Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:15
Static task
static1
General
-
Target
a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe
-
Size
1.0MB
-
MD5
663f2f153b759c7c16870b3f28151eef
-
SHA1
e48cdc33d88d851067c55a898870c7d8b8548e81
-
SHA256
a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e
-
SHA512
e96f8efc859a8f30f34040439482253395e5b4acce8f4b0a3773c84998d78c1c92e05027df8e979939ebc084361157f692dee8e055c04cb0206525118a92e159
-
SSDEEP
24576:myJn3VECsJicKRLKNQSsJjRs2pbXKGnPt9sU7YSt:1t+IONQSsdsibXKAjF7f
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it071933.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it071933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it071933.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it071933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it071933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it071933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it071933.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr052158.exelr710913.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr052158.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr710913.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziZm7519.exeziwn6124.exeit071933.exejr052158.exe1.exekp219069.exelr710913.exeoneetx.exeoneetx.exeoneetx.exepid process 872 ziZm7519.exe 2032 ziwn6124.exe 4416 it071933.exe 2460 jr052158.exe 3764 1.exe 992 kp219069.exe 3388 lr710913.exe 5080 oneetx.exe 620 oneetx.exe 2176 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2884 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it071933.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it071933.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exeziZm7519.exeziwn6124.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziZm7519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZm7519.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziwn6124.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziwn6124.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4960 2460 WerFault.exe jr052158.exe 1120 3388 WerFault.exe lr710913.exe 4496 3388 WerFault.exe lr710913.exe 2436 3388 WerFault.exe lr710913.exe 1308 3388 WerFault.exe lr710913.exe 2076 3388 WerFault.exe lr710913.exe 3164 3388 WerFault.exe lr710913.exe 2548 3388 WerFault.exe lr710913.exe 3056 3388 WerFault.exe lr710913.exe 4072 3388 WerFault.exe lr710913.exe 4348 3388 WerFault.exe lr710913.exe 3124 5080 WerFault.exe oneetx.exe 3292 5080 WerFault.exe oneetx.exe 372 5080 WerFault.exe oneetx.exe 1636 5080 WerFault.exe oneetx.exe 2636 5080 WerFault.exe oneetx.exe 4084 5080 WerFault.exe oneetx.exe 704 5080 WerFault.exe oneetx.exe 3212 5080 WerFault.exe oneetx.exe 2964 5080 WerFault.exe oneetx.exe 4076 5080 WerFault.exe oneetx.exe 1872 5080 WerFault.exe oneetx.exe 2728 5080 WerFault.exe oneetx.exe 1556 620 WerFault.exe oneetx.exe 3956 620 WerFault.exe oneetx.exe 3684 620 WerFault.exe oneetx.exe 3680 5080 WerFault.exe oneetx.exe 4788 5080 WerFault.exe oneetx.exe 3056 5080 WerFault.exe oneetx.exe 3120 2176 WerFault.exe oneetx.exe 2120 2176 WerFault.exe oneetx.exe 4980 2176 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it071933.exe1.exekp219069.exepid process 4416 it071933.exe 4416 it071933.exe 3764 1.exe 992 kp219069.exe 992 kp219069.exe 3764 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it071933.exejr052158.exe1.exekp219069.exedescription pid process Token: SeDebugPrivilege 4416 it071933.exe Token: SeDebugPrivilege 2460 jr052158.exe Token: SeDebugPrivilege 3764 1.exe Token: SeDebugPrivilege 992 kp219069.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr710913.exepid process 3388 lr710913.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exeziZm7519.exeziwn6124.exejr052158.exelr710913.exeoneetx.exedescription pid process target process PID 3204 wrote to memory of 872 3204 a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe ziZm7519.exe PID 3204 wrote to memory of 872 3204 a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe ziZm7519.exe PID 3204 wrote to memory of 872 3204 a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe ziZm7519.exe PID 872 wrote to memory of 2032 872 ziZm7519.exe ziwn6124.exe PID 872 wrote to memory of 2032 872 ziZm7519.exe ziwn6124.exe PID 872 wrote to memory of 2032 872 ziZm7519.exe ziwn6124.exe PID 2032 wrote to memory of 4416 2032 ziwn6124.exe it071933.exe PID 2032 wrote to memory of 4416 2032 ziwn6124.exe it071933.exe PID 2032 wrote to memory of 2460 2032 ziwn6124.exe jr052158.exe PID 2032 wrote to memory of 2460 2032 ziwn6124.exe jr052158.exe PID 2032 wrote to memory of 2460 2032 ziwn6124.exe jr052158.exe PID 2460 wrote to memory of 3764 2460 jr052158.exe 1.exe PID 2460 wrote to memory of 3764 2460 jr052158.exe 1.exe PID 2460 wrote to memory of 3764 2460 jr052158.exe 1.exe PID 872 wrote to memory of 992 872 ziZm7519.exe kp219069.exe PID 872 wrote to memory of 992 872 ziZm7519.exe kp219069.exe PID 872 wrote to memory of 992 872 ziZm7519.exe kp219069.exe PID 3204 wrote to memory of 3388 3204 a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe lr710913.exe PID 3204 wrote to memory of 3388 3204 a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe lr710913.exe PID 3204 wrote to memory of 3388 3204 a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe lr710913.exe PID 3388 wrote to memory of 5080 3388 lr710913.exe oneetx.exe PID 3388 wrote to memory of 5080 3388 lr710913.exe oneetx.exe PID 3388 wrote to memory of 5080 3388 lr710913.exe oneetx.exe PID 5080 wrote to memory of 2932 5080 oneetx.exe schtasks.exe PID 5080 wrote to memory of 2932 5080 oneetx.exe schtasks.exe PID 5080 wrote to memory of 2932 5080 oneetx.exe schtasks.exe PID 5080 wrote to memory of 2884 5080 oneetx.exe rundll32.exe PID 5080 wrote to memory of 2884 5080 oneetx.exe rundll32.exe PID 5080 wrote to memory of 2884 5080 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe"C:\Users\Admin\AppData\Local\Temp\a2f32d323ba5f282b42283b34f821e6a7949ae60ff2a3962bb1c4dab4363775e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZm7519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZm7519.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwn6124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwn6124.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it071933.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it071933.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr052158.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr052158.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 13765⤵
- Program crash
PID:4960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp219069.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp219069.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr710913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr710913.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 7003⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 7763⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 8603⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 9843⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 10003⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 10003⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 12203⤵
- Program crash
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 12483⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 13163⤵
- Program crash
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1924⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 8724⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 8964⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 10564⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 10764⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 10764⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 11124⤵
- Program crash
PID:704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 9964⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7324⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7564⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7724⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 11404⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 16364⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 13764⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 16524⤵
- Program crash
PID:3056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 13763⤵
- Program crash
PID:4348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2460 -ip 24601⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3388 -ip 33881⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3388 -ip 33881⤵PID:844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3388 -ip 33881⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3388 -ip 33881⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3388 -ip 33881⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3388 -ip 33881⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3388 -ip 33881⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3388 -ip 33881⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3388 -ip 33881⤵PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3388 -ip 33881⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5080 -ip 50801⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5080 -ip 50801⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5080 -ip 50801⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5080 -ip 50801⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5080 -ip 50801⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5080 -ip 50801⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5080 -ip 50801⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5080 -ip 50801⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5080 -ip 50801⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5080 -ip 50801⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5080 -ip 50801⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5080 -ip 50801⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 4002⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 4402⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 4402⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 620 -ip 6201⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 620 -ip 6201⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 620 -ip 6201⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5080 -ip 50801⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5080 -ip 50801⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5080 -ip 50801⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 3962⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 4402⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 4402⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2176 -ip 21761⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2176 -ip 21761⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2176 -ip 21761⤵PID:2576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD56629d54ce048b59f9d7374f1ef65038f
SHA1e1200facae668448e45031d6e8166954c36761b9
SHA256c333dfa0d62ef0dfb394bacda2b0f10fe990f54a5571a82426e52942bb0e277a
SHA512192d80893e99b91749566f4ac558e81d7493fd6f3c27cf116fae1a63b9d3d419d67937bd5ee3bf9442f46dd64cfe2cf0a1adc9a32c1b119b14090b77b565f6e0
-
Filesize
724KB
MD56629d54ce048b59f9d7374f1ef65038f
SHA1e1200facae668448e45031d6e8166954c36761b9
SHA256c333dfa0d62ef0dfb394bacda2b0f10fe990f54a5571a82426e52942bb0e277a
SHA512192d80893e99b91749566f4ac558e81d7493fd6f3c27cf116fae1a63b9d3d419d67937bd5ee3bf9442f46dd64cfe2cf0a1adc9a32c1b119b14090b77b565f6e0
-
Filesize
169KB
MD562dd6b6d4f863f631afc0a1e2ef55e45
SHA1d3fde204889342b9a125f3cbbd3082c7f0ed0a2a
SHA256757a98fcd23ae7522cf003fe874b472b35a34c51ca03cd1ff4ef16d6a31ea344
SHA5127e73abf81d75e283d97af1d3028ab1856ceff1b94d0eb323265ca84211255269600a9d43d2e97dbd4f7a5d67b878717c283ea61952e4f1bc235527063e073edd
-
Filesize
169KB
MD562dd6b6d4f863f631afc0a1e2ef55e45
SHA1d3fde204889342b9a125f3cbbd3082c7f0ed0a2a
SHA256757a98fcd23ae7522cf003fe874b472b35a34c51ca03cd1ff4ef16d6a31ea344
SHA5127e73abf81d75e283d97af1d3028ab1856ceff1b94d0eb323265ca84211255269600a9d43d2e97dbd4f7a5d67b878717c283ea61952e4f1bc235527063e073edd
-
Filesize
570KB
MD5842d1d96fe053e708ed2d51c5c63ef33
SHA183d01b949ad74e57aaafdb627ae17c53720a2244
SHA2566599c45666feb26d410bf954432c985c7be8ce84d5114cae0aac49344a54eed2
SHA512f641ba5a0d42cbb9aa530ec9a1e1606381d785252e79989bd894e1e2aca6f08fdb0a8c60fff6c3b176907db8bc61fcaa14b3083f2f4e8d2e941a1c612fe30dec
-
Filesize
570KB
MD5842d1d96fe053e708ed2d51c5c63ef33
SHA183d01b949ad74e57aaafdb627ae17c53720a2244
SHA2566599c45666feb26d410bf954432c985c7be8ce84d5114cae0aac49344a54eed2
SHA512f641ba5a0d42cbb9aa530ec9a1e1606381d785252e79989bd894e1e2aca6f08fdb0a8c60fff6c3b176907db8bc61fcaa14b3083f2f4e8d2e941a1c612fe30dec
-
Filesize
11KB
MD567369e7b49da79f802e07489260ce88a
SHA19dfedc73f6ea2ab163aaa38ce118c5f125650af2
SHA256cd0f756e67b429b0d2d2b81ba12b7d8a5725cde7ab6c742f00109ebb98c9c7dd
SHA5126c30afb8caa5980d580902970bb6d33e7d92b36c2f5a76707b5ad0d5d6ecf7c851ea492ec28aa0e1c65952cb12d8bec12f1b596f7a05badfe6c64afa931bfedc
-
Filesize
11KB
MD567369e7b49da79f802e07489260ce88a
SHA19dfedc73f6ea2ab163aaa38ce118c5f125650af2
SHA256cd0f756e67b429b0d2d2b81ba12b7d8a5725cde7ab6c742f00109ebb98c9c7dd
SHA5126c30afb8caa5980d580902970bb6d33e7d92b36c2f5a76707b5ad0d5d6ecf7c851ea492ec28aa0e1c65952cb12d8bec12f1b596f7a05badfe6c64afa931bfedc
-
Filesize
588KB
MD557801d4980abe8165dd0004dafef2192
SHA1c6cf609187837032a3bb475d00938ef3df5e548e
SHA2560bb0754bf46720e1bd5e6d192136058b6c735a0bcf822016d6c8082075d07d64
SHA512ded5a06bb34c566066ad66f8f246a00315115423c9630d60a2408ab82f2571909e91847c23f6dd4fc2dda75e282bfbc3bf7783f11a0913ace75cd02b915be251
-
Filesize
588KB
MD557801d4980abe8165dd0004dafef2192
SHA1c6cf609187837032a3bb475d00938ef3df5e548e
SHA2560bb0754bf46720e1bd5e6d192136058b6c735a0bcf822016d6c8082075d07d64
SHA512ded5a06bb34c566066ad66f8f246a00315115423c9630d60a2408ab82f2571909e91847c23f6dd4fc2dda75e282bfbc3bf7783f11a0913ace75cd02b915be251
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1