Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:44
Static task
static1
General
-
Target
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe
-
Size
1.0MB
-
MD5
a2a426d22a2bf231dcc248b52c49efea
-
SHA1
fda20206948431e1f369ba08d761883844187a10
-
SHA256
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf
-
SHA512
bba44425ca474edc4754066f979ea80a0ea722159e54613d14f5f2a8bb61ef43b69f8a467e22c9b035fea77fcaaf2ff9b5f84858ae5cce4c988aa8f5d541e504
-
SSDEEP
24576:Ey/x4aK5bPjowa/Z8JFK1FQDr6fpfWc+MA4Eq8Ora9D1L:T/1K9Pcl/ZpaD+fUcNaV
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it803060.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it803060.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it803060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it803060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it803060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it803060.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it803060.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr631993.exelr933690.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr631993.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr933690.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziDS0540.exeziPr9594.exeit803060.exejr631993.exe1.exekp689068.exelr933690.exeoneetx.exeoneetx.exeoneetx.exepid process 4188 ziDS0540.exe 4288 ziPr9594.exe 4768 it803060.exe 3852 jr631993.exe 5100 1.exe 1376 kp689068.exe 4268 lr933690.exe 4236 oneetx.exe 1328 oneetx.exe 4532 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3360 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it803060.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it803060.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exeziDS0540.exeziPr9594.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDS0540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDS0540.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPr9594.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziPr9594.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 316 3852 WerFault.exe jr631993.exe 4360 4268 WerFault.exe lr933690.exe 5092 4268 WerFault.exe lr933690.exe 2952 4268 WerFault.exe lr933690.exe 5116 4268 WerFault.exe lr933690.exe 4852 4268 WerFault.exe lr933690.exe 2588 4268 WerFault.exe lr933690.exe 4440 4268 WerFault.exe lr933690.exe 4808 4268 WerFault.exe lr933690.exe 3988 4268 WerFault.exe lr933690.exe 3644 4268 WerFault.exe lr933690.exe 2744 4236 WerFault.exe oneetx.exe 1776 4236 WerFault.exe oneetx.exe 752 4236 WerFault.exe oneetx.exe 924 4236 WerFault.exe oneetx.exe 4496 4236 WerFault.exe oneetx.exe 2968 4236 WerFault.exe oneetx.exe 2536 4236 WerFault.exe oneetx.exe 4412 4236 WerFault.exe oneetx.exe 3992 4236 WerFault.exe oneetx.exe 3632 4236 WerFault.exe oneetx.exe 1788 4236 WerFault.exe oneetx.exe 4048 4236 WerFault.exe oneetx.exe 2132 4236 WerFault.exe oneetx.exe 1340 1328 WerFault.exe oneetx.exe 4820 1328 WerFault.exe oneetx.exe 4360 1328 WerFault.exe oneetx.exe 4404 4236 WerFault.exe oneetx.exe 2376 4236 WerFault.exe oneetx.exe 4888 4236 WerFault.exe oneetx.exe 4560 4532 WerFault.exe oneetx.exe 1236 4532 WerFault.exe oneetx.exe 2044 4532 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it803060.exe1.exekp689068.exepid process 4768 it803060.exe 4768 it803060.exe 5100 1.exe 1376 kp689068.exe 1376 kp689068.exe 5100 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it803060.exejr631993.exe1.exekp689068.exedescription pid process Token: SeDebugPrivilege 4768 it803060.exe Token: SeDebugPrivilege 3852 jr631993.exe Token: SeDebugPrivilege 5100 1.exe Token: SeDebugPrivilege 1376 kp689068.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr933690.exepid process 4268 lr933690.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exeziDS0540.exeziPr9594.exejr631993.exelr933690.exeoneetx.exedescription pid process target process PID 4132 wrote to memory of 4188 4132 e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe ziDS0540.exe PID 4132 wrote to memory of 4188 4132 e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe ziDS0540.exe PID 4132 wrote to memory of 4188 4132 e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe ziDS0540.exe PID 4188 wrote to memory of 4288 4188 ziDS0540.exe ziPr9594.exe PID 4188 wrote to memory of 4288 4188 ziDS0540.exe ziPr9594.exe PID 4188 wrote to memory of 4288 4188 ziDS0540.exe ziPr9594.exe PID 4288 wrote to memory of 4768 4288 ziPr9594.exe it803060.exe PID 4288 wrote to memory of 4768 4288 ziPr9594.exe it803060.exe PID 4288 wrote to memory of 3852 4288 ziPr9594.exe jr631993.exe PID 4288 wrote to memory of 3852 4288 ziPr9594.exe jr631993.exe PID 4288 wrote to memory of 3852 4288 ziPr9594.exe jr631993.exe PID 3852 wrote to memory of 5100 3852 jr631993.exe 1.exe PID 3852 wrote to memory of 5100 3852 jr631993.exe 1.exe PID 3852 wrote to memory of 5100 3852 jr631993.exe 1.exe PID 4188 wrote to memory of 1376 4188 ziDS0540.exe kp689068.exe PID 4188 wrote to memory of 1376 4188 ziDS0540.exe kp689068.exe PID 4188 wrote to memory of 1376 4188 ziDS0540.exe kp689068.exe PID 4132 wrote to memory of 4268 4132 e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe lr933690.exe PID 4132 wrote to memory of 4268 4132 e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe lr933690.exe PID 4132 wrote to memory of 4268 4132 e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe lr933690.exe PID 4268 wrote to memory of 4236 4268 lr933690.exe oneetx.exe PID 4268 wrote to memory of 4236 4268 lr933690.exe oneetx.exe PID 4268 wrote to memory of 4236 4268 lr933690.exe oneetx.exe PID 4236 wrote to memory of 1464 4236 oneetx.exe schtasks.exe PID 4236 wrote to memory of 1464 4236 oneetx.exe schtasks.exe PID 4236 wrote to memory of 1464 4236 oneetx.exe schtasks.exe PID 4236 wrote to memory of 3360 4236 oneetx.exe rundll32.exe PID 4236 wrote to memory of 3360 4236 oneetx.exe rundll32.exe PID 4236 wrote to memory of 3360 4236 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe"C:\Users\Admin\AppData\Local\Temp\e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDS0540.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDS0540.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPr9594.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPr9594.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it803060.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it803060.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr631993.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr631993.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 13805⤵
- Program crash
PID:316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp689068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp689068.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr933690.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr933690.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 7003⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 7843⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 8123⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 9803⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 9843⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 9683⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 12243⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 12363⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 13203⤵
- Program crash
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 6324⤵
- Program crash
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 8484⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 9084⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 10564⤵
- Program crash
PID:924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 10644⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 10644⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 11044⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 9964⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 12924⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 6324⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 13284⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 15124⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 11124⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 15244⤵
- Program crash
PID:4404
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 11364⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 16844⤵
- Program crash
PID:4888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 13683⤵
- Program crash
PID:3644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3852 -ip 38521⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4268 -ip 42681⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4268 -ip 42681⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4268 -ip 42681⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4268 -ip 42681⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4268 -ip 42681⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4268 -ip 42681⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4268 -ip 42681⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4268 -ip 42681⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4268 -ip 42681⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4268 -ip 42681⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4236 -ip 42361⤵PID:728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4236 -ip 42361⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4236 -ip 42361⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4236 -ip 42361⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4236 -ip 42361⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 4236 -ip 42361⤵PID:340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4236 -ip 42361⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4236 -ip 42361⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4236 -ip 42361⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4236 -ip 42361⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4236 -ip 42361⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4236 -ip 42361⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4236 -ip 42361⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 3962⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 4402⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 5042⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1328 -ip 13281⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1328 -ip 13281⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1328 -ip 13281⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4236 -ip 42361⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4236 -ip 42361⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4236 -ip 42361⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 4002⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 4402⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 4402⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4532 -ip 45321⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4532 -ip 45321⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4532 -ip 45321⤵PID:3644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD512453fbcdd07ba6519b48cd56e2f52c6
SHA14ad0b691ddadce97c6d760e5d68410befb4b13db
SHA25621777ac3b3ac9cd7c67e5e269256b941a3287769d74c1a8c437eea0e9636421a
SHA512ec0b5affad38a502b941bdd5816ca0f55de345ef6f51b13ea1990c04202ddf936c0a7df3d8991d82d6d0dd042fac78bb535d1083533c6fc96570266703ae0779
-
Filesize
723KB
MD512453fbcdd07ba6519b48cd56e2f52c6
SHA14ad0b691ddadce97c6d760e5d68410befb4b13db
SHA25621777ac3b3ac9cd7c67e5e269256b941a3287769d74c1a8c437eea0e9636421a
SHA512ec0b5affad38a502b941bdd5816ca0f55de345ef6f51b13ea1990c04202ddf936c0a7df3d8991d82d6d0dd042fac78bb535d1083533c6fc96570266703ae0779
-
Filesize
169KB
MD51501b7ec28e95d80b41037d231a900c7
SHA1e05ee8513714240452aebf31bf73781fe2b3277c
SHA256442ae0ec64bd2674d2e4e7fe6635752969fc80d7363055d64d5128af368db838
SHA5124f8372e092566068e65a75e7bdbb375269165bede7dd14a40357eee405ae7cf992c99a973f6312439d59af081e631b91bea385b3f5f241c5a70094aa81651a13
-
Filesize
169KB
MD51501b7ec28e95d80b41037d231a900c7
SHA1e05ee8513714240452aebf31bf73781fe2b3277c
SHA256442ae0ec64bd2674d2e4e7fe6635752969fc80d7363055d64d5128af368db838
SHA5124f8372e092566068e65a75e7bdbb375269165bede7dd14a40357eee405ae7cf992c99a973f6312439d59af081e631b91bea385b3f5f241c5a70094aa81651a13
-
Filesize
569KB
MD54673c56e50640df0dc3dd9fb132f0fe5
SHA148a0e76b997008fcf885604bbfc8b89c3b1234cd
SHA25697ad746f586a1b655c464b53adc35f4cc1f96c2dd325c6603042bc5b1a8f3aba
SHA5120c10eb0d3868d1e36f6d6cbab589a152d87d467910143ddddd72fc742693c9b67194760b8e76ed29250ada6bcc9dfb3f9815272428e653a7c86835e82eeeeeda
-
Filesize
569KB
MD54673c56e50640df0dc3dd9fb132f0fe5
SHA148a0e76b997008fcf885604bbfc8b89c3b1234cd
SHA25697ad746f586a1b655c464b53adc35f4cc1f96c2dd325c6603042bc5b1a8f3aba
SHA5120c10eb0d3868d1e36f6d6cbab589a152d87d467910143ddddd72fc742693c9b67194760b8e76ed29250ada6bcc9dfb3f9815272428e653a7c86835e82eeeeeda
-
Filesize
11KB
MD523b33000afb994059f5da681c613980f
SHA1fca986918b5542a5c35402498556e075f15e91cd
SHA25670c4e7772e9bff2137631185bd0d7e0871d7db6fae1ccf0f2588583dd33299dc
SHA512044c9ad9cc0f67863981ffa13219dccef6493cbf6ec3de537481526f082968c22b0293b51adade65a4e7ba9533c7f8b5fc33e02ddbe007a71510682b07770d55
-
Filesize
11KB
MD523b33000afb994059f5da681c613980f
SHA1fca986918b5542a5c35402498556e075f15e91cd
SHA25670c4e7772e9bff2137631185bd0d7e0871d7db6fae1ccf0f2588583dd33299dc
SHA512044c9ad9cc0f67863981ffa13219dccef6493cbf6ec3de537481526f082968c22b0293b51adade65a4e7ba9533c7f8b5fc33e02ddbe007a71510682b07770d55
-
Filesize
588KB
MD5bbd2b40794a71b9e2b9b128ab012d362
SHA12b1a6088c7a91244362e37121b9c21c44424571f
SHA25690a4b095a0535053e4d9a8209b52a50058d0894f1d0721a006662c5fb554a911
SHA512cc566a565a4189617b0ff9acbba00929755f0a9d6464dc1948f229f1286d78a4e50b90c5fe0041b5960fe995a8664bcda5a487e65f90083f2d754dcb04711261
-
Filesize
588KB
MD5bbd2b40794a71b9e2b9b128ab012d362
SHA12b1a6088c7a91244362e37121b9c21c44424571f
SHA25690a4b095a0535053e4d9a8209b52a50058d0894f1d0721a006662c5fb554a911
SHA512cc566a565a4189617b0ff9acbba00929755f0a9d6464dc1948f229f1286d78a4e50b90c5fe0041b5960fe995a8664bcda5a487e65f90083f2d754dcb04711261
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1