Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:03
Static task
static1
General
-
Target
4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe
-
Size
1.2MB
-
MD5
88721c4c233e9e34709f42de00725e86
-
SHA1
a7c7bfe93a8d4530db5d84976d2e47a458d1a359
-
SHA256
4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55
-
SHA512
f947329e34d0ccc0a1a9924ba36df1e34be1cc7c16abea147eac8013cf9874af9b055bd563607767e408f52435a06d28ce19d6e2a6e0aae47a7ae1cded12fa6f
-
SSDEEP
24576:xyvVIB6BAhXPx3wIjdh1BabhxspfYugPuNSZJPRgfr/cTbhYnxSpIj1Dd:kvHBkPXDatxQouNSfZgwp49j1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr447444.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr447444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr447444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr447444.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr447444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr447444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr447444.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu137698.exesi694721.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu137698.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si694721.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un384383.exeun602178.exepr447444.exequ137698.exe1.exerk107040.exesi694721.exeoneetx.exeoneetx.exepid process 1944 un384383.exe 3488 un602178.exe 836 pr447444.exe 2152 qu137698.exe 1280 1.exe 4060 rk107040.exe 1632 si694721.exe 2640 oneetx.exe 428 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2600 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr447444.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr447444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr447444.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un602178.exe4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exeun384383.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un602178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un602178.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un384383.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un384383.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3988 836 WerFault.exe pr447444.exe 4120 2152 WerFault.exe qu137698.exe 4644 1632 WerFault.exe si694721.exe 2216 1632 WerFault.exe si694721.exe 3912 1632 WerFault.exe si694721.exe 464 1632 WerFault.exe si694721.exe 3176 1632 WerFault.exe si694721.exe 4084 1632 WerFault.exe si694721.exe 1988 1632 WerFault.exe si694721.exe 2976 1632 WerFault.exe si694721.exe 4364 1632 WerFault.exe si694721.exe 2148 1632 WerFault.exe si694721.exe 2156 2640 WerFault.exe oneetx.exe 4648 2640 WerFault.exe oneetx.exe 3204 2640 WerFault.exe oneetx.exe 1656 2640 WerFault.exe oneetx.exe 3060 2640 WerFault.exe oneetx.exe 2320 2640 WerFault.exe oneetx.exe 4436 2640 WerFault.exe oneetx.exe 3172 2640 WerFault.exe oneetx.exe 4192 2640 WerFault.exe oneetx.exe 3624 2640 WerFault.exe oneetx.exe 3340 2640 WerFault.exe oneetx.exe 2180 2640 WerFault.exe oneetx.exe 4728 2640 WerFault.exe oneetx.exe 3140 2640 WerFault.exe oneetx.exe 4956 428 WerFault.exe oneetx.exe 3912 428 WerFault.exe oneetx.exe 2200 428 WerFault.exe oneetx.exe 1496 2640 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr447444.exe1.exerk107040.exepid process 836 pr447444.exe 836 pr447444.exe 1280 1.exe 4060 rk107040.exe 1280 1.exe 4060 rk107040.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr447444.exequ137698.exe1.exerk107040.exedescription pid process Token: SeDebugPrivilege 836 pr447444.exe Token: SeDebugPrivilege 2152 qu137698.exe Token: SeDebugPrivilege 1280 1.exe Token: SeDebugPrivilege 4060 rk107040.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si694721.exepid process 1632 si694721.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exeun384383.exeun602178.exequ137698.exesi694721.exeoneetx.exedescription pid process target process PID 800 wrote to memory of 1944 800 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe un384383.exe PID 800 wrote to memory of 1944 800 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe un384383.exe PID 800 wrote to memory of 1944 800 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe un384383.exe PID 1944 wrote to memory of 3488 1944 un384383.exe un602178.exe PID 1944 wrote to memory of 3488 1944 un384383.exe un602178.exe PID 1944 wrote to memory of 3488 1944 un384383.exe un602178.exe PID 3488 wrote to memory of 836 3488 un602178.exe pr447444.exe PID 3488 wrote to memory of 836 3488 un602178.exe pr447444.exe PID 3488 wrote to memory of 836 3488 un602178.exe pr447444.exe PID 3488 wrote to memory of 2152 3488 un602178.exe qu137698.exe PID 3488 wrote to memory of 2152 3488 un602178.exe qu137698.exe PID 3488 wrote to memory of 2152 3488 un602178.exe qu137698.exe PID 2152 wrote to memory of 1280 2152 qu137698.exe 1.exe PID 2152 wrote to memory of 1280 2152 qu137698.exe 1.exe PID 2152 wrote to memory of 1280 2152 qu137698.exe 1.exe PID 1944 wrote to memory of 4060 1944 un384383.exe rk107040.exe PID 1944 wrote to memory of 4060 1944 un384383.exe rk107040.exe PID 1944 wrote to memory of 4060 1944 un384383.exe rk107040.exe PID 800 wrote to memory of 1632 800 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe si694721.exe PID 800 wrote to memory of 1632 800 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe si694721.exe PID 800 wrote to memory of 1632 800 4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe si694721.exe PID 1632 wrote to memory of 2640 1632 si694721.exe oneetx.exe PID 1632 wrote to memory of 2640 1632 si694721.exe oneetx.exe PID 1632 wrote to memory of 2640 1632 si694721.exe oneetx.exe PID 2640 wrote to memory of 2996 2640 oneetx.exe schtasks.exe PID 2640 wrote to memory of 2996 2640 oneetx.exe schtasks.exe PID 2640 wrote to memory of 2996 2640 oneetx.exe schtasks.exe PID 2640 wrote to memory of 2600 2640 oneetx.exe rundll32.exe PID 2640 wrote to memory of 2600 2640 oneetx.exe rundll32.exe PID 2640 wrote to memory of 2600 2640 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe"C:\Users\Admin\AppData\Local\Temp\4cfd45baf1dcba2f1588208ca36265992e7a1fd0bd5437b64e73463b83064b55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384383.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un602178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un602178.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr447444.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr447444.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 10485⤵
- Program crash
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu137698.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu137698.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 13885⤵
- Program crash
PID:4120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk107040.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk107040.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694721.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 7003⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 7843⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 8603⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 9563⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 9643⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 9923⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 12203⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 12723⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 13163⤵
- Program crash
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 6964⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 8604⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 8844⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10564⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10924⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10924⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10964⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 9964⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 7324⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 9924⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 9004⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 11404⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 16284⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 15924⤵
- Program crash
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 16364⤵
- Program crash
PID:1496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 13603⤵
- Program crash
PID:2148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 836 -ip 8361⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2152 -ip 21521⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1632 -ip 16321⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1632 -ip 16321⤵PID:952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1632 -ip 16321⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1632 -ip 16321⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1632 -ip 16321⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1632 -ip 16321⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1632 -ip 16321⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1632 -ip 16321⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1632 -ip 16321⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1632 -ip 16321⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2640 -ip 26401⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2640 -ip 26401⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2640 -ip 26401⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2640 -ip 26401⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2640 -ip 26401⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2640 -ip 26401⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2640 -ip 26401⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2640 -ip 26401⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2640 -ip 26401⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2640 -ip 26401⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2640 -ip 26401⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2640 -ip 26401⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2640 -ip 26401⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2640 -ip 26401⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 3962⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 4402⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 4402⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 428 -ip 4281⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 428 -ip 4281⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 428 -ip 4281⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2640 -ip 26401⤵PID:4068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD5cdd7fef138b0756be3d952e4f7616695
SHA1364fe06ea8ba50ab2a77a701d1bfbfd5a2b59ef1
SHA25604abf840e30e8ef56bcfa40de3e4ecb5e19881ec9e1b9def73de83b55949f146
SHA5129c854583a68a2f7017c087d29c27d9a704578352188da9c0d1417aceefea85ba58445445b60df0e083ac4bfc71e5d4593417720762ecb9e02a02ee8489db6f5f
-
Filesize
862KB
MD5cdd7fef138b0756be3d952e4f7616695
SHA1364fe06ea8ba50ab2a77a701d1bfbfd5a2b59ef1
SHA25604abf840e30e8ef56bcfa40de3e4ecb5e19881ec9e1b9def73de83b55949f146
SHA5129c854583a68a2f7017c087d29c27d9a704578352188da9c0d1417aceefea85ba58445445b60df0e083ac4bfc71e5d4593417720762ecb9e02a02ee8489db6f5f
-
Filesize
169KB
MD5a20fdec67b690feec80e0ac5fc095557
SHA165ec0418f656324fde0541e2b8c7bf5eb63d633b
SHA2560e301a55cf9f7223d1390af9c4b4a3385d00174be4acf911ffcbb94bd1bffc0a
SHA512a1ab7948c3e905c724d77a8fa55c02580ad9be6e792f5b9d0403b208052992731cea09ed7c7ccd0bbd848f57b61c3b779688e8050ca659b0f33065dea4eda662
-
Filesize
169KB
MD5a20fdec67b690feec80e0ac5fc095557
SHA165ec0418f656324fde0541e2b8c7bf5eb63d633b
SHA2560e301a55cf9f7223d1390af9c4b4a3385d00174be4acf911ffcbb94bd1bffc0a
SHA512a1ab7948c3e905c724d77a8fa55c02580ad9be6e792f5b9d0403b208052992731cea09ed7c7ccd0bbd848f57b61c3b779688e8050ca659b0f33065dea4eda662
-
Filesize
708KB
MD511ebb5990135874cb2b439cc45c2bda1
SHA1598d2157724b82261d6650744cd26e4a605a6c11
SHA2568a6cd64884d8e5534e9c3f225f70245e22676a9ec2b51d9712103d814ea3d6c0
SHA512c41f14809bd9de3c54c115eb65c70a57d920a4a5370589ef770877a5078f82a327c168c06a861e24c7df1be9de1c33cd6a7b2eafdc45c9b280cfc58c30960578
-
Filesize
708KB
MD511ebb5990135874cb2b439cc45c2bda1
SHA1598d2157724b82261d6650744cd26e4a605a6c11
SHA2568a6cd64884d8e5534e9c3f225f70245e22676a9ec2b51d9712103d814ea3d6c0
SHA512c41f14809bd9de3c54c115eb65c70a57d920a4a5370589ef770877a5078f82a327c168c06a861e24c7df1be9de1c33cd6a7b2eafdc45c9b280cfc58c30960578
-
Filesize
405KB
MD55740745968d68b52bd9314d737660851
SHA177b7d89857b3446c908ff4edaf746c88df96bc26
SHA25665686d2c451ab37a93397a92e90b61bac8795bff5aea7bd7fb81dabf0d1a58ed
SHA5128ba863036c779810e396dbab46f3d3e81159f782ed3a94b0780ce8fadf86c33df789b74552e69cee7efe9513ebfa428ac215396e0287adc04a4c1d4e6da9006f
-
Filesize
405KB
MD55740745968d68b52bd9314d737660851
SHA177b7d89857b3446c908ff4edaf746c88df96bc26
SHA25665686d2c451ab37a93397a92e90b61bac8795bff5aea7bd7fb81dabf0d1a58ed
SHA5128ba863036c779810e396dbab46f3d3e81159f782ed3a94b0780ce8fadf86c33df789b74552e69cee7efe9513ebfa428ac215396e0287adc04a4c1d4e6da9006f
-
Filesize
588KB
MD524cfddc076c083b8a1d92f48e6bbed98
SHA1ddba4f4bf7c59938efa48ad36f6d978a716a1441
SHA256e9313e5b5c597ec8b7ee743202b29df4f9bcc67ead12fa2a810365f334445f96
SHA51238c57cbb0b983bce0ac74a2e653b35c37535333359512fa22920426aeadc2ffdf1639e8fe1e69b24d8f7034e8afa757441697557b5aecd8b1f01ef2b887feeb4
-
Filesize
588KB
MD524cfddc076c083b8a1d92f48e6bbed98
SHA1ddba4f4bf7c59938efa48ad36f6d978a716a1441
SHA256e9313e5b5c597ec8b7ee743202b29df4f9bcc67ead12fa2a810365f334445f96
SHA51238c57cbb0b983bce0ac74a2e653b35c37535333359512fa22920426aeadc2ffdf1639e8fe1e69b24d8f7034e8afa757441697557b5aecd8b1f01ef2b887feeb4
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1