Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:16
Static task
static1
General
-
Target
a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe
-
Size
1.2MB
-
MD5
6313cf55c66863ca5c8250f33b8ed80b
-
SHA1
f3fa3140000f67c439800307225ee73d6b9f2b21
-
SHA256
a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a
-
SHA512
36105a12e45a7795042d0f42c5cd76ed3f9e66d57914dda41a56b4668f6c260e9374377bafb5ac806bca1f33dbdb5ac92eb8b863cbeed554faa652c94ab71031
-
SSDEEP
24576:gysPYdyg68so90w5YKiI4rIVx22YTF5C2SZJ/R0xlgRc2jFignwYRUyzisc:nsK6xY0cYlI44EnC2SfJ0xCc2jFZ
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr911621.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr911621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr911621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr911621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr911621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr911621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr911621.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exequ824403.exesi299818.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu824403.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si299818.exe -
Executes dropped EXE 10 IoCs
Processes:
un666706.exeun053632.exepr911621.exequ824403.exe1.exerk692817.exesi299818.exeoneetx.exeoneetx.exeoneetx.exepid process 5084 un666706.exe 3228 un053632.exe 3180 pr911621.exe 2476 qu824403.exe 3864 1.exe 4828 rk692817.exe 2120 si299818.exe 388 oneetx.exe 4880 oneetx.exe 1940 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1316 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr911621.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr911621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr911621.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un666706.exeun053632.exea532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un666706.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un666706.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un053632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un053632.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1096 3180 WerFault.exe pr911621.exe 2064 2476 WerFault.exe qu824403.exe 4724 2120 WerFault.exe si299818.exe 4620 2120 WerFault.exe si299818.exe 3464 2120 WerFault.exe si299818.exe 3184 2120 WerFault.exe si299818.exe 2928 2120 WerFault.exe si299818.exe 2240 2120 WerFault.exe si299818.exe 1516 2120 WerFault.exe si299818.exe 1372 2120 WerFault.exe si299818.exe 2328 2120 WerFault.exe si299818.exe 4648 2120 WerFault.exe si299818.exe 4088 388 WerFault.exe oneetx.exe 4356 388 WerFault.exe oneetx.exe 4980 388 WerFault.exe oneetx.exe 3484 388 WerFault.exe oneetx.exe 3080 388 WerFault.exe oneetx.exe 1320 388 WerFault.exe oneetx.exe 1840 388 WerFault.exe oneetx.exe 4084 388 WerFault.exe oneetx.exe 3420 388 WerFault.exe oneetx.exe 2476 388 WerFault.exe oneetx.exe 4220 388 WerFault.exe oneetx.exe 2404 388 WerFault.exe oneetx.exe 960 4880 WerFault.exe oneetx.exe 2848 4880 WerFault.exe oneetx.exe 4780 4880 WerFault.exe oneetx.exe 4724 388 WerFault.exe oneetx.exe 4804 388 WerFault.exe oneetx.exe 2072 388 WerFault.exe oneetx.exe 816 1940 WerFault.exe oneetx.exe 3600 1940 WerFault.exe oneetx.exe 4408 1940 WerFault.exe oneetx.exe 4788 388 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr911621.exe1.exerk692817.exepid process 3180 pr911621.exe 3180 pr911621.exe 3864 1.exe 4828 rk692817.exe 3864 1.exe 4828 rk692817.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr911621.exequ824403.exe1.exerk692817.exedescription pid process Token: SeDebugPrivilege 3180 pr911621.exe Token: SeDebugPrivilege 2476 qu824403.exe Token: SeDebugPrivilege 3864 1.exe Token: SeDebugPrivilege 4828 rk692817.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si299818.exepid process 2120 si299818.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exeun666706.exeun053632.exequ824403.exesi299818.exeoneetx.exedescription pid process target process PID 3216 wrote to memory of 5084 3216 a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe un666706.exe PID 3216 wrote to memory of 5084 3216 a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe un666706.exe PID 3216 wrote to memory of 5084 3216 a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe un666706.exe PID 5084 wrote to memory of 3228 5084 un666706.exe un053632.exe PID 5084 wrote to memory of 3228 5084 un666706.exe un053632.exe PID 5084 wrote to memory of 3228 5084 un666706.exe un053632.exe PID 3228 wrote to memory of 3180 3228 un053632.exe pr911621.exe PID 3228 wrote to memory of 3180 3228 un053632.exe pr911621.exe PID 3228 wrote to memory of 3180 3228 un053632.exe pr911621.exe PID 3228 wrote to memory of 2476 3228 un053632.exe qu824403.exe PID 3228 wrote to memory of 2476 3228 un053632.exe qu824403.exe PID 3228 wrote to memory of 2476 3228 un053632.exe qu824403.exe PID 2476 wrote to memory of 3864 2476 qu824403.exe 1.exe PID 2476 wrote to memory of 3864 2476 qu824403.exe 1.exe PID 2476 wrote to memory of 3864 2476 qu824403.exe 1.exe PID 5084 wrote to memory of 4828 5084 un666706.exe rk692817.exe PID 5084 wrote to memory of 4828 5084 un666706.exe rk692817.exe PID 5084 wrote to memory of 4828 5084 un666706.exe rk692817.exe PID 3216 wrote to memory of 2120 3216 a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe si299818.exe PID 3216 wrote to memory of 2120 3216 a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe si299818.exe PID 3216 wrote to memory of 2120 3216 a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe si299818.exe PID 2120 wrote to memory of 388 2120 si299818.exe oneetx.exe PID 2120 wrote to memory of 388 2120 si299818.exe oneetx.exe PID 2120 wrote to memory of 388 2120 si299818.exe oneetx.exe PID 388 wrote to memory of 3788 388 oneetx.exe schtasks.exe PID 388 wrote to memory of 3788 388 oneetx.exe schtasks.exe PID 388 wrote to memory of 3788 388 oneetx.exe schtasks.exe PID 388 wrote to memory of 1316 388 oneetx.exe rundll32.exe PID 388 wrote to memory of 1316 388 oneetx.exe rundll32.exe PID 388 wrote to memory of 1316 388 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe"C:\Users\Admin\AppData\Local\Temp\a532175766684a30b7f5bf4ce9b4be8e665f2afbe1f7ff511f6ae4a2d7c3525a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666706.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666706.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un053632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un053632.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr911621.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr911621.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 10885⤵
- Program crash
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu824403.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu824403.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 13765⤵
- Program crash
PID:2064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk692817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk692817.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si299818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si299818.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 7003⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 7563⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 8163⤵
- Program crash
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 9563⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 8163⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 8163⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 12283⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 12403⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 13243⤵
- Program crash
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 6964⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 8884⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 9204⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10564⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10644⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 11124⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 11564⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 9484⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10804⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10884⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10764⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 14364⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 11804⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 16444⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 13684⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 16524⤵
- Program crash
PID:4788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 14443⤵
- Program crash
PID:4648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3180 -ip 31801⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2476 -ip 24761⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2120 -ip 21201⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2120 -ip 21201⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2120 -ip 21201⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2120 -ip 21201⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2120 -ip 21201⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2120 -ip 21201⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2120 -ip 21201⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2120 -ip 21201⤵PID:2996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2120 -ip 21201⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2120 -ip 21201⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 388 -ip 3881⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 388 -ip 3881⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 388 -ip 3881⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 388 -ip 3881⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 388 -ip 3881⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 388 -ip 3881⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 388 -ip 3881⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 388 -ip 3881⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 388 -ip 3881⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 388 -ip 3881⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 388 -ip 3881⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 388 -ip 3881⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 3962⤵
- Program crash
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 4402⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 4402⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4880 -ip 48801⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4880 -ip 48801⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4880 -ip 48801⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 388 -ip 3881⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 388 -ip 3881⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 388 -ip 3881⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 3962⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 4402⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 4402⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1940 -ip 19401⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1940 -ip 19401⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1940 -ip 19401⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 388 -ip 3881⤵PID:2924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD57b1a3df1d8183b969f56daab749f751a
SHA109a8ce497f1558ce5a20d446d1fea9a213265998
SHA256d44a32dc4fb5721aeed16933249e388d73a7ef07fdbdbdbaaf7d5361fc9b5aeb
SHA5124de24a20335b0cc47915ac1df811c2835d58e0a2df95a45888007bd8cf8c8cfc2ac8c97917732325659d96592f6d7cf3aca94a81d9b81fc620e84b1b62b220fd
-
Filesize
862KB
MD57b1a3df1d8183b969f56daab749f751a
SHA109a8ce497f1558ce5a20d446d1fea9a213265998
SHA256d44a32dc4fb5721aeed16933249e388d73a7ef07fdbdbdbaaf7d5361fc9b5aeb
SHA5124de24a20335b0cc47915ac1df811c2835d58e0a2df95a45888007bd8cf8c8cfc2ac8c97917732325659d96592f6d7cf3aca94a81d9b81fc620e84b1b62b220fd
-
Filesize
169KB
MD5b466e39bfd29eccfc8d50b82c018681e
SHA188fe5562fe6ae1bb71eba520ffd72f5489f24c57
SHA256576e0fcaf381e3b7092e7e56c6b1d7344a24ff99338a74a24c52d26c0010e4af
SHA512b7aec059c7420f37cfe3d5c001d82a9f929b8506d3b612babb39b05a1a133def95b13834bb963fb5977ab9037d1a3f6e885ede24edd53d29da3e1798f9e7d6e7
-
Filesize
169KB
MD5b466e39bfd29eccfc8d50b82c018681e
SHA188fe5562fe6ae1bb71eba520ffd72f5489f24c57
SHA256576e0fcaf381e3b7092e7e56c6b1d7344a24ff99338a74a24c52d26c0010e4af
SHA512b7aec059c7420f37cfe3d5c001d82a9f929b8506d3b612babb39b05a1a133def95b13834bb963fb5977ab9037d1a3f6e885ede24edd53d29da3e1798f9e7d6e7
-
Filesize
708KB
MD562bddee2634d64ffe2aea020e9fdd5ae
SHA155709a091fd22840d4a0d8a99f1920acb155ca60
SHA256d9e8688e8291993ed245dc14587974f3bced7aa91833e2c3310d07a2a4896995
SHA5125da9dde9fc6e8aa558d599ec98f1f112627cb1de93736d65935f0741b08dcb5ce255b683f9b03a2c0d7c8125971a69c0557ed78046ed9a38591cb2ed89b38923
-
Filesize
708KB
MD562bddee2634d64ffe2aea020e9fdd5ae
SHA155709a091fd22840d4a0d8a99f1920acb155ca60
SHA256d9e8688e8291993ed245dc14587974f3bced7aa91833e2c3310d07a2a4896995
SHA5125da9dde9fc6e8aa558d599ec98f1f112627cb1de93736d65935f0741b08dcb5ce255b683f9b03a2c0d7c8125971a69c0557ed78046ed9a38591cb2ed89b38923
-
Filesize
405KB
MD5549d3c20dad51826b3cfd9c45efa447c
SHA1ca98cae487188db7b64e0558ca2275604ca25b6b
SHA256e5b6581a3b62094d6016cd6048daa7966fe2904b43120d8ec73c48529e45aa9a
SHA512b072accf6a13c8e9e9bc16cf88a03f1e0d854a992a032177c13c66f8cecc1aa02c44aa86f2e1721714b8f86ec4d5671c6e72a0c956a8c350ebcddef38db1ed92
-
Filesize
405KB
MD5549d3c20dad51826b3cfd9c45efa447c
SHA1ca98cae487188db7b64e0558ca2275604ca25b6b
SHA256e5b6581a3b62094d6016cd6048daa7966fe2904b43120d8ec73c48529e45aa9a
SHA512b072accf6a13c8e9e9bc16cf88a03f1e0d854a992a032177c13c66f8cecc1aa02c44aa86f2e1721714b8f86ec4d5671c6e72a0c956a8c350ebcddef38db1ed92
-
Filesize
588KB
MD5141761f0863ce6cc05ed307542b85542
SHA16e3514fbaee933e4898e0107f4585d2de9e09a13
SHA256fbeb1f930c2362314a4e446fde440abbfbf02dc78c697b4da1890c49c9ff39f0
SHA512d2b6195808df1603e2e7ca58e79660ff2bbc2614dc34ba265187de1343f5ef20f81f384cf9bef261edc08343e732b17bb37b1a8ec11ad927a1af20d34b6a1e0c
-
Filesize
588KB
MD5141761f0863ce6cc05ed307542b85542
SHA16e3514fbaee933e4898e0107f4585d2de9e09a13
SHA256fbeb1f930c2362314a4e446fde440abbfbf02dc78c697b4da1890c49c9ff39f0
SHA512d2b6195808df1603e2e7ca58e79660ff2bbc2614dc34ba265187de1343f5ef20f81f384cf9bef261edc08343e732b17bb37b1a8ec11ad927a1af20d34b6a1e0c
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1