Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:00
Static task
static1
General
-
Target
3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe
-
Size
1.0MB
-
MD5
047f8f99a2f27619d8b9931d33d3da1f
-
SHA1
b96ed92e66a6402a19a0e18dfc5a0aa9ec4486fe
-
SHA256
3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f
-
SHA512
11240ccbf590d298407a89980de02cc88d687e4ede9d21fa12c80e8f61429573e778d8decace88a7b9c7fc50322150e1043c3e6bde7099f9e7c4bd35bf57b5e7
-
SSDEEP
24576:4yp1yW5jHUOmjvA1Fw9xiVbAjYJSVVba3x/10nNdvWTJ:/9QOr1FaMJSVVox/1WvA
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it824409.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it824409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it824409.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it824409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it824409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it824409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it824409.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exejr310685.exelr578471.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr310685.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr578471.exe -
Executes dropped EXE 9 IoCs
Processes:
ziJK1662.exeziJZ8467.exeit824409.exejr310685.exe1.exekp602300.exelr578471.exeoneetx.exeoneetx.exepid process 2148 ziJK1662.exe 4300 ziJZ8467.exe 4636 it824409.exe 956 jr310685.exe 2308 1.exe 2520 kp602300.exe 2220 lr578471.exe 3948 oneetx.exe 4228 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2096 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it824409.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it824409.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exeziJK1662.exeziJZ8467.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJK1662.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJK1662.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJZ8467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziJZ8467.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2856 956 WerFault.exe jr310685.exe 1544 2220 WerFault.exe lr578471.exe 1036 2220 WerFault.exe lr578471.exe 2100 2220 WerFault.exe lr578471.exe 3140 2220 WerFault.exe lr578471.exe 4612 2220 WerFault.exe lr578471.exe 4036 2220 WerFault.exe lr578471.exe 4552 2220 WerFault.exe lr578471.exe 4480 2220 WerFault.exe lr578471.exe 5108 2220 WerFault.exe lr578471.exe 3272 2220 WerFault.exe lr578471.exe 1264 2220 WerFault.exe lr578471.exe 4952 3948 WerFault.exe oneetx.exe 800 3948 WerFault.exe oneetx.exe 4680 3948 WerFault.exe oneetx.exe 2516 3948 WerFault.exe oneetx.exe 1524 3948 WerFault.exe oneetx.exe 2868 3948 WerFault.exe oneetx.exe 1764 3948 WerFault.exe oneetx.exe 4032 3948 WerFault.exe oneetx.exe 4996 3948 WerFault.exe oneetx.exe 4300 3948 WerFault.exe oneetx.exe 4252 3948 WerFault.exe oneetx.exe 100 3948 WerFault.exe oneetx.exe 2724 3948 WerFault.exe oneetx.exe 3744 3948 WerFault.exe oneetx.exe 4476 4228 WerFault.exe oneetx.exe 4852 4228 WerFault.exe oneetx.exe 2076 4228 WerFault.exe oneetx.exe 2528 3948 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it824409.exe1.exekp602300.exepid process 4636 it824409.exe 4636 it824409.exe 2308 1.exe 2308 1.exe 2520 kp602300.exe 2520 kp602300.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it824409.exejr310685.exe1.exekp602300.exedescription pid process Token: SeDebugPrivilege 4636 it824409.exe Token: SeDebugPrivilege 956 jr310685.exe Token: SeDebugPrivilege 2308 1.exe Token: SeDebugPrivilege 2520 kp602300.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr578471.exepid process 2220 lr578471.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exeziJK1662.exeziJZ8467.exejr310685.exelr578471.exeoneetx.exedescription pid process target process PID 2704 wrote to memory of 2148 2704 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe ziJK1662.exe PID 2704 wrote to memory of 2148 2704 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe ziJK1662.exe PID 2704 wrote to memory of 2148 2704 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe ziJK1662.exe PID 2148 wrote to memory of 4300 2148 ziJK1662.exe ziJZ8467.exe PID 2148 wrote to memory of 4300 2148 ziJK1662.exe ziJZ8467.exe PID 2148 wrote to memory of 4300 2148 ziJK1662.exe ziJZ8467.exe PID 4300 wrote to memory of 4636 4300 ziJZ8467.exe it824409.exe PID 4300 wrote to memory of 4636 4300 ziJZ8467.exe it824409.exe PID 4300 wrote to memory of 956 4300 ziJZ8467.exe jr310685.exe PID 4300 wrote to memory of 956 4300 ziJZ8467.exe jr310685.exe PID 4300 wrote to memory of 956 4300 ziJZ8467.exe jr310685.exe PID 956 wrote to memory of 2308 956 jr310685.exe 1.exe PID 956 wrote to memory of 2308 956 jr310685.exe 1.exe PID 956 wrote to memory of 2308 956 jr310685.exe 1.exe PID 2148 wrote to memory of 2520 2148 ziJK1662.exe kp602300.exe PID 2148 wrote to memory of 2520 2148 ziJK1662.exe kp602300.exe PID 2148 wrote to memory of 2520 2148 ziJK1662.exe kp602300.exe PID 2704 wrote to memory of 2220 2704 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe lr578471.exe PID 2704 wrote to memory of 2220 2704 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe lr578471.exe PID 2704 wrote to memory of 2220 2704 3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe lr578471.exe PID 2220 wrote to memory of 3948 2220 lr578471.exe oneetx.exe PID 2220 wrote to memory of 3948 2220 lr578471.exe oneetx.exe PID 2220 wrote to memory of 3948 2220 lr578471.exe oneetx.exe PID 3948 wrote to memory of 4356 3948 oneetx.exe schtasks.exe PID 3948 wrote to memory of 4356 3948 oneetx.exe schtasks.exe PID 3948 wrote to memory of 4356 3948 oneetx.exe schtasks.exe PID 3948 wrote to memory of 2096 3948 oneetx.exe rundll32.exe PID 3948 wrote to memory of 2096 3948 oneetx.exe rundll32.exe PID 3948 wrote to memory of 2096 3948 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe"C:\Users\Admin\AppData\Local\Temp\3a32c23043f95bc6d60fd9a72289eaf6355210830c7f051026ebad159aa65f2f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJK1662.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJK1662.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJZ8467.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziJZ8467.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it824409.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it824409.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr310685.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr310685.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 13805⤵
- Program crash
PID:2856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp602300.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp602300.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr578471.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr578471.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 7003⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 7683⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 8643⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 8723⤵
- Program crash
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9723⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9723⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 12203⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 12203⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 12203⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 13683⤵
- Program crash
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 6964⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 8884⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 9644⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 10564⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 10764⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 10764⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 11124⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 9444⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 7804⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 6964⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 12884⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 11244⤵
- Program crash
PID:100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 16204⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 15924⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 16284⤵
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 12203⤵
- Program crash
PID:1264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 956 -ip 9561⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2220 -ip 22201⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2220 -ip 22201⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2220 -ip 22201⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2220 -ip 22201⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2220 -ip 22201⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2220 -ip 22201⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2220 -ip 22201⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2220 -ip 22201⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2220 -ip 22201⤵PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2220 -ip 22201⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2220 -ip 22201⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3948 -ip 39481⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3948 -ip 39481⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3948 -ip 39481⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3948 -ip 39481⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3948 -ip 39481⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3948 -ip 39481⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3948 -ip 39481⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3948 -ip 39481⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3948 -ip 39481⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3948 -ip 39481⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3948 -ip 39481⤵PID:1360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3948 -ip 39481⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3948 -ip 39481⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3948 -ip 39481⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 3962⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 4402⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 4402⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4228 -ip 42281⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4228 -ip 42281⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4228 -ip 42281⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3948 -ip 39481⤵PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD5381a9d2937be258e61dbe6122dfb1a24
SHA1704cdb2b3fcdedbca0e5360b56240401b315623d
SHA256a05618e302a594c7cc29569f3fa57e333403a902d4292b7dde8b9a2b091c416d
SHA512f1e815bfe560dd97a30a3b47da1174690a1a07c6629ccc8a18512f84c0a9780f0131b9949c73a4229da0852fa849ea8733b0e4041aaf6359794fed9c61fa5f5c
-
Filesize
723KB
MD5381a9d2937be258e61dbe6122dfb1a24
SHA1704cdb2b3fcdedbca0e5360b56240401b315623d
SHA256a05618e302a594c7cc29569f3fa57e333403a902d4292b7dde8b9a2b091c416d
SHA512f1e815bfe560dd97a30a3b47da1174690a1a07c6629ccc8a18512f84c0a9780f0131b9949c73a4229da0852fa849ea8733b0e4041aaf6359794fed9c61fa5f5c
-
Filesize
169KB
MD566c01439a6fd640485d9d8e6759350e8
SHA1083a1826004b0c5d61f2cd314056aabaa8923dca
SHA256e319602c036e50a85be531989ce2b51e35c70edb7649f848d931605d258544bc
SHA51285a710ec23764b5a5000a5c858b60330c807a85bdbae77762381316df62b067e2eca0024039bdd826538642cbd889071a4e28707382180870a871584a288c7c4
-
Filesize
169KB
MD566c01439a6fd640485d9d8e6759350e8
SHA1083a1826004b0c5d61f2cd314056aabaa8923dca
SHA256e319602c036e50a85be531989ce2b51e35c70edb7649f848d931605d258544bc
SHA51285a710ec23764b5a5000a5c858b60330c807a85bdbae77762381316df62b067e2eca0024039bdd826538642cbd889071a4e28707382180870a871584a288c7c4
-
Filesize
569KB
MD51f0f6fa22f644fd699d182e7d962a3dc
SHA19976a3bf1a0fae32066fe7aeea7ad0836a9bceae
SHA256c5dbf670a6597b111e4f3cbbbc352417b38d17948c9a2e7018da348f95c1ea14
SHA512a882e66190e4bd7fff4abe2907b438095e87ee8890d04b56767f084014b92d6b3e2747ee5e5cc1d052b662f3ef3e0d9fa4f9f0c485448319fe7d8217aa0037dc
-
Filesize
569KB
MD51f0f6fa22f644fd699d182e7d962a3dc
SHA19976a3bf1a0fae32066fe7aeea7ad0836a9bceae
SHA256c5dbf670a6597b111e4f3cbbbc352417b38d17948c9a2e7018da348f95c1ea14
SHA512a882e66190e4bd7fff4abe2907b438095e87ee8890d04b56767f084014b92d6b3e2747ee5e5cc1d052b662f3ef3e0d9fa4f9f0c485448319fe7d8217aa0037dc
-
Filesize
11KB
MD5a0cff24507bf6692e366c49ebe643a11
SHA1b6e80d9a751eec1fe17bb507bab53af8caa04724
SHA256a5be9dfe0a76e82d6b2272339f597e2a102fa113877da424382ab3a07b2eaee5
SHA5129d87fd0befd510cb5922091e230e32016eb123174a31bfe1a5128ba92bdc0e5bdccb24290b4946e09a5738dfdd47d62b9a1603ef88b10d1da9b73768caac48a9
-
Filesize
11KB
MD5a0cff24507bf6692e366c49ebe643a11
SHA1b6e80d9a751eec1fe17bb507bab53af8caa04724
SHA256a5be9dfe0a76e82d6b2272339f597e2a102fa113877da424382ab3a07b2eaee5
SHA5129d87fd0befd510cb5922091e230e32016eb123174a31bfe1a5128ba92bdc0e5bdccb24290b4946e09a5738dfdd47d62b9a1603ef88b10d1da9b73768caac48a9
-
Filesize
588KB
MD5f85fd13e1142f25972cd471585b34f74
SHA14d3aeb5f571973e9da05257ec3d161d190c9003a
SHA2567c89c74cb024b1485e6a27ee03f4a04a660ce18d67ae3f3fc36fa385119d57cd
SHA512283636537bb47b0961d7ee3d6261872bf93961e3cbd1213d66d56062d6197d1a60c79faf7212b2a2a0cc5488e9305c2a8390f6bcdb18d6c234c0d7635d136a69
-
Filesize
588KB
MD5f85fd13e1142f25972cd471585b34f74
SHA14d3aeb5f571973e9da05257ec3d161d190c9003a
SHA2567c89c74cb024b1485e6a27ee03f4a04a660ce18d67ae3f3fc36fa385119d57cd
SHA512283636537bb47b0961d7ee3d6261872bf93961e3cbd1213d66d56062d6197d1a60c79faf7212b2a2a0cc5488e9305c2a8390f6bcdb18d6c234c0d7635d136a69
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1