Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 03:51
Static task
static1
General
-
Target
bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe
-
Size
1.0MB
-
MD5
84570145c5030168d26ccde630ddf320
-
SHA1
27f1e61477b04794c60fab4f329132b46d83a53f
-
SHA256
bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758
-
SHA512
6264bbce2d66e4e83477072b406c50a3d5aa5aa1dcf037e470f5d87cf8b0a055b72a0d627ab9b1d9b18aafd11db0ffeae620a57675f184f5fa8f62f07912b823
-
SSDEEP
24576:3y7qPmjeHHtOxaAB1iBPzK0VVwccpOXn9tUq6YR:ChjetOFY20Vrcpkn9tUy
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it672459.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it672459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it672459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it672459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it672459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it672459.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it672459.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr995539.exelr802193.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr995539.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr802193.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziBU4644.exezidj1763.exeit672459.exejr995539.exe1.exekp650889.exelr802193.exeoneetx.exeoneetx.exeoneetx.exepid process 4872 ziBU4644.exe 2636 zidj1763.exe 3744 it672459.exe 2836 jr995539.exe 3080 1.exe 1696 kp650889.exe 1828 lr802193.exe 4912 oneetx.exe 3444 oneetx.exe 3088 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1964 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it672459.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it672459.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exeziBU4644.exezidj1763.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziBU4644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBU4644.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidj1763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidj1763.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2512 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4784 2836 WerFault.exe jr995539.exe 2168 1828 WerFault.exe lr802193.exe 3996 1828 WerFault.exe lr802193.exe 5116 1828 WerFault.exe lr802193.exe 2088 1828 WerFault.exe lr802193.exe 812 1828 WerFault.exe lr802193.exe 3716 1828 WerFault.exe lr802193.exe 1604 1828 WerFault.exe lr802193.exe 1484 1828 WerFault.exe lr802193.exe 5084 1828 WerFault.exe lr802193.exe 3176 1828 WerFault.exe lr802193.exe 4208 1828 WerFault.exe lr802193.exe 1192 4912 WerFault.exe oneetx.exe 4072 4912 WerFault.exe oneetx.exe 3632 4912 WerFault.exe oneetx.exe 1620 4912 WerFault.exe oneetx.exe 3284 4912 WerFault.exe oneetx.exe 4860 4912 WerFault.exe oneetx.exe 1212 4912 WerFault.exe oneetx.exe 1368 4912 WerFault.exe oneetx.exe 420 4912 WerFault.exe oneetx.exe 1556 4912 WerFault.exe oneetx.exe 4728 4912 WerFault.exe oneetx.exe 1792 4912 WerFault.exe oneetx.exe 4140 3444 WerFault.exe oneetx.exe 4520 3444 WerFault.exe oneetx.exe 376 3444 WerFault.exe oneetx.exe 4316 4912 WerFault.exe oneetx.exe 3388 4912 WerFault.exe oneetx.exe 2076 4912 WerFault.exe oneetx.exe 1912 3088 WerFault.exe oneetx.exe 4716 3088 WerFault.exe oneetx.exe 4112 3088 WerFault.exe oneetx.exe 3992 4912 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it672459.exekp650889.exe1.exepid process 3744 it672459.exe 3744 it672459.exe 1696 kp650889.exe 3080 1.exe 3080 1.exe 1696 kp650889.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it672459.exejr995539.exekp650889.exe1.exedescription pid process Token: SeDebugPrivilege 3744 it672459.exe Token: SeDebugPrivilege 2836 jr995539.exe Token: SeDebugPrivilege 1696 kp650889.exe Token: SeDebugPrivilege 3080 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr802193.exepid process 1828 lr802193.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exeziBU4644.exezidj1763.exejr995539.exelr802193.exeoneetx.exedescription pid process target process PID 3304 wrote to memory of 4872 3304 bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe ziBU4644.exe PID 3304 wrote to memory of 4872 3304 bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe ziBU4644.exe PID 3304 wrote to memory of 4872 3304 bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe ziBU4644.exe PID 4872 wrote to memory of 2636 4872 ziBU4644.exe zidj1763.exe PID 4872 wrote to memory of 2636 4872 ziBU4644.exe zidj1763.exe PID 4872 wrote to memory of 2636 4872 ziBU4644.exe zidj1763.exe PID 2636 wrote to memory of 3744 2636 zidj1763.exe it672459.exe PID 2636 wrote to memory of 3744 2636 zidj1763.exe it672459.exe PID 2636 wrote to memory of 2836 2636 zidj1763.exe jr995539.exe PID 2636 wrote to memory of 2836 2636 zidj1763.exe jr995539.exe PID 2636 wrote to memory of 2836 2636 zidj1763.exe jr995539.exe PID 2836 wrote to memory of 3080 2836 jr995539.exe 1.exe PID 2836 wrote to memory of 3080 2836 jr995539.exe 1.exe PID 2836 wrote to memory of 3080 2836 jr995539.exe 1.exe PID 4872 wrote to memory of 1696 4872 ziBU4644.exe kp650889.exe PID 4872 wrote to memory of 1696 4872 ziBU4644.exe kp650889.exe PID 4872 wrote to memory of 1696 4872 ziBU4644.exe kp650889.exe PID 3304 wrote to memory of 1828 3304 bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe lr802193.exe PID 3304 wrote to memory of 1828 3304 bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe lr802193.exe PID 3304 wrote to memory of 1828 3304 bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe lr802193.exe PID 1828 wrote to memory of 4912 1828 lr802193.exe oneetx.exe PID 1828 wrote to memory of 4912 1828 lr802193.exe oneetx.exe PID 1828 wrote to memory of 4912 1828 lr802193.exe oneetx.exe PID 4912 wrote to memory of 4048 4912 oneetx.exe schtasks.exe PID 4912 wrote to memory of 4048 4912 oneetx.exe schtasks.exe PID 4912 wrote to memory of 4048 4912 oneetx.exe schtasks.exe PID 4912 wrote to memory of 1964 4912 oneetx.exe rundll32.exe PID 4912 wrote to memory of 1964 4912 oneetx.exe rundll32.exe PID 4912 wrote to memory of 1964 4912 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe"C:\Users\Admin\AppData\Local\Temp\bb0088c42759b2214e1becdbfe21d738d21ea167772aca8a8faffd12d54a3758.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBU4644.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBU4644.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidj1763.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidj1763.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it672459.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it672459.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr995539.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr995539.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 12165⤵
- Program crash
PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp650889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp650889.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr802193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr802193.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 7003⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 7843⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 8603⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 9763⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 9963⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 9763⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 12523⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 12603⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 13643⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 13043⤵
- Program crash
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 6964⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8684⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8804⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 8764⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 11004⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 11004⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 11244⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 10284⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7484⤵
- Program crash
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7604⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 7324⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 15364⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 11204⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 16284⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 15964⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 16444⤵
- Program crash
PID:3992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 14363⤵
- Program crash
PID:4208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2836 -ip 28361⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1828 -ip 18281⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1828 -ip 18281⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1828 -ip 18281⤵PID:3756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1828 -ip 18281⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1828 -ip 18281⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1828 -ip 18281⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1828 -ip 18281⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1828 -ip 18281⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1828 -ip 18281⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1828 -ip 18281⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1828 -ip 18281⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4912 -ip 49121⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4912 -ip 49121⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4912 -ip 49121⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4912 -ip 49121⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4912 -ip 49121⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4912 -ip 49121⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4912 -ip 49121⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4912 -ip 49121⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4912 -ip 49121⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4912 -ip 49121⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4912 -ip 49121⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4912 -ip 49121⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 3962⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 4402⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 4402⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3444 -ip 34441⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3444 -ip 34441⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3444 -ip 34441⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4912 -ip 49121⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4912 -ip 49121⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4912 -ip 49121⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 3962⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 4402⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 4602⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3088 -ip 30881⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3088 -ip 30881⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3088 -ip 30881⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4912 -ip 49121⤵PID:2144
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD59378c96dc0dd99603eb132899ed1df80
SHA1a089e60ddb772d7e2b8bdffc60d3aab4136d27f0
SHA2563ba8b793382be4d93978f4c2da9df5fb1492f1e52258cfc9d5dbf6516dea46fc
SHA5120dd05bb7e62527a15e0a99fcb5051f14664f9e1ebbff68f4e6c780e4a52e92cbe73391a5f009e2df5ad71210005623ea548ee2cdd02f009fe4a1f25013dc4987
-
Filesize
724KB
MD59378c96dc0dd99603eb132899ed1df80
SHA1a089e60ddb772d7e2b8bdffc60d3aab4136d27f0
SHA2563ba8b793382be4d93978f4c2da9df5fb1492f1e52258cfc9d5dbf6516dea46fc
SHA5120dd05bb7e62527a15e0a99fcb5051f14664f9e1ebbff68f4e6c780e4a52e92cbe73391a5f009e2df5ad71210005623ea548ee2cdd02f009fe4a1f25013dc4987
-
Filesize
169KB
MD53dcd5524f61fb485755a4e3303dfdab6
SHA12304e07396ee6455f5b667d1c4e2a360952a2856
SHA2566919c903cc4a5bf2d0e6764bfa06c7f4559ba4c15308a6c06d09ad10d5667422
SHA5129ef277a8b9e2f183c58a29ee891af281907af14ba28c4ef2582634d43d529bdeaf899259600f09b9d1ea1099e1d32e48ee43f484dbd9a041c6df717512a62140
-
Filesize
169KB
MD53dcd5524f61fb485755a4e3303dfdab6
SHA12304e07396ee6455f5b667d1c4e2a360952a2856
SHA2566919c903cc4a5bf2d0e6764bfa06c7f4559ba4c15308a6c06d09ad10d5667422
SHA5129ef277a8b9e2f183c58a29ee891af281907af14ba28c4ef2582634d43d529bdeaf899259600f09b9d1ea1099e1d32e48ee43f484dbd9a041c6df717512a62140
-
Filesize
570KB
MD57d47572fbfe5e3f655c471d8ed4c005f
SHA19d1983921fee0998343653b72e4b3d032f84e1c2
SHA256ba7b8d7896fcb726591f51282ed4fbc8b28dc9e8b537ee4e937cbf2dd22f330e
SHA51230bd8fa1fb56336fd42cb64c4ecd651880254538101586d850a6b9248f43f2e55dbee5c2f1567575d8262d019b5fff6a16eefc66e00fd2f0420edef27c45de80
-
Filesize
570KB
MD57d47572fbfe5e3f655c471d8ed4c005f
SHA19d1983921fee0998343653b72e4b3d032f84e1c2
SHA256ba7b8d7896fcb726591f51282ed4fbc8b28dc9e8b537ee4e937cbf2dd22f330e
SHA51230bd8fa1fb56336fd42cb64c4ecd651880254538101586d850a6b9248f43f2e55dbee5c2f1567575d8262d019b5fff6a16eefc66e00fd2f0420edef27c45de80
-
Filesize
11KB
MD5427da5372c4d9a7d4fc26bd85c2989e9
SHA1ae78443312602f2d152b527d6c3c71acec5586aa
SHA2563635001eb4ed7fbcde5773f44fa67e4162e86718876ea4dc0dd4c40ba3aee60a
SHA5128c09176f83d343df12b326b66fb3ccbdda73cddb342a142fa7eb1520541bf0187d5819ab3a83ccbc3c998883c443b38fc5f222b7ad618ec1bfee7942261e6199
-
Filesize
11KB
MD5427da5372c4d9a7d4fc26bd85c2989e9
SHA1ae78443312602f2d152b527d6c3c71acec5586aa
SHA2563635001eb4ed7fbcde5773f44fa67e4162e86718876ea4dc0dd4c40ba3aee60a
SHA5128c09176f83d343df12b326b66fb3ccbdda73cddb342a142fa7eb1520541bf0187d5819ab3a83ccbc3c998883c443b38fc5f222b7ad618ec1bfee7942261e6199
-
Filesize
588KB
MD557a5e48cb0412c0c79272c2f45c31b14
SHA13e407e11e97dd7832c0252d692d2931d78a2ce31
SHA2562e3e43284dea5ac36177c53ec54dafaca1250aadaaa12b95209e3f85e85a10f8
SHA512c0e3e44e8931d4c1971349c33bc905c4f90b48daf05a6c104f440bdf61fcd07851e542f2f0c6fabdd70a5926ac681647f091b89b66e3bb4028b8d05b45c44eea
-
Filesize
588KB
MD557a5e48cb0412c0c79272c2f45c31b14
SHA13e407e11e97dd7832c0252d692d2931d78a2ce31
SHA2562e3e43284dea5ac36177c53ec54dafaca1250aadaaa12b95209e3f85e85a10f8
SHA512c0e3e44e8931d4c1971349c33bc905c4f90b48daf05a6c104f440bdf61fcd07851e542f2f0c6fabdd70a5926ac681647f091b89b66e3bb4028b8d05b45c44eea
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1