Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:15
Static task
static1
General
-
Target
69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe
-
Size
1.2MB
-
MD5
ee6d95388ca2c343011cd94c339d1392
-
SHA1
f89592e46d45d6193c158d027c9e5fa90423f2b3
-
SHA256
69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482
-
SHA512
db50cd3333822165bb333ca07828b6c28fb3ebc7770808e4ded9538402c300b0994eba7bd92f33f70fdf425dd26f13ab40f852efc18b3009caab9935339611bd
-
SSDEEP
24576:9y4snPLZmMS3N8juvdE2DYZco4kSZJnR+S7HnO:Y4szZkNooo74kSfR+8H
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr660315.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr660315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr660315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr660315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr660315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr660315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr660315.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu625747.exesi010771.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu625747.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si010771.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un411457.exeun234198.exepr660315.exequ625747.exe1.exerk125983.exesi010771.exeoneetx.exeoneetx.exeoneetx.exepid process 552 un411457.exe 2320 un234198.exe 2676 pr660315.exe 3868 qu625747.exe 3324 1.exe 4316 rk125983.exe 4892 si010771.exe 1424 oneetx.exe 2620 oneetx.exe 4080 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4532 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr660315.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr660315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr660315.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un411457.exeun234198.exe69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un411457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un411457.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un234198.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un234198.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1652 2676 WerFault.exe pr660315.exe 1396 3868 WerFault.exe qu625747.exe 3292 4892 WerFault.exe si010771.exe 4220 4892 WerFault.exe si010771.exe 1460 4892 WerFault.exe si010771.exe 3256 4892 WerFault.exe si010771.exe 2396 4892 WerFault.exe si010771.exe 408 4892 WerFault.exe si010771.exe 3160 4892 WerFault.exe si010771.exe 2112 4892 WerFault.exe si010771.exe 4532 4892 WerFault.exe si010771.exe 1188 4892 WerFault.exe si010771.exe 692 1424 WerFault.exe oneetx.exe 540 1424 WerFault.exe oneetx.exe 1260 1424 WerFault.exe oneetx.exe 4876 1424 WerFault.exe oneetx.exe 3708 1424 WerFault.exe oneetx.exe 1216 1424 WerFault.exe oneetx.exe 2152 1424 WerFault.exe oneetx.exe 1824 1424 WerFault.exe oneetx.exe 3416 1424 WerFault.exe oneetx.exe 1784 1424 WerFault.exe oneetx.exe 4984 1424 WerFault.exe oneetx.exe 2988 1424 WerFault.exe oneetx.exe 4448 2620 WerFault.exe oneetx.exe 4668 2620 WerFault.exe oneetx.exe 3760 2620 WerFault.exe oneetx.exe 4496 1424 WerFault.exe oneetx.exe 456 1424 WerFault.exe oneetx.exe 4432 1424 WerFault.exe oneetx.exe 4480 4080 WerFault.exe oneetx.exe 4408 4080 WerFault.exe oneetx.exe 4400 4080 WerFault.exe oneetx.exe 2708 1424 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr660315.exerk125983.exe1.exepid process 2676 pr660315.exe 2676 pr660315.exe 4316 rk125983.exe 3324 1.exe 4316 rk125983.exe 3324 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr660315.exequ625747.exerk125983.exe1.exedescription pid process Token: SeDebugPrivilege 2676 pr660315.exe Token: SeDebugPrivilege 3868 qu625747.exe Token: SeDebugPrivilege 4316 rk125983.exe Token: SeDebugPrivilege 3324 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si010771.exepid process 4892 si010771.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exeun411457.exeun234198.exequ625747.exesi010771.exeoneetx.exedescription pid process target process PID 372 wrote to memory of 552 372 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe un411457.exe PID 372 wrote to memory of 552 372 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe un411457.exe PID 372 wrote to memory of 552 372 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe un411457.exe PID 552 wrote to memory of 2320 552 un411457.exe un234198.exe PID 552 wrote to memory of 2320 552 un411457.exe un234198.exe PID 552 wrote to memory of 2320 552 un411457.exe un234198.exe PID 2320 wrote to memory of 2676 2320 un234198.exe pr660315.exe PID 2320 wrote to memory of 2676 2320 un234198.exe pr660315.exe PID 2320 wrote to memory of 2676 2320 un234198.exe pr660315.exe PID 2320 wrote to memory of 3868 2320 un234198.exe qu625747.exe PID 2320 wrote to memory of 3868 2320 un234198.exe qu625747.exe PID 2320 wrote to memory of 3868 2320 un234198.exe qu625747.exe PID 3868 wrote to memory of 3324 3868 qu625747.exe 1.exe PID 3868 wrote to memory of 3324 3868 qu625747.exe 1.exe PID 3868 wrote to memory of 3324 3868 qu625747.exe 1.exe PID 552 wrote to memory of 4316 552 un411457.exe rk125983.exe PID 552 wrote to memory of 4316 552 un411457.exe rk125983.exe PID 552 wrote to memory of 4316 552 un411457.exe rk125983.exe PID 372 wrote to memory of 4892 372 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe si010771.exe PID 372 wrote to memory of 4892 372 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe si010771.exe PID 372 wrote to memory of 4892 372 69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe si010771.exe PID 4892 wrote to memory of 1424 4892 si010771.exe oneetx.exe PID 4892 wrote to memory of 1424 4892 si010771.exe oneetx.exe PID 4892 wrote to memory of 1424 4892 si010771.exe oneetx.exe PID 1424 wrote to memory of 2128 1424 oneetx.exe schtasks.exe PID 1424 wrote to memory of 2128 1424 oneetx.exe schtasks.exe PID 1424 wrote to memory of 2128 1424 oneetx.exe schtasks.exe PID 1424 wrote to memory of 4532 1424 oneetx.exe rundll32.exe PID 1424 wrote to memory of 4532 1424 oneetx.exe rundll32.exe PID 1424 wrote to memory of 4532 1424 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe"C:\Users\Admin\AppData\Local\Temp\69309787d1e0bf139b47255852b465a452a1e99e6d733d69cf2919d858ed8482.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un411457.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un411457.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un234198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un234198.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr660315.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr660315.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10845⤵
- Program crash
PID:1652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu625747.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu625747.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 13805⤵
- Program crash
PID:1396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk125983.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk125983.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si010771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si010771.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 7003⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 7843⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 8003⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 9843⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 9883⤵
- Program crash
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 10083⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12003⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12443⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12483⤵
- Program crash
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 6964⤵
- Program crash
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 10084⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 10764⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 10964⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 11044⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 11284⤵
- Program crash
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 10764⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 11484⤵
- Program crash
PID:1824
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 9964⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 7604⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 8884⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 8764⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 11324⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 16124⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 15724⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 16284⤵
- Program crash
PID:2708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12083⤵
- Program crash
PID:1188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2676 -ip 26761⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3868 -ip 38681⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4892 -ip 48921⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4892 -ip 48921⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4892 -ip 48921⤵PID:820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4892 -ip 48921⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4892 -ip 48921⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4892 -ip 48921⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4892 -ip 48921⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4892 -ip 48921⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4892 -ip 48921⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4892 -ip 48921⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1424 -ip 14241⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 14241⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1424 -ip 14241⤵PID:784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1424 -ip 14241⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1424 -ip 14241⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1424 -ip 14241⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1424 -ip 14241⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 14241⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1424 -ip 14241⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1424 -ip 14241⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1424 -ip 14241⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1424 -ip 14241⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 3962⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 4402⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 5122⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2620 -ip 26201⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2620 -ip 26201⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2620 -ip 26201⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1424 -ip 14241⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1424 -ip 14241⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1424 -ip 14241⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 4002⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 4402⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 4402⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4080 -ip 40801⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4080 -ip 40801⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4080 -ip 40801⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1424 -ip 14241⤵PID:4884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD5f7f08a7d9fbe06dd123aa53800828f50
SHA1d61d91cb268f5a850b505ea4f3a580912d74b273
SHA25679b559697bc96f899b8d0bbd5c2bdeaf0e76caba93afc7c0839f11d147858e2a
SHA51269d90cb18472e90455ae105ed8ed07c2090c7069a68ca300ca867d5a21a3a175e87fa2fa4ee03f8fa84a0279869decc85537b6ef5e3a051faaf8c2cc0bb7e412
-
Filesize
862KB
MD5f7f08a7d9fbe06dd123aa53800828f50
SHA1d61d91cb268f5a850b505ea4f3a580912d74b273
SHA25679b559697bc96f899b8d0bbd5c2bdeaf0e76caba93afc7c0839f11d147858e2a
SHA51269d90cb18472e90455ae105ed8ed07c2090c7069a68ca300ca867d5a21a3a175e87fa2fa4ee03f8fa84a0279869decc85537b6ef5e3a051faaf8c2cc0bb7e412
-
Filesize
169KB
MD55bfbdb91c17580830507c0aa94abd923
SHA1e4c96c07ef80902d75cb3b04b196f934ef55b49e
SHA256d2255500101e6763f56f590fe6558292e853c00d1322379987b900a59b709d20
SHA51246c4a04c5ce90d81e18b129c06a20b4f73d51cd65efc54e59f782cab1f7f6e5e01e0f4655f87a547b52e23a3ad814feae488e63709d40c3c4db66c3e04ee6b5a
-
Filesize
169KB
MD55bfbdb91c17580830507c0aa94abd923
SHA1e4c96c07ef80902d75cb3b04b196f934ef55b49e
SHA256d2255500101e6763f56f590fe6558292e853c00d1322379987b900a59b709d20
SHA51246c4a04c5ce90d81e18b129c06a20b4f73d51cd65efc54e59f782cab1f7f6e5e01e0f4655f87a547b52e23a3ad814feae488e63709d40c3c4db66c3e04ee6b5a
-
Filesize
708KB
MD56c3b4fe413bb702be6a715a24dac2237
SHA128c23d234e183c7783425a9cc3dd47869f58a4ea
SHA2569bcf57ce91af8fae4dc7d1bc9be3162695a335a8955f9c542c4845375e5c4ae2
SHA512b6b92a51804c66625a51e873689b80925a6e159620b7572cdce65ca77ec997fc4e410633e4ff0a5d0f8a6dd26a3870226d45596a8f514cf872e3924b4a64e40b
-
Filesize
708KB
MD56c3b4fe413bb702be6a715a24dac2237
SHA128c23d234e183c7783425a9cc3dd47869f58a4ea
SHA2569bcf57ce91af8fae4dc7d1bc9be3162695a335a8955f9c542c4845375e5c4ae2
SHA512b6b92a51804c66625a51e873689b80925a6e159620b7572cdce65ca77ec997fc4e410633e4ff0a5d0f8a6dd26a3870226d45596a8f514cf872e3924b4a64e40b
-
Filesize
405KB
MD50ed36adaacda8b9cbcf0cd8b8f0cbb8c
SHA138ee8db5c1cd1c1a0cd94480de73024beb5c7fbe
SHA256345b49b5fa5eae851fb4e9adb51ef7e8d120b85b7ffa0d619943aa25036ac557
SHA5128dc452f83d58ab404bf3a08963791887bb774150c40eefff475cbc7df7ac7b05f07fd8c8e64875e88c2fe3b822745b25e74878b4fcf2f3bb58cac2f62d288ae5
-
Filesize
405KB
MD50ed36adaacda8b9cbcf0cd8b8f0cbb8c
SHA138ee8db5c1cd1c1a0cd94480de73024beb5c7fbe
SHA256345b49b5fa5eae851fb4e9adb51ef7e8d120b85b7ffa0d619943aa25036ac557
SHA5128dc452f83d58ab404bf3a08963791887bb774150c40eefff475cbc7df7ac7b05f07fd8c8e64875e88c2fe3b822745b25e74878b4fcf2f3bb58cac2f62d288ae5
-
Filesize
588KB
MD5a44c85690c9360bc6b477937cd37def3
SHA11f23b69eac38e2e66a103ea42fefc1441fa52421
SHA256ec3304dcb3d1fd14e49c67891577c5003ad0a30a2ddae2f471a0597ff18ffa8f
SHA512260f48b50218a5d9a9e7d6692d498dce4f21b49e59021d1f017080bee0ac42d0c3af11604e00797babf891dd47fbf873181597e325d0bbbdc1f9a136f340abe3
-
Filesize
588KB
MD5a44c85690c9360bc6b477937cd37def3
SHA11f23b69eac38e2e66a103ea42fefc1441fa52421
SHA256ec3304dcb3d1fd14e49c67891577c5003ad0a30a2ddae2f471a0597ff18ffa8f
SHA512260f48b50218a5d9a9e7d6692d498dce4f21b49e59021d1f017080bee0ac42d0c3af11604e00797babf891dd47fbf873181597e325d0bbbdc1f9a136f340abe3
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1