Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:31
Static task
static1
General
-
Target
109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe
-
Size
1.2MB
-
MD5
0d9f25191000f0b6e345488081de0500
-
SHA1
f46a20f2907c8e7ec5988d7402c8b717b3d1efb7
-
SHA256
109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45
-
SHA512
e2997362a6fd57473341cc5d452c5fe9b85d5626ea67b121d5ab55e107c3d108302e41bd3cb129149b1bde4769a4e08b4277853257e39b59210d62c3c3838659
-
SSDEEP
24576:ZyQrHp6j+kWquEvvHFWdbM2dEn7IY0SNsYSZJhTINwPQFedaBHUDv:MuHGAwgRM2dT6sYSf1INw0B
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr842262.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr842262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr842262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr842262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr842262.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr842262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr842262.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu146217.exesi797033.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu146217.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si797033.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un301587.exeun334984.exepr842262.exequ146217.exe1.exerk496577.exesi797033.exeoneetx.exeoneetx.exeoneetx.exepid process 2452 un301587.exe 4632 un334984.exe 704 pr842262.exe 5044 qu146217.exe 3652 1.exe 968 rk496577.exe 5020 si797033.exe 5056 oneetx.exe 1344 oneetx.exe 540 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr842262.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr842262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr842262.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exeun301587.exeun334984.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un301587.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un301587.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un334984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un334984.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4572 704 WerFault.exe pr842262.exe 1060 5044 WerFault.exe qu146217.exe 3192 5020 WerFault.exe si797033.exe 244 5020 WerFault.exe si797033.exe 1172 5020 WerFault.exe si797033.exe 4656 5020 WerFault.exe si797033.exe 4680 5020 WerFault.exe si797033.exe 3696 5020 WerFault.exe si797033.exe 4060 5020 WerFault.exe si797033.exe 5016 5020 WerFault.exe si797033.exe 3820 5020 WerFault.exe si797033.exe 460 5020 WerFault.exe si797033.exe 532 5056 WerFault.exe oneetx.exe 1648 5056 WerFault.exe oneetx.exe 620 5056 WerFault.exe oneetx.exe 760 5056 WerFault.exe oneetx.exe 1012 5056 WerFault.exe oneetx.exe 4892 5056 WerFault.exe oneetx.exe 4740 5056 WerFault.exe oneetx.exe 3668 5056 WerFault.exe oneetx.exe 4444 5056 WerFault.exe oneetx.exe 2720 5056 WerFault.exe oneetx.exe 2704 5056 WerFault.exe oneetx.exe 3136 5056 WerFault.exe oneetx.exe 548 5056 WerFault.exe oneetx.exe 1888 1344 WerFault.exe oneetx.exe 1292 1344 WerFault.exe oneetx.exe 3812 1344 WerFault.exe oneetx.exe 3532 5056 WerFault.exe oneetx.exe 2644 5056 WerFault.exe oneetx.exe 1244 5056 WerFault.exe oneetx.exe 1036 540 WerFault.exe oneetx.exe 1452 540 WerFault.exe oneetx.exe 1388 540 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr842262.exerk496577.exe1.exepid process 704 pr842262.exe 704 pr842262.exe 968 rk496577.exe 3652 1.exe 3652 1.exe 968 rk496577.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr842262.exequ146217.exerk496577.exe1.exedescription pid process Token: SeDebugPrivilege 704 pr842262.exe Token: SeDebugPrivilege 5044 qu146217.exe Token: SeDebugPrivilege 968 rk496577.exe Token: SeDebugPrivilege 3652 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si797033.exepid process 5020 si797033.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exeun301587.exeun334984.exequ146217.exesi797033.exeoneetx.exedescription pid process target process PID 1752 wrote to memory of 2452 1752 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe un301587.exe PID 1752 wrote to memory of 2452 1752 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe un301587.exe PID 1752 wrote to memory of 2452 1752 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe un301587.exe PID 2452 wrote to memory of 4632 2452 un301587.exe un334984.exe PID 2452 wrote to memory of 4632 2452 un301587.exe un334984.exe PID 2452 wrote to memory of 4632 2452 un301587.exe un334984.exe PID 4632 wrote to memory of 704 4632 un334984.exe pr842262.exe PID 4632 wrote to memory of 704 4632 un334984.exe pr842262.exe PID 4632 wrote to memory of 704 4632 un334984.exe pr842262.exe PID 4632 wrote to memory of 5044 4632 un334984.exe qu146217.exe PID 4632 wrote to memory of 5044 4632 un334984.exe qu146217.exe PID 4632 wrote to memory of 5044 4632 un334984.exe qu146217.exe PID 5044 wrote to memory of 3652 5044 qu146217.exe 1.exe PID 5044 wrote to memory of 3652 5044 qu146217.exe 1.exe PID 5044 wrote to memory of 3652 5044 qu146217.exe 1.exe PID 2452 wrote to memory of 968 2452 un301587.exe rk496577.exe PID 2452 wrote to memory of 968 2452 un301587.exe rk496577.exe PID 2452 wrote to memory of 968 2452 un301587.exe rk496577.exe PID 1752 wrote to memory of 5020 1752 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe si797033.exe PID 1752 wrote to memory of 5020 1752 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe si797033.exe PID 1752 wrote to memory of 5020 1752 109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe si797033.exe PID 5020 wrote to memory of 5056 5020 si797033.exe oneetx.exe PID 5020 wrote to memory of 5056 5020 si797033.exe oneetx.exe PID 5020 wrote to memory of 5056 5020 si797033.exe oneetx.exe PID 5056 wrote to memory of 2264 5056 oneetx.exe schtasks.exe PID 5056 wrote to memory of 2264 5056 oneetx.exe schtasks.exe PID 5056 wrote to memory of 2264 5056 oneetx.exe schtasks.exe PID 5056 wrote to memory of 4368 5056 oneetx.exe rundll32.exe PID 5056 wrote to memory of 4368 5056 oneetx.exe rundll32.exe PID 5056 wrote to memory of 4368 5056 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe"C:\Users\Admin\AppData\Local\Temp\109220a1498f6f7192582ca290f7142b3d79ed1b86660594883589413579ce45.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301587.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301587.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un334984.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un334984.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr842262.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr842262.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 10885⤵
- Program crash
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu146217.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu146217.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 13725⤵
- Program crash
PID:1060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk496577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk496577.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797033.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 7043⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 7563⤵
- Program crash
PID:244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 8723⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 9723⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 9923⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 8883⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 12203⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 12083⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 13163⤵
- Program crash
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 6964⤵
- Program crash
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 8884⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10164⤵
- Program crash
PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10284⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 11164⤵
- Program crash
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10284⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 11524⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10044⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 6884⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 13084⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 7604⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 14684⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 8924⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 16444⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 11044⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 16524⤵
- Program crash
PID:1244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 14363⤵
- Program crash
PID:460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 704 -ip 7041⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5044 -ip 50441⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5020 -ip 50201⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5020 -ip 50201⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5020 -ip 50201⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5020 -ip 50201⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5020 -ip 50201⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5020 -ip 50201⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5020 -ip 50201⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5020 -ip 50201⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5020 -ip 50201⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5020 -ip 50201⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5056 -ip 50561⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5056 -ip 50561⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5056 -ip 50561⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5056 -ip 50561⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5056 -ip 50561⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5056 -ip 50561⤵PID:1200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5056 -ip 50561⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5056 -ip 50561⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5056 -ip 50561⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5056 -ip 50561⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5056 -ip 50561⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5056 -ip 50561⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5056 -ip 50561⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 3962⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4402⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4402⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1344 -ip 13441⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1344 -ip 13441⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1344 -ip 13441⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5056 -ip 50561⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5056 -ip 50561⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5056 -ip 50561⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 3962⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 4442⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 4642⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 540 -ip 5401⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 540 -ip 5401⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 540 -ip 5401⤵PID:4104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
863KB
MD502dda400d48c47bd8bcbe7e28b7c7e54
SHA1aa6143094356844609d40d3c391a057f6a541300
SHA256a4ce6bf805101409b68dba9e24a959caba6b3f8f10692269477ffc7a92bb192c
SHA512af983084fb3c126732ea8aad6756e386026a15fa6ca2ee70bfcfe47aded6891bd59a752dd3db6e13c4296184b0519c2b5df4df64a5d7b5d6d145377bd8c65797
-
Filesize
863KB
MD502dda400d48c47bd8bcbe7e28b7c7e54
SHA1aa6143094356844609d40d3c391a057f6a541300
SHA256a4ce6bf805101409b68dba9e24a959caba6b3f8f10692269477ffc7a92bb192c
SHA512af983084fb3c126732ea8aad6756e386026a15fa6ca2ee70bfcfe47aded6891bd59a752dd3db6e13c4296184b0519c2b5df4df64a5d7b5d6d145377bd8c65797
-
Filesize
169KB
MD585c986bab775bf464c83d29a1016f696
SHA11de757db68fa5e034c6a0a8adfb67f97a3bab8d7
SHA2560bcb1e813bb33f2b431982c03691dfe835b05a163838316e484cf219f12eeb56
SHA51248d81a9f631a9e8b32fd084e3dd3a234fc8adc8301ccc9e73e61a2492b9703a0fae6334b884c0e9c0909eeef604f0ca3d10efd9f2b854363f707630502122c4e
-
Filesize
169KB
MD585c986bab775bf464c83d29a1016f696
SHA11de757db68fa5e034c6a0a8adfb67f97a3bab8d7
SHA2560bcb1e813bb33f2b431982c03691dfe835b05a163838316e484cf219f12eeb56
SHA51248d81a9f631a9e8b32fd084e3dd3a234fc8adc8301ccc9e73e61a2492b9703a0fae6334b884c0e9c0909eeef604f0ca3d10efd9f2b854363f707630502122c4e
-
Filesize
709KB
MD5e765c201f224028a5d53e209401ef626
SHA1f363fb9006cad477330dccd3db951f0e2600ab5d
SHA256471d7c4e0f4f93e5dc6c9fed19dbfe070eb733bf17f754d2cb3bb97934af8246
SHA512f70a8675d1a9ec84897acc128430cb582fe8a85da3b58423565ce3532a0ec74387083e1baa45ffd9e5ffe81543e95d28fc904daa8c4aa3cc0689f9dd9e3e86a8
-
Filesize
709KB
MD5e765c201f224028a5d53e209401ef626
SHA1f363fb9006cad477330dccd3db951f0e2600ab5d
SHA256471d7c4e0f4f93e5dc6c9fed19dbfe070eb733bf17f754d2cb3bb97934af8246
SHA512f70a8675d1a9ec84897acc128430cb582fe8a85da3b58423565ce3532a0ec74387083e1baa45ffd9e5ffe81543e95d28fc904daa8c4aa3cc0689f9dd9e3e86a8
-
Filesize
405KB
MD50aabf1f56361327db7e9d75b7a6ba1cb
SHA119a56314f25ea749d32df8572ccf83d6995dfeda
SHA256ce00cc1e37e2b2762cba17587b4b32741c11fc2c1881c117a53def83980c0b1f
SHA5121b88f4f044bdccf35dd8aef38c8ab19fbec03f6f7d2b54e8a43527bdf4fb268461a45e122f19463fccf21ee5760f2586f2cb1acd17e3a452a717a999f5542955
-
Filesize
405KB
MD50aabf1f56361327db7e9d75b7a6ba1cb
SHA119a56314f25ea749d32df8572ccf83d6995dfeda
SHA256ce00cc1e37e2b2762cba17587b4b32741c11fc2c1881c117a53def83980c0b1f
SHA5121b88f4f044bdccf35dd8aef38c8ab19fbec03f6f7d2b54e8a43527bdf4fb268461a45e122f19463fccf21ee5760f2586f2cb1acd17e3a452a717a999f5542955
-
Filesize
588KB
MD56784a2598b93e1cd764cc4782a355684
SHA1618af77de8f2c32bf5cb8dc86d10f9521a542e2e
SHA2564776f6d4558b3a0734135331170548d4210c2b1f33ea8ae178add5d1be86ba27
SHA5128ceefb73055245b824dad35971856c0d3bf3f14cf7b85627ca4e12c709b8e4ae2fd33a2295a3f8b5f5d1800c1c235b9996589b1fc201100807c427028ee2d5a1
-
Filesize
588KB
MD56784a2598b93e1cd764cc4782a355684
SHA1618af77de8f2c32bf5cb8dc86d10f9521a542e2e
SHA2564776f6d4558b3a0734135331170548d4210c2b1f33ea8ae178add5d1be86ba27
SHA5128ceefb73055245b824dad35971856c0d3bf3f14cf7b85627ca4e12c709b8e4ae2fd33a2295a3f8b5f5d1800c1c235b9996589b1fc201100807c427028ee2d5a1
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1