Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:19
Static task
static1
General
-
Target
43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe
-
Size
1.2MB
-
MD5
8c669c2298c30eb4b47207f044c2c675
-
SHA1
4472a90dcff30f089cfcf95b4662640dbe5b031b
-
SHA256
43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce
-
SHA512
6f5d276a3002c9808131843e17e4c96fbb365a194d29cc85c9a2c3a08ccf0a483e1a2423966b544f976532b1dae02f4b72733b5e9bb0946cd622f0ef39e8714d
-
SSDEEP
24576:PyHz4/kxeEWzStL4lFWoscx4a/E2dCYuhlm5SZJgH88it8ZRNeBbKd:aHz4/k4LzkBpcx4a/y3m5Sf2nYb
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr042526.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr042526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr042526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr042526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr042526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr042526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr042526.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu563171.exesi602199.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu563171.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si602199.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un302441.exeun174996.exepr042526.exequ563171.exe1.exerk622912.exesi602199.exeoneetx.exeoneetx.exeoneetx.exepid process 548 un302441.exe 2112 un174996.exe 4156 pr042526.exe 2192 qu563171.exe 636 1.exe 4172 rk622912.exe 1252 si602199.exe 2764 oneetx.exe 788 oneetx.exe 1700 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1428 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr042526.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr042526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr042526.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un174996.exe43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exeun302441.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un174996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un174996.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un302441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un302441.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3272 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3652 4156 WerFault.exe pr042526.exe 2604 2192 WerFault.exe qu563171.exe 3904 1252 WerFault.exe si602199.exe 4152 1252 WerFault.exe si602199.exe 3380 1252 WerFault.exe si602199.exe 2968 1252 WerFault.exe si602199.exe 4192 1252 WerFault.exe si602199.exe 4616 1252 WerFault.exe si602199.exe 396 1252 WerFault.exe si602199.exe 1568 1252 WerFault.exe si602199.exe 2336 1252 WerFault.exe si602199.exe 2060 1252 WerFault.exe si602199.exe 1444 2764 WerFault.exe oneetx.exe 3812 2764 WerFault.exe oneetx.exe 4116 2764 WerFault.exe oneetx.exe 4420 2764 WerFault.exe oneetx.exe 4692 2764 WerFault.exe oneetx.exe 2844 2764 WerFault.exe oneetx.exe 3872 2764 WerFault.exe oneetx.exe 2112 2764 WerFault.exe oneetx.exe 4892 2764 WerFault.exe oneetx.exe 1924 2764 WerFault.exe oneetx.exe 2476 2764 WerFault.exe oneetx.exe 1320 2764 WerFault.exe oneetx.exe 3536 788 WerFault.exe oneetx.exe 2280 788 WerFault.exe oneetx.exe 2132 788 WerFault.exe oneetx.exe 4192 2764 WerFault.exe oneetx.exe 1064 2764 WerFault.exe oneetx.exe 2580 2764 WerFault.exe oneetx.exe 2060 1700 WerFault.exe oneetx.exe 4128 1700 WerFault.exe oneetx.exe 1084 1700 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr042526.exerk622912.exe1.exepid process 4156 pr042526.exe 4156 pr042526.exe 4172 rk622912.exe 636 1.exe 636 1.exe 4172 rk622912.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr042526.exequ563171.exerk622912.exe1.exedescription pid process Token: SeDebugPrivilege 4156 pr042526.exe Token: SeDebugPrivilege 2192 qu563171.exe Token: SeDebugPrivilege 4172 rk622912.exe Token: SeDebugPrivilege 636 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si602199.exepid process 1252 si602199.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exeun302441.exeun174996.exequ563171.exesi602199.exeoneetx.exedescription pid process target process PID 4356 wrote to memory of 548 4356 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe un302441.exe PID 4356 wrote to memory of 548 4356 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe un302441.exe PID 4356 wrote to memory of 548 4356 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe un302441.exe PID 548 wrote to memory of 2112 548 un302441.exe un174996.exe PID 548 wrote to memory of 2112 548 un302441.exe un174996.exe PID 548 wrote to memory of 2112 548 un302441.exe un174996.exe PID 2112 wrote to memory of 4156 2112 un174996.exe pr042526.exe PID 2112 wrote to memory of 4156 2112 un174996.exe pr042526.exe PID 2112 wrote to memory of 4156 2112 un174996.exe pr042526.exe PID 2112 wrote to memory of 2192 2112 un174996.exe qu563171.exe PID 2112 wrote to memory of 2192 2112 un174996.exe qu563171.exe PID 2112 wrote to memory of 2192 2112 un174996.exe qu563171.exe PID 2192 wrote to memory of 636 2192 qu563171.exe 1.exe PID 2192 wrote to memory of 636 2192 qu563171.exe 1.exe PID 2192 wrote to memory of 636 2192 qu563171.exe 1.exe PID 548 wrote to memory of 4172 548 un302441.exe rk622912.exe PID 548 wrote to memory of 4172 548 un302441.exe rk622912.exe PID 548 wrote to memory of 4172 548 un302441.exe rk622912.exe PID 4356 wrote to memory of 1252 4356 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe si602199.exe PID 4356 wrote to memory of 1252 4356 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe si602199.exe PID 4356 wrote to memory of 1252 4356 43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe si602199.exe PID 1252 wrote to memory of 2764 1252 si602199.exe oneetx.exe PID 1252 wrote to memory of 2764 1252 si602199.exe oneetx.exe PID 1252 wrote to memory of 2764 1252 si602199.exe oneetx.exe PID 2764 wrote to memory of 4800 2764 oneetx.exe schtasks.exe PID 2764 wrote to memory of 4800 2764 oneetx.exe schtasks.exe PID 2764 wrote to memory of 4800 2764 oneetx.exe schtasks.exe PID 2764 wrote to memory of 1428 2764 oneetx.exe rundll32.exe PID 2764 wrote to memory of 1428 2764 oneetx.exe rundll32.exe PID 2764 wrote to memory of 1428 2764 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe"C:\Users\Admin\AppData\Local\Temp\43c9c7a04d76e1e0fd9ebb282f924e1e33631520bedba36fb7f446b12eda9fce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302441.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un174996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un174996.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr042526.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr042526.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 10845⤵
- Program crash
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu563171.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu563171.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 13765⤵
- Program crash
PID:2604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622912.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si602199.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si602199.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 7003⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 7843⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8603⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 9803⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 10163⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 10203⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 12243⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 12723⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 13243⤵
- Program crash
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 6964⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 8804⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10124⤵
- Program crash
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10204⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10804⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10804⤵
- Program crash
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 11164⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10084⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 6964⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 7804⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 12684⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 11084⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 16324⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 15364⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 16404⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 14163⤵
- Program crash
PID:2060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4156 -ip 41561⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2192 -ip 21921⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1252 -ip 12521⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1252 -ip 12521⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1252 -ip 12521⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1252 -ip 12521⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1252 -ip 12521⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1252 -ip 12521⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1252 -ip 12521⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1252 -ip 12521⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1252 -ip 12521⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1252 -ip 12521⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2764 -ip 27641⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2764 -ip 27641⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2764 -ip 27641⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2764 -ip 27641⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2764 -ip 27641⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2764 -ip 27641⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2764 -ip 27641⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2764 -ip 27641⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2764 -ip 27641⤵PID:3332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2764 -ip 27641⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2764 -ip 27641⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2764 -ip 27641⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 3962⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 4402⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 4402⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 788 -ip 7881⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 788 -ip 7881⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 788 -ip 7881⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2764 -ip 27641⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2764 -ip 27641⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2764 -ip 27641⤵PID:3728
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3272
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 3962⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 4642⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 4642⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 1700 -ip 17001⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1700 -ip 17001⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1700 -ip 17001⤵PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
863KB
MD56d972663b7b832e054af47c76cf0cd14
SHA193bae7fef00ad51df492d0e44f7ca6e678e633c7
SHA256c7d6d1f22b3b72d83dd0a72a59f69f2616aee06cac090227995d7d3915fc3bb0
SHA512756c611763a14b9eac758e571dd5146324911858aff3537fee73d4457ed944bce53dadc4ab277c61d13c5198e5dc965882432725b0c12b94668afe3426651012
-
Filesize
863KB
MD56d972663b7b832e054af47c76cf0cd14
SHA193bae7fef00ad51df492d0e44f7ca6e678e633c7
SHA256c7d6d1f22b3b72d83dd0a72a59f69f2616aee06cac090227995d7d3915fc3bb0
SHA512756c611763a14b9eac758e571dd5146324911858aff3537fee73d4457ed944bce53dadc4ab277c61d13c5198e5dc965882432725b0c12b94668afe3426651012
-
Filesize
169KB
MD5e1badfe520ac15c465752c5bfbe9d457
SHA10b1b1cb6b9ad47cde56e658d6a2aa9cccb459637
SHA256a47efc37ad79b98f02a7d6b5ca611cd74c1b9b38096797da3cb203e71f3700f0
SHA512970d114e9af2daecc561f362e6c451f8afafaddd86560f1aeee9f46fcae2dbac5c1ad3a10ef24e7fd5d916cc7c0831bb5eb5d0a5c0389f7b78568f3c6f169174
-
Filesize
169KB
MD5e1badfe520ac15c465752c5bfbe9d457
SHA10b1b1cb6b9ad47cde56e658d6a2aa9cccb459637
SHA256a47efc37ad79b98f02a7d6b5ca611cd74c1b9b38096797da3cb203e71f3700f0
SHA512970d114e9af2daecc561f362e6c451f8afafaddd86560f1aeee9f46fcae2dbac5c1ad3a10ef24e7fd5d916cc7c0831bb5eb5d0a5c0389f7b78568f3c6f169174
-
Filesize
709KB
MD58266c894f4d8ce23c8f8c69ed8c42198
SHA144d791afef75d1edea40bfc66fe1d4661c6044a0
SHA2562e203f47fb5b5fafaa32f410779f2a17897d79f0fda7fc24fe42559cb9da7001
SHA51230aa605592844aef74d9e40f99064b3379934eaa212f05b78a6de30a300447cfcc914ea6fb695ed3358a2d99dbd02ae241b0602ef45962d3665769bd8000038f
-
Filesize
709KB
MD58266c894f4d8ce23c8f8c69ed8c42198
SHA144d791afef75d1edea40bfc66fe1d4661c6044a0
SHA2562e203f47fb5b5fafaa32f410779f2a17897d79f0fda7fc24fe42559cb9da7001
SHA51230aa605592844aef74d9e40f99064b3379934eaa212f05b78a6de30a300447cfcc914ea6fb695ed3358a2d99dbd02ae241b0602ef45962d3665769bd8000038f
-
Filesize
405KB
MD5f9199001853a0f7f5131e180d5613649
SHA16dd8fe5c8584422e8f5ef11cec962acac475a2d2
SHA256c246529d6ab389b9efc7c8e27ad985ed6be14301abf8548a521a50723a36302b
SHA5128a74d27c6c664de89114d25f12073418007ab4709643613fc1e735a64ef911368504401c70d5db2353eb6d9fadef9f0db557b6a11e20cebf57ac51b0719f1c83
-
Filesize
405KB
MD5f9199001853a0f7f5131e180d5613649
SHA16dd8fe5c8584422e8f5ef11cec962acac475a2d2
SHA256c246529d6ab389b9efc7c8e27ad985ed6be14301abf8548a521a50723a36302b
SHA5128a74d27c6c664de89114d25f12073418007ab4709643613fc1e735a64ef911368504401c70d5db2353eb6d9fadef9f0db557b6a11e20cebf57ac51b0719f1c83
-
Filesize
588KB
MD5ecea01c85bade139df3d86461ee77a4e
SHA1a1fe0a93b1ccfadd07c4308669c4dd74463678bb
SHA256625fd2cded25d7088de5069e3590a0653da1df17ec5e728ae47b4d9dbecdd075
SHA5120f56fca62b919e978a2d1cb46b2cab522d1663e50b91b405b2ca70f1ff303216f688691e0bb68c6fc5695df93f5c422f9f936fdcf1e1afd02938e2fa881d9e21
-
Filesize
588KB
MD5ecea01c85bade139df3d86461ee77a4e
SHA1a1fe0a93b1ccfadd07c4308669c4dd74463678bb
SHA256625fd2cded25d7088de5069e3590a0653da1df17ec5e728ae47b4d9dbecdd075
SHA5120f56fca62b919e978a2d1cb46b2cab522d1663e50b91b405b2ca70f1ff303216f688691e0bb68c6fc5695df93f5c422f9f936fdcf1e1afd02938e2fa881d9e21
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1