exeziZU1031.exejr030653.exelr590295.exeoneetx.exedescription pid process target process PID 4136 wrote to memory of 2484 4136 b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe zipi5751.exe PID 4136 wrote to memory of 2484 4136 b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe zipi5751.exe PID 4136 wrote to memory of 2484 4136 b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe zipi5751.exe PID 2484 wrote to memory of 840 2484 zipi5751.exe ziZU1031.exe PID 2484 wrote to memory of 840 2484 zipi5751.exe ziZU1031.exe PID 2484 wrote to memory of 840 2484 zipi5751.exe ziZU1031.exe PID 840 wrote to memory of 2508 840 ziZU1031.exe it955032.exe PID 840 wrote to memory of 2508 840 ziZU1031.exe it955032.exe PID 840 wrote to memory of 2168 840 ziZU1031.exe jr030653.exe PID 840 wrote to memory of 2168 840 ziZU1031.exe jr030653.exe PID 840 wrote to memory of 2168 840 ziZU1031.exe jr030653.exe PID 2168 wrote to memory of 2788 2168 jr030653.exe 1.exe PID 2168 wrote to memory of 2788 2168 jr030653.exe 1.exe PID 2168 wrote to memory of 2788 2168 jr030653.exe 1.exe PID 2484 wrote to memory of 868 2484 zipi5751.exe kp782944.exe PID 2484 wrote to memory of 868 2484 zipi5751.exe kp782944.exe PID 2484 wrote to memory of 868 2484 zipi5751.exe kp782944.exe PID 4136 wrote to memory of 3876 4136 b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe lr590295.exe PID 4136 wrote to memory of 3876 4136 b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe lr590295.exe PID 4136 wrote to memory of 3876 4136 b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe lr590295.exe PID 3876 wrote to memory of 4768 3876 lr590295.exe oneetx.exe PID 3876 wrote to memory of 4768 3876 lr590295.exe oneetx.exe PID 3876 wrote to memory of 4768 3876 lr590295.exe oneetx.exe PID 4768 wrote to memory of 404 4768 oneetx.exe schtasks.exe PID 4768 wrote to memory of 404 4768 oneetx.exe schtasks.exe PID 4768 wrote to memory of 404 4768 oneetx.exe schtasks.exe PID 4768 wrote to memory of 4788 4768 oneetx.exe rundll32.exe PID 4768 wrote to memory of 4788 4768 oneetx.exe rundll32.exe PID 4768 wrote to memory of 4788 4768 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe"C:\Users\Admin\AppData\Local\Temp\b3a146db3d2d0e7daaea69b6cb6620ee1affae7855a93946848aa72b5f0756af.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipi5751.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipi5751.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziZU1031.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziZU1031.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it955032.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it955032.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr030653.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr030653.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 13845⤵
- Program crash
PID:760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp782944.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp782944.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr590295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr590295.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 7003⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 7963⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 8163⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 9723⤵
- Program crash
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 9883⤵
- Program crash
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 9883⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 12203⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 12683⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 13003⤵
- Program crash
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 6964⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8444⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 9044⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10524⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10524⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10524⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10684⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 9964⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7844⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 9124⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7524⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 14364⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 11244⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 14324⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 14484⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 16644⤵
- Program crash
PID:2840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 12363⤵
- Program crash
PID:3540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2168 -ip 21681⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3876 -ip 38761⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3876 -ip 38761⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3876 -ip 38761⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3876 -ip 38761⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3876 -ip 38761⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3876 -ip 38761⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3876 -ip 38761⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3876 -ip 38761⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3876 -ip 38761⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3876 -ip 38761⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4768 -ip 47681⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4768 -ip 47681⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4768 -ip 47681⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4768 -ip 47681⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4768 -ip 47681⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4768 -ip 47681⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4768 -ip 47681⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4768 -ip 47681⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4768 -ip 47681⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4768 -ip 47681⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4768 -ip 47681⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4768 -ip 47681⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 3962⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 4402⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 5002⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2076 -ip 20761⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2076 -ip 20761⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2076 -ip 20761⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4768 -ip 47681⤵PID:2272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD5aea568ce7a573a86fded881ff2a52fef
SHA1f4624395630cbfb29ec54655e31a1fb110b2a450
SHA256a4a6de093a164c0469fdf2a90814a7c0b523adf3000912c2b7b3514935bcfb6e
SHA5124f66580751e6e53f889be91e1c7f3147960e481b78cc2e5027202f08b184e4f2cf79bcdb201bd765ac5926727d64a1a45779bb17ee5e17b98324184d7c5a0d96
-
Filesize
724KB
MD5aea568ce7a573a86fded881ff2a52fef
SHA1f4624395630cbfb29ec54655e31a1fb110b2a450
SHA256a4a6de093a164c0469fdf2a90814a7c0b523adf3000912c2b7b3514935bcfb6e
SHA5124f66580751e6e53f889be91e1c7f3147960e481b78cc2e5027202f08b184e4f2cf79bcdb201bd765ac5926727d64a1a45779bb17ee5e17b98324184d7c5a0d96
-
Filesize
169KB
MD5d4db65b85c5722aa63390f6aeb5c608c
SHA1978cbf94a29002bbcfa4a12c676babed4e0f10dd
SHA256aa05d4a05747d8dcb7b0b0186c4fedba1b5bfe48d2f17dcd3f2b21b2c434f901
SHA512ff8a9dfa95e1be45bfb819a0adb92f85df8c95247b8430aaa1c251c87d328ca0849b93dc732040adeef0fee1b99f27a1dba0aacae6c7c2786dffb742c3337c64
-
Filesize
169KB
MD5d4db65b85c5722aa63390f6aeb5c608c
SHA1978cbf94a29002bbcfa4a12c676babed4e0f10dd
SHA256aa05d4a05747d8dcb7b0b0186c4fedba1b5bfe48d2f17dcd3f2b21b2c434f901
SHA512ff8a9dfa95e1be45bfb819a0adb92f85df8c95247b8430aaa1c251c87d328ca0849b93dc732040adeef0fee1b99f27a1dba0aacae6c7c2786dffb742c3337c64
-
Filesize
570KB
MD52c84369a6f961016a815e22313282177
SHA1c1ecd520f497d61daa965c16d62e924183ac53e1
SHA256353ebb75ceab059ab2482378cf68520db997e59e27e91b8267203a55dad314aa
SHA512e17c2d2e65b6226cb0cf0969585804afde35582d732e8ad1035dd314f71fa9b39279fb0b529d12c3bd1ec5a8608f0db2978da7f3dbe296a59dca9b3397d5c3e1
-
Filesize
570KB
MD52c84369a6f961016a815e22313282177
SHA1c1ecd520f497d61daa965c16d62e924183ac53e1
SHA256353ebb75ceab059ab2482378cf68520db997e59e27e91b8267203a55dad314aa
SHA512e17c2d2e65b6226cb0cf0969585804afde35582d732e8ad1035dd314f71fa9b39279fb0b529d12c3bd1ec5a8608f0db2978da7f3dbe296a59dca9b3397d5c3e1
-
Filesize
11KB
MD54c311a94500b9d6fcffde8acbf1252fe
SHA1da2535172ff24294e0023d192d013c354def7197
SHA256a567ecef16b7ed1c64ec037484417d4b16b09517e19277225ebd74a0107dba6c
SHA512010880d15748ee41c163cf25d11e63c3b89ccdeb310ea0c06754eab239a6dc687cc8e376f0576c4c7e1c992e6be5ec76051529b65e2871c2819a88a5d525e7ae
-
Filesize
11KB
MD54c311a94500b9d6fcffde8acbf1252fe
SHA1da2535172ff24294e0023d192d013c354def7197
SHA256a567ecef16b7ed1c64ec037484417d4b16b09517e19277225ebd74a0107dba6c
SHA512010880d15748ee41c163cf25d11e63c3b89ccdeb310ea0c06754eab239a6dc687cc8e376f0576c4c7e1c992e6be5ec76051529b65e2871c2819a88a5d525e7ae
-
Filesize
588KB
MD56d8ac0d5916f9422cd70211a25cd5df9
SHA1a9dcfeb6fbd810328f88cabacfe00acdb00ecd9f
SHA256c731d1a01fec626b2d8200cf60490aaa22830278a7c4f2ffc952ac6943bf0cbb
SHA5121aecc475f1e97987ca24ce97c9e194f2c8d1b6a94adb25702c396a02b59a8f9fb582796dc38625c31dad8af9ad7a4fc56265658e96855057616996c8b673f6cb
-
Filesize
588KB
MD56d8ac0d5916f9422cd70211a25cd5df9
SHA1a9dcfeb6fbd810328f88cabacfe00acdb00ecd9f
SHA256c731d1a01fec626b2d8200cf60490aaa22830278a7c4f2ffc952ac6943bf0cbb
SHA5121aecc475f1e97987ca24ce97c9e194f2c8d1b6a94adb25702c396a02b59a8f9fb582796dc38625c31dad8af9ad7a4fc56265658e96855057616996c8b673f6cb
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1