Analysis
-
max time kernel
141s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:42
Static task
static1
General
-
Target
584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe
-
Size
1.2MB
-
MD5
3ede610f87f51f73044a8e3176c2fea4
-
SHA1
664a83cd7bc16ab7f5e73f8cc6bd74fb7a89a333
-
SHA256
584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307
-
SHA512
1c8988b7f24aa58dcdbc48e15b15ef0993bd421e9ac090f6ffa25fe61ed7ac006f399ca2cf8930961885fd37d89c5fbfda1327a8c312fe027b0a00d23d9cabc5
-
SSDEEP
24576:tyjWekdega+K9itgiLmYP3jkCSZJ3RXqZks+QZR:IKOgaJitgYzkCSfhXskdI
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr761658.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr761658.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr761658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr761658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr761658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr761658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr761658.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu284242.exesi790806.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu284242.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si790806.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un233972.exeun475459.exepr761658.exequ284242.exe1.exerk379921.exesi790806.exeoneetx.exeoneetx.exeoneetx.exepid process 1516 un233972.exe 3244 un475459.exe 4468 pr761658.exe 4584 qu284242.exe 2676 1.exe 2144 rk379921.exe 4796 si790806.exe 4792 oneetx.exe 940 oneetx.exe 2736 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3184 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr761658.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr761658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr761658.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un233972.exeun475459.exe584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un233972.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un475459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un475459.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un233972.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4516 4468 WerFault.exe pr761658.exe 2248 4584 WerFault.exe qu284242.exe 4580 4796 WerFault.exe si790806.exe 4720 4796 WerFault.exe si790806.exe 4828 4796 WerFault.exe si790806.exe 4380 4796 WerFault.exe si790806.exe 2236 4796 WerFault.exe si790806.exe 952 4796 WerFault.exe si790806.exe 5076 4796 WerFault.exe si790806.exe 2548 4796 WerFault.exe si790806.exe 2580 4796 WerFault.exe si790806.exe 2832 4796 WerFault.exe si790806.exe 2240 4792 WerFault.exe oneetx.exe 1716 4792 WerFault.exe oneetx.exe 3428 4792 WerFault.exe oneetx.exe 60 4792 WerFault.exe oneetx.exe 544 4792 WerFault.exe oneetx.exe 1228 4792 WerFault.exe oneetx.exe 4440 4792 WerFault.exe oneetx.exe 1804 4792 WerFault.exe oneetx.exe 2844 4792 WerFault.exe oneetx.exe 4076 4792 WerFault.exe oneetx.exe 4304 4792 WerFault.exe oneetx.exe 4692 940 WerFault.exe oneetx.exe 3828 940 WerFault.exe oneetx.exe 1420 940 WerFault.exe oneetx.exe 3432 4792 WerFault.exe oneetx.exe 4816 4792 WerFault.exe oneetx.exe 1180 4792 WerFault.exe oneetx.exe 1484 2736 WerFault.exe oneetx.exe 1708 2736 WerFault.exe oneetx.exe 4476 2736 WerFault.exe oneetx.exe 4896 4792 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr761658.exe1.exerk379921.exepid process 4468 pr761658.exe 4468 pr761658.exe 2676 1.exe 2144 rk379921.exe 2144 rk379921.exe 2676 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr761658.exequ284242.exe1.exerk379921.exedescription pid process Token: SeDebugPrivilege 4468 pr761658.exe Token: SeDebugPrivilege 4584 qu284242.exe Token: SeDebugPrivilege 2676 1.exe Token: SeDebugPrivilege 2144 rk379921.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si790806.exepid process 4796 si790806.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exeun233972.exeun475459.exequ284242.exesi790806.exeoneetx.exedescription pid process target process PID 920 wrote to memory of 1516 920 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe un233972.exe PID 920 wrote to memory of 1516 920 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe un233972.exe PID 920 wrote to memory of 1516 920 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe un233972.exe PID 1516 wrote to memory of 3244 1516 un233972.exe un475459.exe PID 1516 wrote to memory of 3244 1516 un233972.exe un475459.exe PID 1516 wrote to memory of 3244 1516 un233972.exe un475459.exe PID 3244 wrote to memory of 4468 3244 un475459.exe pr761658.exe PID 3244 wrote to memory of 4468 3244 un475459.exe pr761658.exe PID 3244 wrote to memory of 4468 3244 un475459.exe pr761658.exe PID 3244 wrote to memory of 4584 3244 un475459.exe qu284242.exe PID 3244 wrote to memory of 4584 3244 un475459.exe qu284242.exe PID 3244 wrote to memory of 4584 3244 un475459.exe qu284242.exe PID 4584 wrote to memory of 2676 4584 qu284242.exe 1.exe PID 4584 wrote to memory of 2676 4584 qu284242.exe 1.exe PID 4584 wrote to memory of 2676 4584 qu284242.exe 1.exe PID 1516 wrote to memory of 2144 1516 un233972.exe rk379921.exe PID 1516 wrote to memory of 2144 1516 un233972.exe rk379921.exe PID 1516 wrote to memory of 2144 1516 un233972.exe rk379921.exe PID 920 wrote to memory of 4796 920 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe si790806.exe PID 920 wrote to memory of 4796 920 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe si790806.exe PID 920 wrote to memory of 4796 920 584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe si790806.exe PID 4796 wrote to memory of 4792 4796 si790806.exe oneetx.exe PID 4796 wrote to memory of 4792 4796 si790806.exe oneetx.exe PID 4796 wrote to memory of 4792 4796 si790806.exe oneetx.exe PID 4792 wrote to memory of 1980 4792 oneetx.exe schtasks.exe PID 4792 wrote to memory of 1980 4792 oneetx.exe schtasks.exe PID 4792 wrote to memory of 1980 4792 oneetx.exe schtasks.exe PID 4792 wrote to memory of 3184 4792 oneetx.exe rundll32.exe PID 4792 wrote to memory of 3184 4792 oneetx.exe rundll32.exe PID 4792 wrote to memory of 3184 4792 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe"C:\Users\Admin\AppData\Local\Temp\584f3e0a8f7ff38e97c2cb70f17cc7a9400730881bea73df77903c25c6ae0307.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233972.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233972.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un475459.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un475459.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr761658.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr761658.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 10845⤵
- Program crash
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu284242.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu284242.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 13805⤵
- Program crash
PID:2248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk379921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk379921.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si790806.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si790806.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 7003⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 7843⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 8003⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 9643⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 9643⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 9643⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 12203⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 12083⤵
- Program crash
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 13163⤵
- Program crash
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 6964⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 8204⤵
- Program crash
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 9244⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10564⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10764⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10764⤵
- Program crash
PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10564⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 9964⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 7844⤵
- Program crash
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 7724⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 9964⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10884⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 16124⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 11444⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 16284⤵
- Program crash
PID:4896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 13603⤵
- Program crash
PID:2832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4468 -ip 44681⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4584 -ip 45841⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4796 -ip 47961⤵PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4796 -ip 47961⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4796 -ip 47961⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4796 -ip 47961⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4796 -ip 47961⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4796 -ip 47961⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4796 -ip 47961⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4796 -ip 47961⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4796 -ip 47961⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4796 -ip 47961⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4792 -ip 47921⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4792 -ip 47921⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4792 -ip 47921⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4792 -ip 47921⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4792 -ip 47921⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4792 -ip 47921⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4792 -ip 47921⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4792 -ip 47921⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4792 -ip 47921⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4792 -ip 47921⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4792 -ip 47921⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 3962⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 4402⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 4402⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 940 -ip 9401⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 940 -ip 9401⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 940 -ip 9401⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4792 -ip 47921⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4792 -ip 47921⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4792 -ip 47921⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 3962⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 4402⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 4402⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2736 -ip 27361⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2736 -ip 27361⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2736 -ip 27361⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4792 -ip 47921⤵PID:4232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD51e189e2a11cf18c5058d5210b4585af9
SHA16ccd811ef9c2a467f5c2f1d9e41c26e96f2e34dc
SHA25600861fd027918e6976244fbff79d99def9da029a459c57c0a15a09f551e73dad
SHA512da137d81909aa21a42e0ac532a5c6293f70082984dc9db46288d09f19473bf6101cd6fa84a25ba14c1e8f4ea16603de578ff01f0086ce4545a5a415ef2d2058c
-
Filesize
862KB
MD51e189e2a11cf18c5058d5210b4585af9
SHA16ccd811ef9c2a467f5c2f1d9e41c26e96f2e34dc
SHA25600861fd027918e6976244fbff79d99def9da029a459c57c0a15a09f551e73dad
SHA512da137d81909aa21a42e0ac532a5c6293f70082984dc9db46288d09f19473bf6101cd6fa84a25ba14c1e8f4ea16603de578ff01f0086ce4545a5a415ef2d2058c
-
Filesize
169KB
MD59da1241885dbe63c42355deaaeefb85b
SHA1ab1a75cea278c0e5219c15693627cfea01010120
SHA256e13f8ddf95eabcebbf89ab638c12ba3ba173f6762dcc57d41456af50e4521168
SHA512fc2084fec3cdb28ed92d40cafc7641621769afe90de072a7ee085381c6163ecae9a57049ff3301bfb250a95a2b59e64df0bf4272e51daff82f9010c2e17383be
-
Filesize
169KB
MD59da1241885dbe63c42355deaaeefb85b
SHA1ab1a75cea278c0e5219c15693627cfea01010120
SHA256e13f8ddf95eabcebbf89ab638c12ba3ba173f6762dcc57d41456af50e4521168
SHA512fc2084fec3cdb28ed92d40cafc7641621769afe90de072a7ee085381c6163ecae9a57049ff3301bfb250a95a2b59e64df0bf4272e51daff82f9010c2e17383be
-
Filesize
708KB
MD58d31ad51f6dc2f694caeef61174dd22d
SHA1718090ac6b6174c424ce8490842b6ace149b4d26
SHA25693c425301c99e1e8ed78a80e61aa13950835581751a6449a5594028a869799e0
SHA512938717b6e51d2a3e0c6d4d3c394246bbcd1b88baf08b6d749697c3d3418da476cb8174cd4439242aa775f9265082d847ae79ff81e60062ffb025333ab3319e36
-
Filesize
708KB
MD58d31ad51f6dc2f694caeef61174dd22d
SHA1718090ac6b6174c424ce8490842b6ace149b4d26
SHA25693c425301c99e1e8ed78a80e61aa13950835581751a6449a5594028a869799e0
SHA512938717b6e51d2a3e0c6d4d3c394246bbcd1b88baf08b6d749697c3d3418da476cb8174cd4439242aa775f9265082d847ae79ff81e60062ffb025333ab3319e36
-
Filesize
405KB
MD5c5b7c76f23f2300ada2938e4f6f1f2f6
SHA1041a57400b7132afe4239414295ea64741a3be88
SHA2562d6319a62c052bda5b6ba3d90b54db8b7143c852ce2ee388c9820fba3d1dadde
SHA51284d7edf6411eb96345f7f047df5149a398b79f9d6154ba41a551fbede779cf2c05722d85ef4e8035744ffe0f9bebbf8484c116b88c52a051db1433050b222769
-
Filesize
405KB
MD5c5b7c76f23f2300ada2938e4f6f1f2f6
SHA1041a57400b7132afe4239414295ea64741a3be88
SHA2562d6319a62c052bda5b6ba3d90b54db8b7143c852ce2ee388c9820fba3d1dadde
SHA51284d7edf6411eb96345f7f047df5149a398b79f9d6154ba41a551fbede779cf2c05722d85ef4e8035744ffe0f9bebbf8484c116b88c52a051db1433050b222769
-
Filesize
588KB
MD517bf46d40cad09cf3dd2ed8a7248a131
SHA10e4836ae1884246db4c34b4f5a3132f970d25220
SHA256adbf05497eadd4a9a7827392fab09d896d4c068ade8f05a7c09d44205e52c7bc
SHA5120f29157c25dffef71e9eb62a850e7c7da81f03a814bf96433362950017a438187e7c32764c7228ddc7a919d321072269470eaa99d28b09aa36bdd9f1522259d5
-
Filesize
588KB
MD517bf46d40cad09cf3dd2ed8a7248a131
SHA10e4836ae1884246db4c34b4f5a3132f970d25220
SHA256adbf05497eadd4a9a7827392fab09d896d4c068ade8f05a7c09d44205e52c7bc
SHA5120f29157c25dffef71e9eb62a850e7c7da81f03a814bf96433362950017a438187e7c32764c7228ddc7a919d321072269470eaa99d28b09aa36bdd9f1522259d5
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1