Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:31
Static task
static1
General
-
Target
30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe
-
Size
1.0MB
-
MD5
d3e877ffd65bbb5b651ad1bde0b32ed0
-
SHA1
d069a97111240fd7219d5bc8c003c0c0bd175cfd
-
SHA256
30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25
-
SHA512
54a4bdc70f93cb963cb2953dd951ee3efe4ae08232160cb10e2f72a57fa4122b8c55e684b4360880425fc7ac3f7f3c45f18a561b4969d926cd151a56f3070adb
-
SSDEEP
24576:uyDtzIRDuuRVsmR9nc+vgN4J27qLY3KVu5:9Iag9gOJOH3d
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it360102.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it360102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it360102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it360102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it360102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it360102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it360102.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr481626.exelr552672.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr481626.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr552672.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zidI0166.exezilG5408.exeit360102.exejr481626.exe1.exekp770960.exelr552672.exeoneetx.exeoneetx.exeoneetx.exepid process 1988 zidI0166.exe 740 zilG5408.exe 3148 it360102.exe 324 jr481626.exe 2100 1.exe 2944 kp770960.exe 2880 lr552672.exe 3632 oneetx.exe 4456 oneetx.exe 5052 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 848 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it360102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it360102.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exezidI0166.exezilG5408.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidI0166.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidI0166.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zilG5408.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zilG5408.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4192 324 WerFault.exe jr481626.exe 4672 2880 WerFault.exe lr552672.exe 4520 2880 WerFault.exe lr552672.exe 4420 2880 WerFault.exe lr552672.exe 4628 2880 WerFault.exe lr552672.exe 3700 2880 WerFault.exe lr552672.exe 3596 2880 WerFault.exe lr552672.exe 2080 2880 WerFault.exe lr552672.exe 4440 2880 WerFault.exe lr552672.exe 852 2880 WerFault.exe lr552672.exe 1540 2880 WerFault.exe lr552672.exe 4176 3632 WerFault.exe oneetx.exe 3864 3632 WerFault.exe oneetx.exe 1268 3632 WerFault.exe oneetx.exe 3016 3632 WerFault.exe oneetx.exe 2384 3632 WerFault.exe oneetx.exe 4064 3632 WerFault.exe oneetx.exe 2796 3632 WerFault.exe oneetx.exe 3840 3632 WerFault.exe oneetx.exe 2436 3632 WerFault.exe oneetx.exe 324 3632 WerFault.exe oneetx.exe 1516 3632 WerFault.exe oneetx.exe 2764 4456 WerFault.exe oneetx.exe 3952 4456 WerFault.exe oneetx.exe 4236 4456 WerFault.exe oneetx.exe 4976 3632 WerFault.exe oneetx.exe 3376 3632 WerFault.exe oneetx.exe 2912 3632 WerFault.exe oneetx.exe 1992 5052 WerFault.exe oneetx.exe 1396 5052 WerFault.exe oneetx.exe 4736 5052 WerFault.exe oneetx.exe 3744 3632 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it360102.exe1.exekp770960.exepid process 3148 it360102.exe 3148 it360102.exe 2100 1.exe 2944 kp770960.exe 2100 1.exe 2944 kp770960.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it360102.exejr481626.exe1.exekp770960.exedescription pid process Token: SeDebugPrivilege 3148 it360102.exe Token: SeDebugPrivilege 324 jr481626.exe Token: SeDebugPrivilege 2100 1.exe Token: SeDebugPrivilege 2944 kp770960.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr552672.exepid process 2880 lr552672.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exezidI0166.exezilG5408.exejr481626.exelr552672.exeoneetx.exedescription pid process target process PID 1652 wrote to memory of 1988 1652 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe zidI0166.exe PID 1652 wrote to memory of 1988 1652 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe zidI0166.exe PID 1652 wrote to memory of 1988 1652 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe zidI0166.exe PID 1988 wrote to memory of 740 1988 zidI0166.exe zilG5408.exe PID 1988 wrote to memory of 740 1988 zidI0166.exe zilG5408.exe PID 1988 wrote to memory of 740 1988 zidI0166.exe zilG5408.exe PID 740 wrote to memory of 3148 740 zilG5408.exe it360102.exe PID 740 wrote to memory of 3148 740 zilG5408.exe it360102.exe PID 740 wrote to memory of 324 740 zilG5408.exe jr481626.exe PID 740 wrote to memory of 324 740 zilG5408.exe jr481626.exe PID 740 wrote to memory of 324 740 zilG5408.exe jr481626.exe PID 324 wrote to memory of 2100 324 jr481626.exe 1.exe PID 324 wrote to memory of 2100 324 jr481626.exe 1.exe PID 324 wrote to memory of 2100 324 jr481626.exe 1.exe PID 1988 wrote to memory of 2944 1988 zidI0166.exe kp770960.exe PID 1988 wrote to memory of 2944 1988 zidI0166.exe kp770960.exe PID 1988 wrote to memory of 2944 1988 zidI0166.exe kp770960.exe PID 1652 wrote to memory of 2880 1652 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe lr552672.exe PID 1652 wrote to memory of 2880 1652 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe lr552672.exe PID 1652 wrote to memory of 2880 1652 30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe lr552672.exe PID 2880 wrote to memory of 3632 2880 lr552672.exe oneetx.exe PID 2880 wrote to memory of 3632 2880 lr552672.exe oneetx.exe PID 2880 wrote to memory of 3632 2880 lr552672.exe oneetx.exe PID 3632 wrote to memory of 3828 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 3828 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 3828 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 848 3632 oneetx.exe rundll32.exe PID 3632 wrote to memory of 848 3632 oneetx.exe rundll32.exe PID 3632 wrote to memory of 848 3632 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe"C:\Users\Admin\AppData\Local\Temp\30bbace4aa811e5678c2cafb046b529edf3e972d109787193fd44b964b72fd25.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidI0166.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidI0166.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zilG5408.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zilG5408.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it360102.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it360102.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr481626.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr481626.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 13845⤵
- Program crash
PID:4192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp770960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp770960.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr552672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr552672.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 7003⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 7843⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 8163⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 9563⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 9603⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 9603⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 12203⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 12483⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 13163⤵
- Program crash
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 6964⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8484⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8724⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10644⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10604⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11124⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11204⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10204⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7804⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 6964⤵
- Program crash
PID:324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7644⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11404⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 16284⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11404⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 15244⤵
- Program crash
PID:3744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 12043⤵
- Program crash
PID:1540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 324 -ip 3241⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2880 -ip 28801⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2880 -ip 28801⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2880 -ip 28801⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2880 -ip 28801⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2880 -ip 28801⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2880 -ip 28801⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2880 -ip 28801⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2880 -ip 28801⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2880 -ip 28801⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2880 -ip 28801⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3632 -ip 36321⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3632 -ip 36321⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3632 -ip 36321⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3632 -ip 36321⤵PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3632 -ip 36321⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3632 -ip 36321⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3632 -ip 36321⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3632 -ip 36321⤵PID:3756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3632 -ip 36321⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 3962⤵
- Program crash
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 4402⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 4402⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4456 -ip 44561⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4456 -ip 44561⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4456 -ip 44561⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3632 -ip 36321⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3632 -ip 36321⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3632 -ip 36321⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 3962⤵
- Program crash
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 4402⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 4402⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5052 -ip 50521⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5052 -ip 50521⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5052 -ip 50521⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3632 -ip 36321⤵PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD560a02428862ead4a5209f31117b7dda6
SHA1f80c2df8873f425f4d7330e139155522e469f43f
SHA2565fecb515a9e0a1c4ff364bf9eb63fe9ee009745d85153151bed46e194db99edf
SHA51279fa03b3161e0ae1a8ef2b796bcc94e586b47a07963b4bd18a78f009683520f029b2517022cd7d341c11b0af2b4a0537abf7ad1215b4781d9cfd6c54f0546439
-
Filesize
724KB
MD560a02428862ead4a5209f31117b7dda6
SHA1f80c2df8873f425f4d7330e139155522e469f43f
SHA2565fecb515a9e0a1c4ff364bf9eb63fe9ee009745d85153151bed46e194db99edf
SHA51279fa03b3161e0ae1a8ef2b796bcc94e586b47a07963b4bd18a78f009683520f029b2517022cd7d341c11b0af2b4a0537abf7ad1215b4781d9cfd6c54f0546439
-
Filesize
169KB
MD5b6dd3b3008afb02ab6757d9077d93ba5
SHA12483bc0c32a0a2321c78ec83b7fc6eb2f0ab9880
SHA25621645a5755924ea63cc48fa5ca24e9b38d8363618a97f16e0e633a29d1e45189
SHA512097df02b1892abae1e1604d548aa3aebe32d1e1b33692d4e2aa3fef76e112cc243ef51a94ac87f0d423e669dfce71278e1975b3861a0360cac4b104f4f672be5
-
Filesize
169KB
MD5b6dd3b3008afb02ab6757d9077d93ba5
SHA12483bc0c32a0a2321c78ec83b7fc6eb2f0ab9880
SHA25621645a5755924ea63cc48fa5ca24e9b38d8363618a97f16e0e633a29d1e45189
SHA512097df02b1892abae1e1604d548aa3aebe32d1e1b33692d4e2aa3fef76e112cc243ef51a94ac87f0d423e669dfce71278e1975b3861a0360cac4b104f4f672be5
-
Filesize
570KB
MD54bcd1891ca9d2b0c43e3bfbee82986a9
SHA1f7846856478a215122bf723346af432f007df065
SHA256ab1a887ff9830564e61443da0535216fa3278cbd3066671402cd33dfa979f0ec
SHA512dab116106d804b4bafbf02a0fc319d31bd6413489cff3bc5e05e184a1672aeea89cb059a4745e73a4829cded21b2bcbe570bde3c01fb33b0bf7e1fcd8c98f7a3
-
Filesize
570KB
MD54bcd1891ca9d2b0c43e3bfbee82986a9
SHA1f7846856478a215122bf723346af432f007df065
SHA256ab1a887ff9830564e61443da0535216fa3278cbd3066671402cd33dfa979f0ec
SHA512dab116106d804b4bafbf02a0fc319d31bd6413489cff3bc5e05e184a1672aeea89cb059a4745e73a4829cded21b2bcbe570bde3c01fb33b0bf7e1fcd8c98f7a3
-
Filesize
11KB
MD515999b9c21e0d8658357ea0052933718
SHA195bf633dc5b11fbc93563cec8617bb8dd069a6aa
SHA256d914845940aade1152aca31d7b764527621f2f277a4bb4ad9c9fab4c0905b530
SHA5123ae1422b86edb1b6b6db4f560cf69b2b1f2975aad9cc1efe295834b5fbf48e1ef558a9df5b59cdc39084765c57f74d38d56afc5c19810d6f45e3ae54bfbb0982
-
Filesize
11KB
MD515999b9c21e0d8658357ea0052933718
SHA195bf633dc5b11fbc93563cec8617bb8dd069a6aa
SHA256d914845940aade1152aca31d7b764527621f2f277a4bb4ad9c9fab4c0905b530
SHA5123ae1422b86edb1b6b6db4f560cf69b2b1f2975aad9cc1efe295834b5fbf48e1ef558a9df5b59cdc39084765c57f74d38d56afc5c19810d6f45e3ae54bfbb0982
-
Filesize
588KB
MD535edb737b752c96ae37d1f0a6d5820b0
SHA15e3ecfa259b48b17e5bd8f0174ac66614c499139
SHA256b607e72757b9cc74d4ada0a9b5b49bfde34c53502c5a6764e180cc66c6f8679b
SHA512d6c066992aa1a96f4b00b0344523a3483570e9d2cb1859d8c2d6f291b685dd54a9225e21b9b668c4da9e3948b4ec4d9ef99c4508c96416ce1fa95ef7fb4bc9bb
-
Filesize
588KB
MD535edb737b752c96ae37d1f0a6d5820b0
SHA15e3ecfa259b48b17e5bd8f0174ac66614c499139
SHA256b607e72757b9cc74d4ada0a9b5b49bfde34c53502c5a6764e180cc66c6f8679b
SHA512d6c066992aa1a96f4b00b0344523a3483570e9d2cb1859d8c2d6f291b685dd54a9225e21b9b668c4da9e3948b4ec4d9ef99c4508c96416ce1fa95ef7fb4bc9bb
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1