Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:27
Static task
static1
General
-
Target
61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe
-
Size
1.2MB
-
MD5
f974d002803817112496de03fd847336
-
SHA1
169b23c3fd0ebc2060379842ac6c639dc10ed2c5
-
SHA256
61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7
-
SHA512
21fdafb2becb87b7af24ee6c127802075f360ae8da707f55edbbec3a027156c97c73f02c9bc6e20fcd2ff0655003d2b0a428e7406d9411f4f891e38b5ce33c9a
-
SSDEEP
24576:My2hJ/PGbYJFWxBkx4AeawYnoJTKSZJ1+Raj6Q1bHbn6t0M9JAO:72hJ2r7kx4AxKTKSfwRS6Avn6Ps
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr389093.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr389093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr389093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr389093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr389093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr389093.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr389093.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu751470.exesi433051.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu751470.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si433051.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un046932.exeun140201.exepr389093.exequ751470.exe1.exerk308745.exesi433051.exeoneetx.exeoneetx.exepid process 1428 un046932.exe 1856 un140201.exe 2064 pr389093.exe 1984 qu751470.exe 2200 1.exe 5036 rk308745.exe 2060 si433051.exe 776 oneetx.exe 2316 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3412 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr389093.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr389093.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr389093.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un046932.exeun140201.exe61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un046932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un046932.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un140201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un140201.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1160 2064 WerFault.exe pr389093.exe 3184 1984 WerFault.exe qu751470.exe 4648 2060 WerFault.exe si433051.exe 1416 2060 WerFault.exe si433051.exe 2432 2060 WerFault.exe si433051.exe 4800 2060 WerFault.exe si433051.exe 3772 2060 WerFault.exe si433051.exe 868 2060 WerFault.exe si433051.exe 2056 2060 WerFault.exe si433051.exe 1804 2060 WerFault.exe si433051.exe 1160 2060 WerFault.exe si433051.exe 3304 2060 WerFault.exe si433051.exe 2236 776 WerFault.exe oneetx.exe 4988 776 WerFault.exe oneetx.exe 3848 776 WerFault.exe oneetx.exe 316 776 WerFault.exe oneetx.exe 1720 776 WerFault.exe oneetx.exe 1784 776 WerFault.exe oneetx.exe 756 776 WerFault.exe oneetx.exe 1984 776 WerFault.exe oneetx.exe 2332 776 WerFault.exe oneetx.exe 4588 776 WerFault.exe oneetx.exe 4916 776 WerFault.exe oneetx.exe 3720 776 WerFault.exe oneetx.exe 2372 776 WerFault.exe oneetx.exe 3776 776 WerFault.exe oneetx.exe 1532 776 WerFault.exe oneetx.exe 4776 2316 WerFault.exe oneetx.exe 232 2316 WerFault.exe oneetx.exe 3948 2316 WerFault.exe oneetx.exe 4668 776 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr389093.exerk308745.exe1.exepid process 2064 pr389093.exe 2064 pr389093.exe 5036 rk308745.exe 2200 1.exe 5036 rk308745.exe 2200 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr389093.exequ751470.exerk308745.exe1.exedescription pid process Token: SeDebugPrivilege 2064 pr389093.exe Token: SeDebugPrivilege 1984 qu751470.exe Token: SeDebugPrivilege 5036 rk308745.exe Token: SeDebugPrivilege 2200 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si433051.exepid process 2060 si433051.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exeun046932.exeun140201.exequ751470.exesi433051.exeoneetx.exedescription pid process target process PID 116 wrote to memory of 1428 116 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe un046932.exe PID 116 wrote to memory of 1428 116 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe un046932.exe PID 116 wrote to memory of 1428 116 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe un046932.exe PID 1428 wrote to memory of 1856 1428 un046932.exe un140201.exe PID 1428 wrote to memory of 1856 1428 un046932.exe un140201.exe PID 1428 wrote to memory of 1856 1428 un046932.exe un140201.exe PID 1856 wrote to memory of 2064 1856 un140201.exe pr389093.exe PID 1856 wrote to memory of 2064 1856 un140201.exe pr389093.exe PID 1856 wrote to memory of 2064 1856 un140201.exe pr389093.exe PID 1856 wrote to memory of 1984 1856 un140201.exe qu751470.exe PID 1856 wrote to memory of 1984 1856 un140201.exe qu751470.exe PID 1856 wrote to memory of 1984 1856 un140201.exe qu751470.exe PID 1984 wrote to memory of 2200 1984 qu751470.exe 1.exe PID 1984 wrote to memory of 2200 1984 qu751470.exe 1.exe PID 1984 wrote to memory of 2200 1984 qu751470.exe 1.exe PID 1428 wrote to memory of 5036 1428 un046932.exe rk308745.exe PID 1428 wrote to memory of 5036 1428 un046932.exe rk308745.exe PID 1428 wrote to memory of 5036 1428 un046932.exe rk308745.exe PID 116 wrote to memory of 2060 116 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe si433051.exe PID 116 wrote to memory of 2060 116 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe si433051.exe PID 116 wrote to memory of 2060 116 61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe si433051.exe PID 2060 wrote to memory of 776 2060 si433051.exe oneetx.exe PID 2060 wrote to memory of 776 2060 si433051.exe oneetx.exe PID 2060 wrote to memory of 776 2060 si433051.exe oneetx.exe PID 776 wrote to memory of 2644 776 oneetx.exe schtasks.exe PID 776 wrote to memory of 2644 776 oneetx.exe schtasks.exe PID 776 wrote to memory of 2644 776 oneetx.exe schtasks.exe PID 776 wrote to memory of 3412 776 oneetx.exe rundll32.exe PID 776 wrote to memory of 3412 776 oneetx.exe rundll32.exe PID 776 wrote to memory of 3412 776 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe"C:\Users\Admin\AppData\Local\Temp\61e3bf0f7849799682a3ac6b2fd999642502093f373424e694a8e5eaa6fd05e7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046932.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un140201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un140201.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr389093.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr389093.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 10845⤵
- Program crash
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu751470.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu751470.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 14445⤵
- Program crash
PID:3184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk308745.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk308745.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433051.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 7123⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 6883⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 8603⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 9563⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 9923⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 9963⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 12243⤵
- Program crash
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 12163⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 13203⤵
- Program crash
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 6964⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 7204⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 7084⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 10564⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 10924⤵
- Program crash
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 10924⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 11004⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 10044⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 7884⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 8084⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 7924⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 14364⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 11164⤵
- Program crash
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 16324⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 14444⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 16484⤵
- Program crash
PID:4668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 7763⤵
- Program crash
PID:3304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2064 -ip 20641⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1984 -ip 19841⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2060 -ip 20601⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2060 -ip 20601⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2060 -ip 20601⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2060 -ip 20601⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2060 -ip 20601⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 2060 -ip 20601⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2060 -ip 20601⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2060 -ip 20601⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 2060 -ip 20601⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2060 -ip 20601⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 776 -ip 7761⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 776 -ip 7761⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 776 -ip 7761⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 776 -ip 7761⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 776 -ip 7761⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 776 -ip 7761⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 776 -ip 7761⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 776 -ip 7761⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 776 -ip 7761⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 776 -ip 7761⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 776 -ip 7761⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 776 -ip 7761⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 776 -ip 7761⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 776 -ip 7761⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 776 -ip 7761⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 3962⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 4642⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 4642⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2316 -ip 23161⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 2316 -ip 23161⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2316 -ip 23161⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 776 -ip 7761⤵PID:4804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
863KB
MD5d4385a07a8ec66fd72a80127793984d3
SHA1295cca69ab3b0f32c2d2bf4e821f18272743d791
SHA256b956e7728ac41f6b53c8260de731061dbf70a54591bec71e23ec554cb6dbd9e4
SHA512ab40dd40be5458053dd608cdcb2a35b6ab8576b8a1f66d06b4f0315a1f4c5698cf0807711b5494b72ac4a978ba653f08c45fc117898b74d59cfb0d4af5145b99
-
Filesize
863KB
MD5d4385a07a8ec66fd72a80127793984d3
SHA1295cca69ab3b0f32c2d2bf4e821f18272743d791
SHA256b956e7728ac41f6b53c8260de731061dbf70a54591bec71e23ec554cb6dbd9e4
SHA512ab40dd40be5458053dd608cdcb2a35b6ab8576b8a1f66d06b4f0315a1f4c5698cf0807711b5494b72ac4a978ba653f08c45fc117898b74d59cfb0d4af5145b99
-
Filesize
169KB
MD56c73986d950a2c69bd4a1069226a890b
SHA13b8ac539e5ab3446c354439d47fac4f97bbb1f92
SHA25608d080657a47849902c7617b81b9d3aa3792ac0e1da670c3099554b589b6b7c4
SHA512944b1afb64b700c6e3958be7da2c593b9c48291162f0b9aad931b6ab716f55d4ba64958ac3aa8d6a49aff290a0fd1bc5b8c8f97c202eca9fc55895b0035b5675
-
Filesize
169KB
MD56c73986d950a2c69bd4a1069226a890b
SHA13b8ac539e5ab3446c354439d47fac4f97bbb1f92
SHA25608d080657a47849902c7617b81b9d3aa3792ac0e1da670c3099554b589b6b7c4
SHA512944b1afb64b700c6e3958be7da2c593b9c48291162f0b9aad931b6ab716f55d4ba64958ac3aa8d6a49aff290a0fd1bc5b8c8f97c202eca9fc55895b0035b5675
-
Filesize
709KB
MD5dbe7faf0da3d86a4715babf12fbc76ec
SHA1d61fc3d70b28a473011964b44e46510886a61563
SHA256e5d33405c5d20402645b1f6067e82db14a72fa5c6bc22da20b3f54de1f6f1130
SHA5129dabef5bb0e786d72ffa476438b380cd4d8bf0458787d9474788b5f33f48cdac6924c99a184b55ad13488ad13bf8125aec8e60a6c8f67e2941038dbb5b838ee1
-
Filesize
709KB
MD5dbe7faf0da3d86a4715babf12fbc76ec
SHA1d61fc3d70b28a473011964b44e46510886a61563
SHA256e5d33405c5d20402645b1f6067e82db14a72fa5c6bc22da20b3f54de1f6f1130
SHA5129dabef5bb0e786d72ffa476438b380cd4d8bf0458787d9474788b5f33f48cdac6924c99a184b55ad13488ad13bf8125aec8e60a6c8f67e2941038dbb5b838ee1
-
Filesize
405KB
MD5a60dd9f9755ef08c6dacdf44b33fcef4
SHA115939c191e6098fdf2fb9f1c0b01f59b2ef06b57
SHA2563e54ef978c3635a12efa60506418e8fa53ed2afb30ba4f1d1aff2fc827be448a
SHA512afab6152511327b9c03c1982523b0283999884f39a502e8530a4e9fe65675bd6e9946a7ffcbf83923b637af46b23dbf8e6e9675c3069f96cf31e72daf4fb3d6c
-
Filesize
405KB
MD5a60dd9f9755ef08c6dacdf44b33fcef4
SHA115939c191e6098fdf2fb9f1c0b01f59b2ef06b57
SHA2563e54ef978c3635a12efa60506418e8fa53ed2afb30ba4f1d1aff2fc827be448a
SHA512afab6152511327b9c03c1982523b0283999884f39a502e8530a4e9fe65675bd6e9946a7ffcbf83923b637af46b23dbf8e6e9675c3069f96cf31e72daf4fb3d6c
-
Filesize
588KB
MD511ee795200fb251ce3262dd6b85cacfa
SHA1a8d29dc016b7759f0e86d34b67912486950eb367
SHA2566f41d5857872d14341ea9553f7906179acd5bca1568fcee082838a9a0c996169
SHA5127fae69b6889b483b3651f578ff66521e25e3ba259a58ca17dc595dc97527440699ca28508b2b0eb73a4931195570a9c800fe75f735d2f7446d5d55a33c21895f
-
Filesize
588KB
MD511ee795200fb251ce3262dd6b85cacfa
SHA1a8d29dc016b7759f0e86d34b67912486950eb367
SHA2566f41d5857872d14341ea9553f7906179acd5bca1568fcee082838a9a0c996169
SHA5127fae69b6889b483b3651f578ff66521e25e3ba259a58ca17dc595dc97527440699ca28508b2b0eb73a4931195570a9c800fe75f735d2f7446d5d55a33c21895f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1