Analysis
-
max time kernel
140s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:26
Static task
static1
General
-
Target
ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe
-
Size
1.0MB
-
MD5
27ddaaaf04246502e17781aca06a279c
-
SHA1
0dacc38ee38a9b7ac1110a99e43226dffb5e09c3
-
SHA256
ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94
-
SHA512
52c8fa06953955b4a9264f0332dc477542520928432752934ea66e64bff8c8f388dcdbde9b7f0bb339831eea5aa6a4b228123f8470d6f9575a8aaecca6181211
-
SSDEEP
24576:IyzYinF8TUNPbKpMWzsl7R8RK6Q/dBBsSBJjRb6LDn7p8jDlC:PTCUN2zq7rrBsS3db6D7CjDl
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it589037.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it589037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it589037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it589037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it589037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it589037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it589037.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr974564.exelr281931.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr974564.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr281931.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
zitH1490.exezixz3232.exeit589037.exejr974564.exe1.exekp060606.exelr281931.exeoneetx.exeoneetx.exepid process 1952 zitH1490.exe 4752 zixz3232.exe 1396 it589037.exe 1868 jr974564.exe 4112 1.exe 1896 kp060606.exe 4080 lr281931.exe 3912 oneetx.exe 1868 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4352 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it589037.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it589037.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exezitH1490.exezixz3232.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitH1490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitH1490.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zixz3232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zixz3232.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1412 1868 WerFault.exe jr974564.exe 1460 4080 WerFault.exe lr281931.exe 2476 4080 WerFault.exe lr281931.exe 5064 4080 WerFault.exe lr281931.exe 1992 4080 WerFault.exe lr281931.exe 1008 4080 WerFault.exe lr281931.exe 892 4080 WerFault.exe lr281931.exe 1456 4080 WerFault.exe lr281931.exe 1308 4080 WerFault.exe lr281931.exe 1792 4080 WerFault.exe lr281931.exe 3028 4080 WerFault.exe lr281931.exe 2264 3912 WerFault.exe oneetx.exe 5084 3912 WerFault.exe oneetx.exe 1980 3912 WerFault.exe oneetx.exe 2420 3912 WerFault.exe oneetx.exe 3524 3912 WerFault.exe oneetx.exe 2676 3912 WerFault.exe oneetx.exe 3908 3912 WerFault.exe oneetx.exe 3492 3912 WerFault.exe oneetx.exe 4060 3912 WerFault.exe oneetx.exe 4612 3912 WerFault.exe oneetx.exe 1276 3912 WerFault.exe oneetx.exe 2136 3912 WerFault.exe oneetx.exe 2948 1868 WerFault.exe oneetx.exe 4256 1868 WerFault.exe oneetx.exe 2704 1868 WerFault.exe oneetx.exe 4824 3912 WerFault.exe oneetx.exe 4936 3912 WerFault.exe oneetx.exe 5060 3912 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it589037.exe1.exekp060606.exepid process 1396 it589037.exe 1396 it589037.exe 4112 1.exe 4112 1.exe 1896 kp060606.exe 1896 kp060606.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it589037.exejr974564.exe1.exekp060606.exedescription pid process Token: SeDebugPrivilege 1396 it589037.exe Token: SeDebugPrivilege 1868 jr974564.exe Token: SeDebugPrivilege 4112 1.exe Token: SeDebugPrivilege 1896 kp060606.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr281931.exepid process 4080 lr281931.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exezitH1490.exezixz3232.exejr974564.exelr281931.exeoneetx.exedescription pid process target process PID 2516 wrote to memory of 1952 2516 ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe zitH1490.exe PID 2516 wrote to memory of 1952 2516 ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe zitH1490.exe PID 2516 wrote to memory of 1952 2516 ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe zitH1490.exe PID 1952 wrote to memory of 4752 1952 zitH1490.exe zixz3232.exe PID 1952 wrote to memory of 4752 1952 zitH1490.exe zixz3232.exe PID 1952 wrote to memory of 4752 1952 zitH1490.exe zixz3232.exe PID 4752 wrote to memory of 1396 4752 zixz3232.exe it589037.exe PID 4752 wrote to memory of 1396 4752 zixz3232.exe it589037.exe PID 4752 wrote to memory of 1868 4752 zixz3232.exe jr974564.exe PID 4752 wrote to memory of 1868 4752 zixz3232.exe jr974564.exe PID 4752 wrote to memory of 1868 4752 zixz3232.exe jr974564.exe PID 1868 wrote to memory of 4112 1868 jr974564.exe 1.exe PID 1868 wrote to memory of 4112 1868 jr974564.exe 1.exe PID 1868 wrote to memory of 4112 1868 jr974564.exe 1.exe PID 1952 wrote to memory of 1896 1952 zitH1490.exe kp060606.exe PID 1952 wrote to memory of 1896 1952 zitH1490.exe kp060606.exe PID 1952 wrote to memory of 1896 1952 zitH1490.exe kp060606.exe PID 2516 wrote to memory of 4080 2516 ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe lr281931.exe PID 2516 wrote to memory of 4080 2516 ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe lr281931.exe PID 2516 wrote to memory of 4080 2516 ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe lr281931.exe PID 4080 wrote to memory of 3912 4080 lr281931.exe oneetx.exe PID 4080 wrote to memory of 3912 4080 lr281931.exe oneetx.exe PID 4080 wrote to memory of 3912 4080 lr281931.exe oneetx.exe PID 3912 wrote to memory of 4200 3912 oneetx.exe schtasks.exe PID 3912 wrote to memory of 4200 3912 oneetx.exe schtasks.exe PID 3912 wrote to memory of 4200 3912 oneetx.exe schtasks.exe PID 3912 wrote to memory of 4352 3912 oneetx.exe rundll32.exe PID 3912 wrote to memory of 4352 3912 oneetx.exe rundll32.exe PID 3912 wrote to memory of 4352 3912 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe"C:\Users\Admin\AppData\Local\Temp\ae0657e9ed1312a63377c42da469a8df0cd0f35d663eec99d95bfa85a4be6f94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitH1490.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitH1490.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixz3232.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixz3232.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it589037.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it589037.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr974564.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr974564.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 13765⤵
- Program crash
PID:1412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp060606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp060606.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr281931.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr281931.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7003⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7843⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7963⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 9763⤵
- Program crash
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 9843⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 9843⤵
- Program crash
PID:892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11963⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12203⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12243⤵
- Program crash
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 6964⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8364⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8964⤵
- Program crash
PID:1980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 10564⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 10764⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 10764⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 11004⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 9964⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 7804⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 6884⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 7324⤵
- Program crash
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 11284⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 16284⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 10564⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 15284⤵
- Program crash
PID:5060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13643⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1868 -ip 18681⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4080 -ip 40801⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4080 -ip 40801⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4080 -ip 40801⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4080 -ip 40801⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4080 -ip 40801⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4080 -ip 40801⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4080 -ip 40801⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4080 -ip 40801⤵PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4080 -ip 40801⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4080 -ip 40801⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3912 -ip 39121⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3912 -ip 39121⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3912 -ip 39121⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3912 -ip 39121⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3912 -ip 39121⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3912 -ip 39121⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3912 -ip 39121⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3912 -ip 39121⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3912 -ip 39121⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3912 -ip 39121⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3912 -ip 39121⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3912 -ip 39121⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 3962⤵
- Program crash
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 4402⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 4402⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1868 -ip 18681⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1868 -ip 18681⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1868 -ip 18681⤵PID:904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3912 -ip 39121⤵PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3912 -ip 39121⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3912 -ip 39121⤵PID:4920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD5c41235767577e3fe5a9b772d21ec076b
SHA1263b1007c927118c1d7028f5171fdf2b94a3f640
SHA2569ff7bd5d191189fdfda60c4a2b6177f0c194738338b6ac3698a23f38c0a31903
SHA51272ece586053ad697775ee55dcb7fb53882cf456e523b640c9a7ce5746fbc82178ce0f5ab72975873e3363a28a919358163ad5db3aef7219f02af0c753a0effca
-
Filesize
723KB
MD5c41235767577e3fe5a9b772d21ec076b
SHA1263b1007c927118c1d7028f5171fdf2b94a3f640
SHA2569ff7bd5d191189fdfda60c4a2b6177f0c194738338b6ac3698a23f38c0a31903
SHA51272ece586053ad697775ee55dcb7fb53882cf456e523b640c9a7ce5746fbc82178ce0f5ab72975873e3363a28a919358163ad5db3aef7219f02af0c753a0effca
-
Filesize
169KB
MD52b355782a4a04707e9c4ec6de4360f7c
SHA1bb567df904feb28948612dc38b52c93d0c6611dd
SHA256cec8d62f775af4d62a0edc8896271109e763d7febbdc8d888c40eb9c40ae3fdc
SHA5121f3c5bcb412d94867b0f8bd115792637861895f275d537bef7e2aa2adf5e228f1b3df7e1a31dc0f098484c4547e9d91203759e219665a252eb677aa6c0c8d40c
-
Filesize
169KB
MD52b355782a4a04707e9c4ec6de4360f7c
SHA1bb567df904feb28948612dc38b52c93d0c6611dd
SHA256cec8d62f775af4d62a0edc8896271109e763d7febbdc8d888c40eb9c40ae3fdc
SHA5121f3c5bcb412d94867b0f8bd115792637861895f275d537bef7e2aa2adf5e228f1b3df7e1a31dc0f098484c4547e9d91203759e219665a252eb677aa6c0c8d40c
-
Filesize
569KB
MD5bfc94900426e464aac164c77d9ace847
SHA1382d2bad2066a94467657d3b47c74d7fc294e06a
SHA256d4670ba53d819e06fc5e8b8b4fa92cf40c86ea548c26cd2088716a5011609ad6
SHA5120a19ce0cf3e10a0d3a4119d80dab93833631b3894207ff429a8db6c39ff8c3b1cc400fa2a8d43a0a50868b1dffc73fd15ffb4b0a5e8fa189a3c0ab71149fd889
-
Filesize
569KB
MD5bfc94900426e464aac164c77d9ace847
SHA1382d2bad2066a94467657d3b47c74d7fc294e06a
SHA256d4670ba53d819e06fc5e8b8b4fa92cf40c86ea548c26cd2088716a5011609ad6
SHA5120a19ce0cf3e10a0d3a4119d80dab93833631b3894207ff429a8db6c39ff8c3b1cc400fa2a8d43a0a50868b1dffc73fd15ffb4b0a5e8fa189a3c0ab71149fd889
-
Filesize
11KB
MD59c7875bba80ab76652eaaf0707f6ce80
SHA1897298ea589484384bc2f10297952a680ef661b8
SHA25689c7e538387a4e94bdba09b321936c7325f5248d3dafe43fcb3568659345520f
SHA512ddb96a7eb9683aea7a1044c5be2b0374327c7b6740955d64f84a9dac9d410e3883b24b4b8d9ac981f9d6692aac7afc6d7fa8aeaffdb57d382d38827d19c17b8d
-
Filesize
11KB
MD59c7875bba80ab76652eaaf0707f6ce80
SHA1897298ea589484384bc2f10297952a680ef661b8
SHA25689c7e538387a4e94bdba09b321936c7325f5248d3dafe43fcb3568659345520f
SHA512ddb96a7eb9683aea7a1044c5be2b0374327c7b6740955d64f84a9dac9d410e3883b24b4b8d9ac981f9d6692aac7afc6d7fa8aeaffdb57d382d38827d19c17b8d
-
Filesize
588KB
MD533fa924859b2ab6ed1e27e5e4dd3ddf3
SHA1d189e6a61173edd853e5774cf01b36941b811f9e
SHA2567818db41accd0c666a5354719ca67a107c89453e59924a70a36b54ef8e72249b
SHA5125cf766ab9d73b984973ba627b622f25931e0ea2b8694a2ab4b473f34b74b242715876c7cea6a636f1ac66614c5402c1af4a6d432915deaf616c8fefa79173e81
-
Filesize
588KB
MD533fa924859b2ab6ed1e27e5e4dd3ddf3
SHA1d189e6a61173edd853e5774cf01b36941b811f9e
SHA2567818db41accd0c666a5354719ca67a107c89453e59924a70a36b54ef8e72249b
SHA5125cf766ab9d73b984973ba627b622f25931e0ea2b8694a2ab4b473f34b74b242715876c7cea6a636f1ac66614c5402c1af4a6d432915deaf616c8fefa79173e81
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1