Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:47
Static task
static1
General
-
Target
8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe
-
Size
1.0MB
-
MD5
85ada43238687b4b3d9b3a6bfa98d29e
-
SHA1
629911dc830c16d3bff8606bb2afc6d3ee5181c1
-
SHA256
8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8
-
SHA512
d2e648cfc918f4099482fd87cf505488fc460d3dfa69bf1230dd1903bb797601dfb2be318dc0f60af64945b609c86a28e73ddc1397d11592cbfef3d9bb86dec2
-
SSDEEP
24576:xyrnLB1vdbrwW3xJmWb4lRNkhLQqf72/WqzOZqsD:kFpz0lzkhLQqChi
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it490030.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it490030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it490030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it490030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it490030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it490030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it490030.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr855741.exelr474243.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation jr855741.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr474243.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zipy1216.exeziTP1369.exeit490030.exejr855741.exe1.exekp740920.exelr474243.exeoneetx.exeoneetx.exeoneetx.exepid process 4336 zipy1216.exe 5024 ziTP1369.exe 1676 it490030.exe 3560 jr855741.exe 2524 1.exe 4820 kp740920.exe 4972 lr474243.exe 3268 oneetx.exe 3540 oneetx.exe 1916 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1616 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it490030.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it490030.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exezipy1216.exeziTP1369.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipy1216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipy1216.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTP1369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziTP1369.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4680 3560 WerFault.exe jr855741.exe 1644 4972 WerFault.exe lr474243.exe 3748 4972 WerFault.exe lr474243.exe 4352 4972 WerFault.exe lr474243.exe 3596 4972 WerFault.exe lr474243.exe 4964 4972 WerFault.exe lr474243.exe 2052 4972 WerFault.exe lr474243.exe 536 4972 WerFault.exe lr474243.exe 2008 4972 WerFault.exe lr474243.exe 3892 4972 WerFault.exe lr474243.exe 1628 4972 WerFault.exe lr474243.exe 3488 3268 WerFault.exe oneetx.exe 2308 3268 WerFault.exe oneetx.exe 3136 3268 WerFault.exe oneetx.exe 2676 3268 WerFault.exe oneetx.exe 1952 3268 WerFault.exe oneetx.exe 3692 3268 WerFault.exe oneetx.exe 2768 3268 WerFault.exe oneetx.exe 4788 3268 WerFault.exe oneetx.exe 4100 3268 WerFault.exe oneetx.exe 3020 3268 WerFault.exe oneetx.exe 3144 3268 WerFault.exe oneetx.exe 4672 3540 WerFault.exe oneetx.exe 4820 3540 WerFault.exe oneetx.exe 3848 3540 WerFault.exe oneetx.exe 3860 3268 WerFault.exe oneetx.exe 1984 3268 WerFault.exe oneetx.exe 116 3268 WerFault.exe oneetx.exe 2008 3268 WerFault.exe oneetx.exe 1408 1916 WerFault.exe oneetx.exe 3892 1916 WerFault.exe oneetx.exe 2604 1916 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it490030.exekp740920.exe1.exepid process 1676 it490030.exe 1676 it490030.exe 4820 kp740920.exe 2524 1.exe 2524 1.exe 4820 kp740920.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it490030.exejr855741.exekp740920.exe1.exedescription pid process Token: SeDebugPrivilege 1676 it490030.exe Token: SeDebugPrivilege 3560 jr855741.exe Token: SeDebugPrivilege 4820 kp740920.exe Token: SeDebugPrivilege 2524 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr474243.exepid process 4972 lr474243.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exezipy1216.exeziTP1369.exejr855741.exelr474243.exeoneetx.exedescription pid process target process PID 3524 wrote to memory of 4336 3524 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe zipy1216.exe PID 3524 wrote to memory of 4336 3524 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe zipy1216.exe PID 3524 wrote to memory of 4336 3524 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe zipy1216.exe PID 4336 wrote to memory of 5024 4336 zipy1216.exe ziTP1369.exe PID 4336 wrote to memory of 5024 4336 zipy1216.exe ziTP1369.exe PID 4336 wrote to memory of 5024 4336 zipy1216.exe ziTP1369.exe PID 5024 wrote to memory of 1676 5024 ziTP1369.exe it490030.exe PID 5024 wrote to memory of 1676 5024 ziTP1369.exe it490030.exe PID 5024 wrote to memory of 3560 5024 ziTP1369.exe jr855741.exe PID 5024 wrote to memory of 3560 5024 ziTP1369.exe jr855741.exe PID 5024 wrote to memory of 3560 5024 ziTP1369.exe jr855741.exe PID 3560 wrote to memory of 2524 3560 jr855741.exe 1.exe PID 3560 wrote to memory of 2524 3560 jr855741.exe 1.exe PID 3560 wrote to memory of 2524 3560 jr855741.exe 1.exe PID 4336 wrote to memory of 4820 4336 zipy1216.exe kp740920.exe PID 4336 wrote to memory of 4820 4336 zipy1216.exe kp740920.exe PID 4336 wrote to memory of 4820 4336 zipy1216.exe kp740920.exe PID 3524 wrote to memory of 4972 3524 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe lr474243.exe PID 3524 wrote to memory of 4972 3524 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe lr474243.exe PID 3524 wrote to memory of 4972 3524 8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe lr474243.exe PID 4972 wrote to memory of 3268 4972 lr474243.exe oneetx.exe PID 4972 wrote to memory of 3268 4972 lr474243.exe oneetx.exe PID 4972 wrote to memory of 3268 4972 lr474243.exe oneetx.exe PID 3268 wrote to memory of 4288 3268 oneetx.exe schtasks.exe PID 3268 wrote to memory of 4288 3268 oneetx.exe schtasks.exe PID 3268 wrote to memory of 4288 3268 oneetx.exe schtasks.exe PID 3268 wrote to memory of 1616 3268 oneetx.exe rundll32.exe PID 3268 wrote to memory of 1616 3268 oneetx.exe rundll32.exe PID 3268 wrote to memory of 1616 3268 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe"C:\Users\Admin\AppData\Local\Temp\8b707c5a8caba7ebede35094eb374baf313a944909ebd7665ef45cc3c362a0b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipy1216.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipy1216.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTP1369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTP1369.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it490030.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it490030.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr855741.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr855741.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 13765⤵
- Program crash
PID:4680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp740920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp740920.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr474243.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr474243.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 7003⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 7843⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8043⤵
- Program crash
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9643⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8083⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9563⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12203⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12323⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12283⤵
- Program crash
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 6964⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 8684⤵
- Program crash
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 9164⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 10564⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 10564⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 10564⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 10884⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 9964⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 13044⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 13124⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 6884⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 11404⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 16204⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 13764⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 16284⤵
- Program crash
PID:2008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12043⤵
- Program crash
PID:1628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3560 -ip 35601⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4972 -ip 49721⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4972 -ip 49721⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4972 -ip 49721⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4972 -ip 49721⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4972 -ip 49721⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4972 -ip 49721⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4972 -ip 49721⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4972 -ip 49721⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4972 -ip 49721⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4972 -ip 49721⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3268 -ip 32681⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3268 -ip 32681⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3268 -ip 32681⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3268 -ip 32681⤵PID:1448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3268 -ip 32681⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3268 -ip 32681⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3268 -ip 32681⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3268 -ip 32681⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3268 -ip 32681⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3268 -ip 32681⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3268 -ip 32681⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 3962⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 4402⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 4402⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3540 -ip 35401⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3540 -ip 35401⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3540 -ip 35401⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3268 -ip 32681⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3268 -ip 32681⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3268 -ip 32681⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 3962⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 4642⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 4642⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3268 -ip 32681⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1916 -ip 19161⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1916 -ip 19161⤵PID:260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1916 -ip 19161⤵PID:3584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD57a52064f5e54417c1df42a0e8f6290d9
SHA18784dac98f168d2c2bbd3c4b843031fa83b8c0f2
SHA256f28dc8a13f6dcfadb6f6d4e3255d2a68f7d0e1ccc1d7bf27d01a039cf0c38457
SHA5120d6da5a59af1776d57f9ee52dba324227566e395d4c196ab1556479171028c9804502d423989218c5baed0849a9c89c21b41ac4e65ae40e9c1b680a6536a7271
-
Filesize
724KB
MD57a52064f5e54417c1df42a0e8f6290d9
SHA18784dac98f168d2c2bbd3c4b843031fa83b8c0f2
SHA256f28dc8a13f6dcfadb6f6d4e3255d2a68f7d0e1ccc1d7bf27d01a039cf0c38457
SHA5120d6da5a59af1776d57f9ee52dba324227566e395d4c196ab1556479171028c9804502d423989218c5baed0849a9c89c21b41ac4e65ae40e9c1b680a6536a7271
-
Filesize
169KB
MD557e82ff67a6f2d5d8d493be7996ca344
SHA187ed663431d960cac216b31414a3f0a35a396ec0
SHA256b647243beda5f2e9bf1c6f6f2fdfa9f0818be08812da56d5499b7e6947995042
SHA51201350c3b16afd87b0154d48a037d6d09be80bf199fe9286f0be38c5f14624e03c20d56414a7ee116fb02d052629157862eece882bbfeb5959d8f09b216b3518f
-
Filesize
169KB
MD557e82ff67a6f2d5d8d493be7996ca344
SHA187ed663431d960cac216b31414a3f0a35a396ec0
SHA256b647243beda5f2e9bf1c6f6f2fdfa9f0818be08812da56d5499b7e6947995042
SHA51201350c3b16afd87b0154d48a037d6d09be80bf199fe9286f0be38c5f14624e03c20d56414a7ee116fb02d052629157862eece882bbfeb5959d8f09b216b3518f
-
Filesize
570KB
MD504443c269eb42102da59417d9f941ea2
SHA1c0deb5d935af4f629676427722baae538119f109
SHA256a3f69ce5d7329fc0beb6eb72c29c3396e75e9fe327f4423c0f3696a36243d459
SHA512c9f87243badafb275875fd8e95615022c6d1dc024bab422fa928579206de7c5b4f5031fdf760126f89d253924c4a543d88208896f6b5900361eb53c966537ad9
-
Filesize
570KB
MD504443c269eb42102da59417d9f941ea2
SHA1c0deb5d935af4f629676427722baae538119f109
SHA256a3f69ce5d7329fc0beb6eb72c29c3396e75e9fe327f4423c0f3696a36243d459
SHA512c9f87243badafb275875fd8e95615022c6d1dc024bab422fa928579206de7c5b4f5031fdf760126f89d253924c4a543d88208896f6b5900361eb53c966537ad9
-
Filesize
11KB
MD5b42bc94c173371cb29363bcec84ea891
SHA11186105182733ed6be1d1821c87c35dcf5630492
SHA256222e0e2c88d76ef51ace6ca8599eaefe080a3bcb0ed98281ca945df41eca6f97
SHA51247595970fb4e93b6212fcde0fba7e5e0d1a4d70c54b52e5985e4e29da375f9857e198a463b79e0d914d487d6c59b8be5f2897f938859778f8789ea5a044022f6
-
Filesize
11KB
MD5b42bc94c173371cb29363bcec84ea891
SHA11186105182733ed6be1d1821c87c35dcf5630492
SHA256222e0e2c88d76ef51ace6ca8599eaefe080a3bcb0ed98281ca945df41eca6f97
SHA51247595970fb4e93b6212fcde0fba7e5e0d1a4d70c54b52e5985e4e29da375f9857e198a463b79e0d914d487d6c59b8be5f2897f938859778f8789ea5a044022f6
-
Filesize
588KB
MD57909423f0eb53d0f0ea1d979523b636b
SHA1d668221c95484be630d1cbbce9a0b8bca52e89ae
SHA256d15e2eeb531ba97c22845c4227c423a19e8fbad73e47ebc9b8e0a13844db9d5b
SHA51208234a91dc24dd9185493391b7a30b6bc30d407f9d493838004e60abc0664be10b112d1f7e57623dafc74db56296a4c3d629359d230691ffae4e65f9592e521f
-
Filesize
588KB
MD57909423f0eb53d0f0ea1d979523b636b
SHA1d668221c95484be630d1cbbce9a0b8bca52e89ae
SHA256d15e2eeb531ba97c22845c4227c423a19e8fbad73e47ebc9b8e0a13844db9d5b
SHA51208234a91dc24dd9185493391b7a30b6bc30d407f9d493838004e60abc0664be10b112d1f7e57623dafc74db56296a4c3d629359d230691ffae4e65f9592e521f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1