Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:01
Static task
static1
General
-
Target
97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe
-
Size
1.2MB
-
MD5
7a506cd02fa4f8483409de2ee64d038d
-
SHA1
268f1828021a6e7f6dff7bcf4753f9993d1a924c
-
SHA256
97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28
-
SHA512
331107d045b59dc8c7814212c25b157e61840df2a3b9bdc5e8f30b2ee1ff5e11a48c44a49e06d78b4c20ebf4085d5b2250155ca2c7bc0e2a59a53df080d4851f
-
SSDEEP
24576:wyolMQ26PausL6BIAWDzwKL1fR5YLe0eFSZJCPFQCmE3Dfinm5mrv3:3olRiuY6BKwEiZeFSfIFJWnmwrv
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr324504.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr324504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr324504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr324504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr324504.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr324504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr324504.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu261327.exesi079477.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu261327.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si079477.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un543330.exeun298249.exepr324504.exequ261327.exe1.exerk284387.exesi079477.exeoneetx.exeoneetx.exeoneetx.exepid process 752 un543330.exe 3160 un298249.exe 4300 pr324504.exe 5032 qu261327.exe 4796 1.exe 2444 rk284387.exe 2140 si079477.exe 3632 oneetx.exe 3372 oneetx.exe 1388 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4668 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr324504.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr324504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr324504.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exeun543330.exeun298249.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un543330.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un543330.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un298249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un298249.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4604 4300 WerFault.exe pr324504.exe 3668 5032 WerFault.exe qu261327.exe 3952 2140 WerFault.exe si079477.exe 2200 2140 WerFault.exe si079477.exe 4348 2140 WerFault.exe si079477.exe 4608 2140 WerFault.exe si079477.exe 4752 2140 WerFault.exe si079477.exe 3348 2140 WerFault.exe si079477.exe 1244 2140 WerFault.exe si079477.exe 2616 2140 WerFault.exe si079477.exe 2600 2140 WerFault.exe si079477.exe 1388 2140 WerFault.exe si079477.exe 1376 3632 WerFault.exe oneetx.exe 4868 3632 WerFault.exe oneetx.exe 4912 3632 WerFault.exe oneetx.exe 3972 3632 WerFault.exe oneetx.exe 4132 3632 WerFault.exe oneetx.exe 2824 3632 WerFault.exe oneetx.exe 64 3632 WerFault.exe oneetx.exe 3160 3632 WerFault.exe oneetx.exe 904 3632 WerFault.exe oneetx.exe 2832 3632 WerFault.exe oneetx.exe 2392 3632 WerFault.exe oneetx.exe 4764 3632 WerFault.exe oneetx.exe 3368 3372 WerFault.exe oneetx.exe 4340 3372 WerFault.exe oneetx.exe 3356 3372 WerFault.exe oneetx.exe 3360 3632 WerFault.exe oneetx.exe 1848 3632 WerFault.exe oneetx.exe 5068 3632 WerFault.exe oneetx.exe 4972 1388 WerFault.exe oneetx.exe 1500 1388 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr324504.exe1.exerk284387.exepid process 4300 pr324504.exe 4300 pr324504.exe 4796 1.exe 2444 rk284387.exe 4796 1.exe 2444 rk284387.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr324504.exequ261327.exe1.exerk284387.exedescription pid process Token: SeDebugPrivilege 4300 pr324504.exe Token: SeDebugPrivilege 5032 qu261327.exe Token: SeDebugPrivilege 4796 1.exe Token: SeDebugPrivilege 2444 rk284387.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si079477.exepid process 2140 si079477.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exeun543330.exeun298249.exequ261327.exesi079477.exeoneetx.exedescription pid process target process PID 3340 wrote to memory of 752 3340 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe un543330.exe PID 3340 wrote to memory of 752 3340 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe un543330.exe PID 3340 wrote to memory of 752 3340 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe un543330.exe PID 752 wrote to memory of 3160 752 un543330.exe un298249.exe PID 752 wrote to memory of 3160 752 un543330.exe un298249.exe PID 752 wrote to memory of 3160 752 un543330.exe un298249.exe PID 3160 wrote to memory of 4300 3160 un298249.exe pr324504.exe PID 3160 wrote to memory of 4300 3160 un298249.exe pr324504.exe PID 3160 wrote to memory of 4300 3160 un298249.exe pr324504.exe PID 3160 wrote to memory of 5032 3160 un298249.exe qu261327.exe PID 3160 wrote to memory of 5032 3160 un298249.exe qu261327.exe PID 3160 wrote to memory of 5032 3160 un298249.exe qu261327.exe PID 5032 wrote to memory of 4796 5032 qu261327.exe 1.exe PID 5032 wrote to memory of 4796 5032 qu261327.exe 1.exe PID 5032 wrote to memory of 4796 5032 qu261327.exe 1.exe PID 752 wrote to memory of 2444 752 un543330.exe rk284387.exe PID 752 wrote to memory of 2444 752 un543330.exe rk284387.exe PID 752 wrote to memory of 2444 752 un543330.exe rk284387.exe PID 3340 wrote to memory of 2140 3340 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe si079477.exe PID 3340 wrote to memory of 2140 3340 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe si079477.exe PID 3340 wrote to memory of 2140 3340 97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe si079477.exe PID 2140 wrote to memory of 3632 2140 si079477.exe oneetx.exe PID 2140 wrote to memory of 3632 2140 si079477.exe oneetx.exe PID 2140 wrote to memory of 3632 2140 si079477.exe oneetx.exe PID 3632 wrote to memory of 4776 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 4776 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 4776 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 4668 3632 oneetx.exe rundll32.exe PID 3632 wrote to memory of 4668 3632 oneetx.exe rundll32.exe PID 3632 wrote to memory of 4668 3632 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe"C:\Users\Admin\AppData\Local\Temp\97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un543330.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un543330.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un298249.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un298249.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr324504.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr324504.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 10845⤵
- Program crash
PID:4604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu261327.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu261327.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 12085⤵
- Program crash
PID:3668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk284387.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk284387.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079477.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 7003⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 7763⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 8163⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 9843⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 9683⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 9683⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 12163⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 12443⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 13203⤵
- Program crash
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 6964⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9364⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9324⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10804⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11004⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10804⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11204⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10164⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7724⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10164⤵
- Program crash
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7804⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11524⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 16244⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11004⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 16444⤵
- Program crash
PID:5068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 8683⤵
- Program crash
PID:1388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4300 -ip 43001⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5032 -ip 50321⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 2140 -ip 21401⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 2140 -ip 21401⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2140 -ip 21401⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2140 -ip 21401⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2140 -ip 21401⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2140 -ip 21401⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2140 -ip 21401⤵PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2140 -ip 21401⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2140 -ip 21401⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2140 -ip 21401⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3632 -ip 36321⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3632 -ip 36321⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3632 -ip 36321⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3632 -ip 36321⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3632 -ip 36321⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3632 -ip 36321⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3632 -ip 36321⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3632 -ip 36321⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3632 -ip 36321⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3632 -ip 36321⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3632 -ip 36321⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3632 -ip 36321⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 3962⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 4402⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 4722⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3372 -ip 33721⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3372 -ip 33721⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3372 -ip 33721⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3632 -ip 36321⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3632 -ip 36321⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3632 -ip 36321⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 3962⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 4402⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1388 -ip 13881⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1388 -ip 13881⤵PID:1256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
863KB
MD5a17f1ce776d96ffeab7a781f5f6b12de
SHA12f711ea3ea9eec0b73e9af474b0183e1f5c02fd6
SHA25684fa87caa9413c70a475683560eeb915793883c042da459fd7387e4338592168
SHA5124531443d10efa16641dbf743bc937b69378d2840f72ee07874627eab29f11242324d6f02f90ea6286000dd3fdb8ef224bdbd2042a2718d4e0fc9cee91967af2e
-
Filesize
863KB
MD5a17f1ce776d96ffeab7a781f5f6b12de
SHA12f711ea3ea9eec0b73e9af474b0183e1f5c02fd6
SHA25684fa87caa9413c70a475683560eeb915793883c042da459fd7387e4338592168
SHA5124531443d10efa16641dbf743bc937b69378d2840f72ee07874627eab29f11242324d6f02f90ea6286000dd3fdb8ef224bdbd2042a2718d4e0fc9cee91967af2e
-
Filesize
169KB
MD5090f4a16df976b031a595d130659457f
SHA1ad86b01d8c42974265b264ce90baaa44be2df216
SHA256bf794247301067cc541d096488a23e7b3b29311391c25f10b7f619842307ba4f
SHA5125789305ac69812232d825c1ef586eed25bbec46e23941c2468dfad721036e049a453c572a0b163719d4393667de66e7005f8061568f026d1da4d57a734476ed5
-
Filesize
169KB
MD5090f4a16df976b031a595d130659457f
SHA1ad86b01d8c42974265b264ce90baaa44be2df216
SHA256bf794247301067cc541d096488a23e7b3b29311391c25f10b7f619842307ba4f
SHA5125789305ac69812232d825c1ef586eed25bbec46e23941c2468dfad721036e049a453c572a0b163719d4393667de66e7005f8061568f026d1da4d57a734476ed5
-
Filesize
708KB
MD5bc62299f8d1967a67937ad5f6f8e8d40
SHA1deacaa7beddfc49917ba19e0a2221ce4f20bfd0b
SHA25668ff737716c445b6cec2f2c7caf9db5fb1966432b132babb7db093b849117a91
SHA512da0fd38566100e05f08416ca9222be259eafa65d25e1637e555888b4399b28312e35f797764388299438efc839e741e9074fdf98b0a73af39819f2baa71e0558
-
Filesize
708KB
MD5bc62299f8d1967a67937ad5f6f8e8d40
SHA1deacaa7beddfc49917ba19e0a2221ce4f20bfd0b
SHA25668ff737716c445b6cec2f2c7caf9db5fb1966432b132babb7db093b849117a91
SHA512da0fd38566100e05f08416ca9222be259eafa65d25e1637e555888b4399b28312e35f797764388299438efc839e741e9074fdf98b0a73af39819f2baa71e0558
-
Filesize
405KB
MD55d4054e9af3b62e374e379b706392f6e
SHA15b0fb7404d48cdfa66ca2d189f96e322e0bf7a5c
SHA256b25e44113a823d19a644b48c52f839f3a22a26e92a78739bb02a8bf2661bf6e7
SHA512a755334529b4ff4b8c129914025c500a3729a568c24ecd771e1ce7500cbd800b3157e785e932b9e96a096db0817e1b499b108ef376e91b33619b198aab6192a5
-
Filesize
405KB
MD55d4054e9af3b62e374e379b706392f6e
SHA15b0fb7404d48cdfa66ca2d189f96e322e0bf7a5c
SHA256b25e44113a823d19a644b48c52f839f3a22a26e92a78739bb02a8bf2661bf6e7
SHA512a755334529b4ff4b8c129914025c500a3729a568c24ecd771e1ce7500cbd800b3157e785e932b9e96a096db0817e1b499b108ef376e91b33619b198aab6192a5
-
Filesize
588KB
MD59c74bb9435a3f29e568be34afac45ac6
SHA10186f33a5817b1622356bd86bb9c6c265dcf97d5
SHA2567a56df55090fe4178eebabcd81b992ceead503f1c10c92ccf344f0016bbc7216
SHA5125140186aa4a685efad88565b19debd5393c3a47d886d225021f85a158c48ee7615b7ab143b4b468dbbadf4cd9c106c9540d2c5b642db7ded71da76ea167a81fd
-
Filesize
588KB
MD59c74bb9435a3f29e568be34afac45ac6
SHA10186f33a5817b1622356bd86bb9c6c265dcf97d5
SHA2567a56df55090fe4178eebabcd81b992ceead503f1c10c92ccf344f0016bbc7216
SHA5125140186aa4a685efad88565b19debd5393c3a47d886d225021f85a158c48ee7615b7ab143b4b468dbbadf4cd9c106c9540d2c5b642db7ded71da76ea167a81fd
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1