Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:34
Static task
static1
General
-
Target
52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe
-
Size
1.2MB
-
MD5
263ccf00c8e94673c08ba6ef70074a65
-
SHA1
96b5dc529af36116521618eda31d091009675847
-
SHA256
52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec
-
SHA512
2b09ecc2474f4bf34b227a008ffa12680cb427903d389bb75d9a8013dedc553059fcd8fd1c66f338c4bd8408be65e1a3d56f94a921284d0d3aa8b19fe3917a6b
-
SSDEEP
24576:CyWwCxYfpDhn2bCRSafkA3wyGsZ3YLpW/SSZJORoUUv5LjCyaXCci4s9EUnD:pK2Dhn2nafBGvc/SSfGo5iXCx4Sn
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr536505.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr536505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr536505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr536505.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr536505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr536505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr536505.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
si632870.exeoneetx.exequ177615.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si632870.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu177615.exe -
Executes dropped EXE 10 IoCs
Processes:
un790355.exeun689196.exepr536505.exequ177615.exe1.exerk521670.exesi632870.exeoneetx.exeoneetx.exeoneetx.exepid process 1160 un790355.exe 1528 un689196.exe 5036 pr536505.exe 3304 qu177615.exe 2408 1.exe 2080 rk521670.exe 3140 si632870.exe 776 oneetx.exe 3372 oneetx.exe 2624 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4124 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr536505.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr536505.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr536505.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un689196.exe52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exeun790355.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un689196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un689196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un790355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un790355.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4672 5036 WerFault.exe pr536505.exe 4764 3304 WerFault.exe qu177615.exe 1132 3140 WerFault.exe si632870.exe 1620 3140 WerFault.exe si632870.exe 8 3140 WerFault.exe si632870.exe 1144 3140 WerFault.exe si632870.exe 4672 3140 WerFault.exe si632870.exe 1936 3140 WerFault.exe si632870.exe 3684 3140 WerFault.exe si632870.exe 1392 3140 WerFault.exe si632870.exe 3900 3140 WerFault.exe si632870.exe 1808 3140 WerFault.exe si632870.exe 4116 776 WerFault.exe oneetx.exe 3436 776 WerFault.exe oneetx.exe 4636 776 WerFault.exe oneetx.exe 628 776 WerFault.exe oneetx.exe 4884 776 WerFault.exe oneetx.exe 4528 776 WerFault.exe oneetx.exe 448 776 WerFault.exe oneetx.exe 3928 776 WerFault.exe oneetx.exe 4300 776 WerFault.exe oneetx.exe 2552 776 WerFault.exe oneetx.exe 5044 776 WerFault.exe oneetx.exe 3032 3372 WerFault.exe oneetx.exe 2288 3372 WerFault.exe oneetx.exe 4656 3372 WerFault.exe oneetx.exe 2124 776 WerFault.exe oneetx.exe 1880 776 WerFault.exe oneetx.exe 1936 776 WerFault.exe oneetx.exe 4720 776 WerFault.exe oneetx.exe 1184 2624 WerFault.exe oneetx.exe 1500 2624 WerFault.exe oneetx.exe 4756 2624 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr536505.exe1.exerk521670.exepid process 5036 pr536505.exe 5036 pr536505.exe 2408 1.exe 2080 rk521670.exe 2408 1.exe 2080 rk521670.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr536505.exequ177615.exe1.exerk521670.exedescription pid process Token: SeDebugPrivilege 5036 pr536505.exe Token: SeDebugPrivilege 3304 qu177615.exe Token: SeDebugPrivilege 2408 1.exe Token: SeDebugPrivilege 2080 rk521670.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si632870.exepid process 3140 si632870.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exeun790355.exeun689196.exequ177615.exesi632870.exeoneetx.exedescription pid process target process PID 4180 wrote to memory of 1160 4180 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe un790355.exe PID 4180 wrote to memory of 1160 4180 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe un790355.exe PID 4180 wrote to memory of 1160 4180 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe un790355.exe PID 1160 wrote to memory of 1528 1160 un790355.exe un689196.exe PID 1160 wrote to memory of 1528 1160 un790355.exe un689196.exe PID 1160 wrote to memory of 1528 1160 un790355.exe un689196.exe PID 1528 wrote to memory of 5036 1528 un689196.exe pr536505.exe PID 1528 wrote to memory of 5036 1528 un689196.exe pr536505.exe PID 1528 wrote to memory of 5036 1528 un689196.exe pr536505.exe PID 1528 wrote to memory of 3304 1528 un689196.exe qu177615.exe PID 1528 wrote to memory of 3304 1528 un689196.exe qu177615.exe PID 1528 wrote to memory of 3304 1528 un689196.exe qu177615.exe PID 3304 wrote to memory of 2408 3304 qu177615.exe 1.exe PID 3304 wrote to memory of 2408 3304 qu177615.exe 1.exe PID 3304 wrote to memory of 2408 3304 qu177615.exe 1.exe PID 1160 wrote to memory of 2080 1160 un790355.exe rk521670.exe PID 1160 wrote to memory of 2080 1160 un790355.exe rk521670.exe PID 1160 wrote to memory of 2080 1160 un790355.exe rk521670.exe PID 4180 wrote to memory of 3140 4180 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe si632870.exe PID 4180 wrote to memory of 3140 4180 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe si632870.exe PID 4180 wrote to memory of 3140 4180 52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe si632870.exe PID 3140 wrote to memory of 776 3140 si632870.exe oneetx.exe PID 3140 wrote to memory of 776 3140 si632870.exe oneetx.exe PID 3140 wrote to memory of 776 3140 si632870.exe oneetx.exe PID 776 wrote to memory of 2228 776 oneetx.exe schtasks.exe PID 776 wrote to memory of 2228 776 oneetx.exe schtasks.exe PID 776 wrote to memory of 2228 776 oneetx.exe schtasks.exe PID 776 wrote to memory of 4124 776 oneetx.exe rundll32.exe PID 776 wrote to memory of 4124 776 oneetx.exe rundll32.exe PID 776 wrote to memory of 4124 776 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe"C:\Users\Admin\AppData\Local\Temp\52d61e872bb50a3cf0ef15ca87b4d12258e01f560255b4bedf46bb403f2d25ec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790355.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790355.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un689196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un689196.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536505.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536505.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 10845⤵
- Program crash
PID:4672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu177615.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu177615.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 13885⤵
- Program crash
PID:4764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk521670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk521670.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si632870.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si632870.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7083⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7683⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8683⤵
- Program crash
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8123⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 9683⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 9843⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12283⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12603⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 13243⤵
- Program crash
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 6964⤵
- Program crash
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 8324⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 8964⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 10564⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 10644⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 11164⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 11244⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 9444⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 7844⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 6884⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 12924⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 11604⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 16284⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 15684⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 16364⤵
- Program crash
PID:4720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 13683⤵
- Program crash
PID:1808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5036 -ip 50361⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3304 -ip 33041⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3140 -ip 31401⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3140 -ip 31401⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3140 -ip 31401⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3140 -ip 31401⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3140 -ip 31401⤵PID:580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3140 -ip 31401⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3140 -ip 31401⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3140 -ip 31401⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3140 -ip 31401⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3140 -ip 31401⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 776 -ip 7761⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 776 -ip 7761⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 776 -ip 7761⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 776 -ip 7761⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 776 -ip 7761⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 776 -ip 7761⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 776 -ip 7761⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 776 -ip 7761⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 776 -ip 7761⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 776 -ip 7761⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 776 -ip 7761⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 3962⤵
- Program crash
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 4402⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 4402⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3372 -ip 33721⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3372 -ip 33721⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3372 -ip 33721⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 776 -ip 7761⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 776 -ip 7761⤵PID:580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 776 -ip 7761⤵PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 776 -ip 7761⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 3962⤵
- Program crash
PID:1184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 4642⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 5122⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 2624 -ip 26241⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 2624 -ip 26241⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2624 -ip 26241⤵PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
861KB
MD5ab3e33d6e0c4d12b5bf9226dbd7eb0a4
SHA14306362c54a8e555dc1eb7521b2ac2572b7fb02d
SHA256317721b5d6fb640dca62686dadf1897c948f1e6a50291ad3b2d38e6e5d740d8a
SHA512d936621229adfadbfc4189c8fe3efff36ee3aa21d1c0e16775b4cf9c9d647342092dbedfed690a68c3b7c3606165b8ec5b09db53b6d544f2b0bf668e8383d682
-
Filesize
861KB
MD5ab3e33d6e0c4d12b5bf9226dbd7eb0a4
SHA14306362c54a8e555dc1eb7521b2ac2572b7fb02d
SHA256317721b5d6fb640dca62686dadf1897c948f1e6a50291ad3b2d38e6e5d740d8a
SHA512d936621229adfadbfc4189c8fe3efff36ee3aa21d1c0e16775b4cf9c9d647342092dbedfed690a68c3b7c3606165b8ec5b09db53b6d544f2b0bf668e8383d682
-
Filesize
169KB
MD5a29da7fd36086f774c162c8cb573db4d
SHA1f0ba9793648b02386bfe1c0d6fa756f408eb964d
SHA256e1f485a8f4d8514818aa6257e2553dbe8430972d995d937922c9c7136a21fc26
SHA51298aee13be5afe9cd4b3c3ecbf8cb201b1f101499f7a06d2cc72c958cef81f2358ab5ef5ce33e03af78f49ee6f94ad468c8f5eebacea101296aa6b9bf62881e33
-
Filesize
169KB
MD5a29da7fd36086f774c162c8cb573db4d
SHA1f0ba9793648b02386bfe1c0d6fa756f408eb964d
SHA256e1f485a8f4d8514818aa6257e2553dbe8430972d995d937922c9c7136a21fc26
SHA51298aee13be5afe9cd4b3c3ecbf8cb201b1f101499f7a06d2cc72c958cef81f2358ab5ef5ce33e03af78f49ee6f94ad468c8f5eebacea101296aa6b9bf62881e33
-
Filesize
708KB
MD5938b20ab5cc806981eea49dc25f89e03
SHA1c6c83346c60219e80cb2328bc4dd99e37fa40333
SHA256eadf24dc9125b4c2c33e992a99acf82a2f6f0c32c2f6fdebdac742d8831a0b57
SHA512ced50d18aa44e0950fded7e3995d8f37bd5146f56d25c8701c4427c963c8b938ea506d8df272e3278f268984f30e7e8beef543201bdf7ccd537bafa6879d49ad
-
Filesize
708KB
MD5938b20ab5cc806981eea49dc25f89e03
SHA1c6c83346c60219e80cb2328bc4dd99e37fa40333
SHA256eadf24dc9125b4c2c33e992a99acf82a2f6f0c32c2f6fdebdac742d8831a0b57
SHA512ced50d18aa44e0950fded7e3995d8f37bd5146f56d25c8701c4427c963c8b938ea506d8df272e3278f268984f30e7e8beef543201bdf7ccd537bafa6879d49ad
-
Filesize
405KB
MD5630012e01ec7636a9456058bdd84ea48
SHA192cc02166a9709e2d909e7380b6e1dc6832f23f4
SHA256674c1d457f4214a16b4f7d802a88e3f41a484119b78ad4261c631b5426e9848f
SHA51245865e70d29398e1f8fd8af9a20f44d9323d28df816bd82cd7eadecf626cae095ec2a3e0f7c45bed604990e925fc4b3b2dcd0e5a0d980ff5451f85baa2f5e8c6
-
Filesize
405KB
MD5630012e01ec7636a9456058bdd84ea48
SHA192cc02166a9709e2d909e7380b6e1dc6832f23f4
SHA256674c1d457f4214a16b4f7d802a88e3f41a484119b78ad4261c631b5426e9848f
SHA51245865e70d29398e1f8fd8af9a20f44d9323d28df816bd82cd7eadecf626cae095ec2a3e0f7c45bed604990e925fc4b3b2dcd0e5a0d980ff5451f85baa2f5e8c6
-
Filesize
588KB
MD521562c756392257e524a1bcd194f1a3c
SHA15b5a849eaf6929e5784b47a4b42bda50020adad9
SHA25694a67601ec6493d656b87271b7f5cab9075d1b95cdebac9a1a32581ac6a4f571
SHA5122ea6de5584790c3459fc382839193c9d1dc4a0198a27b9be88e325f55ad6c14abbc2c901a3b49beaa2d2c5f14082058c960a9dd6ddd8f3118fccf306a00c1b5f
-
Filesize
588KB
MD521562c756392257e524a1bcd194f1a3c
SHA15b5a849eaf6929e5784b47a4b42bda50020adad9
SHA25694a67601ec6493d656b87271b7f5cab9075d1b95cdebac9a1a32581ac6a4f571
SHA5122ea6de5584790c3459fc382839193c9d1dc4a0198a27b9be88e325f55ad6c14abbc2c901a3b49beaa2d2c5f14082058c960a9dd6ddd8f3118fccf306a00c1b5f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1