Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:28
Static task
static1
General
-
Target
0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe
-
Size
1.0MB
-
MD5
e7c2cfd03c449e89d82a93e372628f83
-
SHA1
df732140ce6c74a6e74af5b8cd6ca9f3f4cce6ba
-
SHA256
0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae
-
SHA512
d9926a394b52f56ecc9962882be3f2d1e289c181c4d3b84533f3cf19e2c5c6ac257bbedfe6ef3fc66f713e2e798df5d82fa499cb3f2446c7061d963537ac7d62
-
SSDEEP
24576:7yFRhBWj+yJbkBHD9+JpIEb+nFaxGQZA03CKtJFlG3wRGT:u2+yJ8HD8RP20SK/nG3
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it667655.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it667655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it667655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it667655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it667655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it667655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it667655.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr402368.exelr999672.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr402368.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr999672.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziNv3244.exezicU6614.exeit667655.exejr402368.exe1.exekp675328.exelr999672.exeoneetx.exeoneetx.exeoneetx.exepid process 1184 ziNv3244.exe 636 zicU6614.exe 2452 it667655.exe 4824 jr402368.exe 3228 1.exe 520 kp675328.exe 4852 lr999672.exe 2600 oneetx.exe 920 oneetx.exe 3312 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3108 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it667655.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it667655.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziNv3244.exezicU6614.exe0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNv3244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNv3244.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zicU6614.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zicU6614.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3384 4824 WerFault.exe jr402368.exe 4032 4852 WerFault.exe lr999672.exe 3980 4852 WerFault.exe lr999672.exe 2456 4852 WerFault.exe lr999672.exe 624 4852 WerFault.exe lr999672.exe 2772 4852 WerFault.exe lr999672.exe 1528 4852 WerFault.exe lr999672.exe 4296 4852 WerFault.exe lr999672.exe 4156 4852 WerFault.exe lr999672.exe 4600 4852 WerFault.exe lr999672.exe 2272 4852 WerFault.exe lr999672.exe 4996 2600 WerFault.exe oneetx.exe 3156 2600 WerFault.exe oneetx.exe 396 2600 WerFault.exe oneetx.exe 3128 2600 WerFault.exe oneetx.exe 4680 2600 WerFault.exe oneetx.exe 1128 2600 WerFault.exe oneetx.exe 3480 2600 WerFault.exe oneetx.exe 1856 2600 WerFault.exe oneetx.exe 4964 2600 WerFault.exe oneetx.exe 884 2600 WerFault.exe oneetx.exe 3612 2600 WerFault.exe oneetx.exe 3644 2600 WerFault.exe oneetx.exe 368 920 WerFault.exe oneetx.exe 3404 920 WerFault.exe oneetx.exe 2192 920 WerFault.exe oneetx.exe 2004 2600 WerFault.exe oneetx.exe 4616 2600 WerFault.exe oneetx.exe 996 2600 WerFault.exe oneetx.exe 2452 3312 WerFault.exe oneetx.exe 4440 3312 WerFault.exe oneetx.exe 1708 3312 WerFault.exe oneetx.exe 4948 2600 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it667655.exe1.exekp675328.exepid process 2452 it667655.exe 2452 it667655.exe 3228 1.exe 520 kp675328.exe 3228 1.exe 520 kp675328.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it667655.exejr402368.exe1.exekp675328.exedescription pid process Token: SeDebugPrivilege 2452 it667655.exe Token: SeDebugPrivilege 4824 jr402368.exe Token: SeDebugPrivilege 3228 1.exe Token: SeDebugPrivilege 520 kp675328.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr999672.exepid process 4852 lr999672.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exeziNv3244.exezicU6614.exejr402368.exelr999672.exeoneetx.exedescription pid process target process PID 4280 wrote to memory of 1184 4280 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe ziNv3244.exe PID 4280 wrote to memory of 1184 4280 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe ziNv3244.exe PID 4280 wrote to memory of 1184 4280 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe ziNv3244.exe PID 1184 wrote to memory of 636 1184 ziNv3244.exe zicU6614.exe PID 1184 wrote to memory of 636 1184 ziNv3244.exe zicU6614.exe PID 1184 wrote to memory of 636 1184 ziNv3244.exe zicU6614.exe PID 636 wrote to memory of 2452 636 zicU6614.exe it667655.exe PID 636 wrote to memory of 2452 636 zicU6614.exe it667655.exe PID 636 wrote to memory of 4824 636 zicU6614.exe jr402368.exe PID 636 wrote to memory of 4824 636 zicU6614.exe jr402368.exe PID 636 wrote to memory of 4824 636 zicU6614.exe jr402368.exe PID 4824 wrote to memory of 3228 4824 jr402368.exe 1.exe PID 4824 wrote to memory of 3228 4824 jr402368.exe 1.exe PID 4824 wrote to memory of 3228 4824 jr402368.exe 1.exe PID 1184 wrote to memory of 520 1184 ziNv3244.exe kp675328.exe PID 1184 wrote to memory of 520 1184 ziNv3244.exe kp675328.exe PID 1184 wrote to memory of 520 1184 ziNv3244.exe kp675328.exe PID 4280 wrote to memory of 4852 4280 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe lr999672.exe PID 4280 wrote to memory of 4852 4280 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe lr999672.exe PID 4280 wrote to memory of 4852 4280 0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe lr999672.exe PID 4852 wrote to memory of 2600 4852 lr999672.exe oneetx.exe PID 4852 wrote to memory of 2600 4852 lr999672.exe oneetx.exe PID 4852 wrote to memory of 2600 4852 lr999672.exe oneetx.exe PID 2600 wrote to memory of 3652 2600 oneetx.exe schtasks.exe PID 2600 wrote to memory of 3652 2600 oneetx.exe schtasks.exe PID 2600 wrote to memory of 3652 2600 oneetx.exe schtasks.exe PID 2600 wrote to memory of 3108 2600 oneetx.exe rundll32.exe PID 2600 wrote to memory of 3108 2600 oneetx.exe rundll32.exe PID 2600 wrote to memory of 3108 2600 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe"C:\Users\Admin\AppData\Local\Temp\0a4e3b40c038522b687d11f4e516b669a89604436f43303af07d4d58d2678dae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNv3244.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNv3244.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicU6614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicU6614.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it667655.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it667655.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr402368.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr402368.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 13845⤵
- Program crash
PID:3384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp675328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp675328.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr999672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr999672.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 7003⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 7563⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 8603⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 9563⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 8603⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 8603⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 12203⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 12723⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 13203⤵
- Program crash
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 6964⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 8404⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 9004⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10564⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10964⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10964⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10924⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10044⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 8364⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 12684⤵
- Program crash
PID:884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 7684⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 14364⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 11164⤵
- Program crash
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 16284⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 15924⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 16444⤵
- Program crash
PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 13443⤵
- Program crash
PID:2272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4824 -ip 48241⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4852 -ip 48521⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4852 -ip 48521⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4852 -ip 48521⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4852 -ip 48521⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4852 -ip 48521⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4852 -ip 48521⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4852 -ip 48521⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4852 -ip 48521⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4852 -ip 48521⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4852 -ip 48521⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2600 -ip 26001⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2600 -ip 26001⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2600 -ip 26001⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2600 -ip 26001⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2600 -ip 26001⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2600 -ip 26001⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2600 -ip 26001⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2600 -ip 26001⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2600 -ip 26001⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2600 -ip 26001⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2600 -ip 26001⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2600 -ip 26001⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 3962⤵
- Program crash
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 4402⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 5122⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 920 -ip 9201⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 920 -ip 9201⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 920 -ip 9201⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2600 -ip 26001⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2600 -ip 26001⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2600 -ip 26001⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 3962⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 4402⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 4402⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3312 -ip 33121⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3312 -ip 33121⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3312 -ip 33121⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2600 -ip 26001⤵PID:3620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD574565f4d4e1fb9b023b00e84b2d8508d
SHA1bcf40fa0b26ffcfa18bfc3941e9a5ca39eabe00f
SHA2561503331f751f2bf4db6c4de32e41b5e7462c2816336886c22594219e4bf75cfc
SHA512971ea109a2d069c8a0e3e25f24abea3ac0a4feb132a50f199e8b1a7a47d7ba2e3dbb84ee5323e92aefc512371a14e9423fb97c2d0dfec638bf1424e3e0da13ba
-
Filesize
723KB
MD574565f4d4e1fb9b023b00e84b2d8508d
SHA1bcf40fa0b26ffcfa18bfc3941e9a5ca39eabe00f
SHA2561503331f751f2bf4db6c4de32e41b5e7462c2816336886c22594219e4bf75cfc
SHA512971ea109a2d069c8a0e3e25f24abea3ac0a4feb132a50f199e8b1a7a47d7ba2e3dbb84ee5323e92aefc512371a14e9423fb97c2d0dfec638bf1424e3e0da13ba
-
Filesize
169KB
MD59cf38eec41a99cb0e1b701893eb2395d
SHA1fe406ac9c33005acaa50fb25e1d29f67cb7e9050
SHA2561f0a0392095887c842e924dd185ce0a00d2d4b88db067adf0cf1b1938c85d1f3
SHA512ae780729e429133c4184dd7412c21a7ac16660d1f33dab830d8421c6a0159f9940f835317eaeec8355afa0749390adc7830ea1c3fdc1f03511e64244ebe9a151
-
Filesize
169KB
MD59cf38eec41a99cb0e1b701893eb2395d
SHA1fe406ac9c33005acaa50fb25e1d29f67cb7e9050
SHA2561f0a0392095887c842e924dd185ce0a00d2d4b88db067adf0cf1b1938c85d1f3
SHA512ae780729e429133c4184dd7412c21a7ac16660d1f33dab830d8421c6a0159f9940f835317eaeec8355afa0749390adc7830ea1c3fdc1f03511e64244ebe9a151
-
Filesize
569KB
MD55d5d2f5391cb1f5e8ca93e09820d5b63
SHA14c8c1e452a41c0362d0bd2eff5a905eacea63907
SHA256db519bb2c183699e8bbaad256e34eb3fa6a5fe0e3802954143442f533c31509f
SHA512bb2d8eb21676db831097cc68796ff7dff75025bbb22e421d765a1a12d18272fcc90b4da8b3e1b84cc9cbdb21ff40e112285daa1a6703e29086c49781d5b8b4fc
-
Filesize
569KB
MD55d5d2f5391cb1f5e8ca93e09820d5b63
SHA14c8c1e452a41c0362d0bd2eff5a905eacea63907
SHA256db519bb2c183699e8bbaad256e34eb3fa6a5fe0e3802954143442f533c31509f
SHA512bb2d8eb21676db831097cc68796ff7dff75025bbb22e421d765a1a12d18272fcc90b4da8b3e1b84cc9cbdb21ff40e112285daa1a6703e29086c49781d5b8b4fc
-
Filesize
11KB
MD5c1ff8564f84dd52872f813fa244586ae
SHA13d63a44b92ce9c60259ec55470badeefef7655b2
SHA256755b410e66e33f5c07de52150c0eb9bd0e165a5cc3830bc83945bcf00dbed91c
SHA512ebbb1b3a67bb4efb2555cfaf19d46a4816bd7c326c2ad56c4f45921d234d483afc010cc26f54891732a5654e5a2587671317443baa565e276a4e34f830e0836f
-
Filesize
11KB
MD5c1ff8564f84dd52872f813fa244586ae
SHA13d63a44b92ce9c60259ec55470badeefef7655b2
SHA256755b410e66e33f5c07de52150c0eb9bd0e165a5cc3830bc83945bcf00dbed91c
SHA512ebbb1b3a67bb4efb2555cfaf19d46a4816bd7c326c2ad56c4f45921d234d483afc010cc26f54891732a5654e5a2587671317443baa565e276a4e34f830e0836f
-
Filesize
588KB
MD5198f7971bfe9b0cd91e9bcb5d453af8d
SHA11b38001f66738f91f280e6c9bc2ca4ccb3b3829b
SHA256a950ad2a8eecab3641aa285d6e65904faa73525af562e2e0819108cd55987878
SHA51226333e6d5684cf5855ee90c166a0d4353d9ea06091a1ce51c61fa1512e8e680d9a153f77b390751a89292a66e0031d685edf453b7a9a03870ddd5d3c123b9654
-
Filesize
588KB
MD5198f7971bfe9b0cd91e9bcb5d453af8d
SHA11b38001f66738f91f280e6c9bc2ca4ccb3b3829b
SHA256a950ad2a8eecab3641aa285d6e65904faa73525af562e2e0819108cd55987878
SHA51226333e6d5684cf5855ee90c166a0d4353d9ea06091a1ce51c61fa1512e8e680d9a153f77b390751a89292a66e0031d685edf453b7a9a03870ddd5d3c123b9654
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1