Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2023, 04:44
Static task
static1
General
-
Target
f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe
-
Size
1.0MB
-
MD5
a6560e0da35cf49660b886faffbacbe9
-
SHA1
b99edb1236af41fb6b2e87642582240ff67c6305
-
SHA256
f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61
-
SHA512
d67aee61dee5dc8beda8c3228591f2257e5c0ac497cc4c6a9015d325e871ad99aa44196d01b2955ab85c247da250b5e53248856862a0af7f69d65056c180fac7
-
SSDEEP
24576:wyX830N2ISEtSIbLOzBEFrPX6DTS8JjRbisiLV7O/6XE69j:3X830NWCSIjKDTS8dbwLFO/r6
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it234145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it234145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it234145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it234145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it234145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it234145.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation jr775293.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lr512530.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 4976 ziyt1427.exe 1688 ziIc6731.exe 1976 it234145.exe 3952 jr775293.exe 3696 1.exe 2728 kp335301.exe 4424 lr512530.exe 4224 oneetx.exe 2252 oneetx.exe 4336 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1268 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it234145.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyt1427.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyt1427.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziIc6731.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziIc6731.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
pid pid_target Process procid_target 2756 3952 WerFault.exe 94 2252 4424 WerFault.exe 101 5032 4424 WerFault.exe 101 4360 4424 WerFault.exe 101 5072 4424 WerFault.exe 101 3784 4424 WerFault.exe 101 840 4424 WerFault.exe 101 1088 4424 WerFault.exe 101 2552 4424 WerFault.exe 101 3080 4424 WerFault.exe 101 3796 4424 WerFault.exe 101 3896 4224 WerFault.exe 120 3756 4224 WerFault.exe 120 4816 4224 WerFault.exe 120 4780 4224 WerFault.exe 120 528 4224 WerFault.exe 120 2468 4224 WerFault.exe 120 1888 4224 WerFault.exe 120 5036 4224 WerFault.exe 120 3420 4224 WerFault.exe 120 2748 4224 WerFault.exe 120 2300 4224 WerFault.exe 120 4592 4224 WerFault.exe 120 4624 4224 WerFault.exe 120 5032 2252 WerFault.exe 151 4360 2252 WerFault.exe 151 1828 2252 WerFault.exe 151 1980 4224 WerFault.exe 120 3452 4224 WerFault.exe 120 1792 4224 WerFault.exe 120 2044 4336 WerFault.exe 165 676 4336 WerFault.exe 165 2488 4336 WerFault.exe 165 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1976 it234145.exe 1976 it234145.exe 3696 1.exe 2728 kp335301.exe 2728 kp335301.exe 3696 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1976 it234145.exe Token: SeDebugPrivilege 3952 jr775293.exe Token: SeDebugPrivilege 3696 1.exe Token: SeDebugPrivilege 2728 kp335301.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4424 lr512530.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4976 1092 f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe 85 PID 1092 wrote to memory of 4976 1092 f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe 85 PID 1092 wrote to memory of 4976 1092 f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe 85 PID 4976 wrote to memory of 1688 4976 ziyt1427.exe 86 PID 4976 wrote to memory of 1688 4976 ziyt1427.exe 86 PID 4976 wrote to memory of 1688 4976 ziyt1427.exe 86 PID 1688 wrote to memory of 1976 1688 ziIc6731.exe 87 PID 1688 wrote to memory of 1976 1688 ziIc6731.exe 87 PID 1688 wrote to memory of 3952 1688 ziIc6731.exe 94 PID 1688 wrote to memory of 3952 1688 ziIc6731.exe 94 PID 1688 wrote to memory of 3952 1688 ziIc6731.exe 94 PID 3952 wrote to memory of 3696 3952 jr775293.exe 96 PID 3952 wrote to memory of 3696 3952 jr775293.exe 96 PID 3952 wrote to memory of 3696 3952 jr775293.exe 96 PID 4976 wrote to memory of 2728 4976 ziyt1427.exe 99 PID 4976 wrote to memory of 2728 4976 ziyt1427.exe 99 PID 4976 wrote to memory of 2728 4976 ziyt1427.exe 99 PID 1092 wrote to memory of 4424 1092 f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe 101 PID 1092 wrote to memory of 4424 1092 f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe 101 PID 1092 wrote to memory of 4424 1092 f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe 101 PID 4424 wrote to memory of 4224 4424 lr512530.exe 120 PID 4424 wrote to memory of 4224 4424 lr512530.exe 120 PID 4424 wrote to memory of 4224 4424 lr512530.exe 120 PID 4224 wrote to memory of 3084 4224 oneetx.exe 139 PID 4224 wrote to memory of 3084 4224 oneetx.exe 139 PID 4224 wrote to memory of 3084 4224 oneetx.exe 139 PID 4224 wrote to memory of 1268 4224 oneetx.exe 160 PID 4224 wrote to memory of 1268 4224 oneetx.exe 160 PID 4224 wrote to memory of 1268 4224 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe"C:\Users\Admin\AppData\Local\Temp\f5aff43bc2b3f362de1e98f4af746e4a5e2e79910064a847bc08077a19db5b61.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyt1427.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyt1427.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIc6731.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIc6731.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it234145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it234145.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr775293.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr775293.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 13845⤵
- Program crash
PID:2756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp335301.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp335301.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512530.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 7003⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 7243⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 8603⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 9763⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 9803⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 9803⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 12163⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 12483⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 13043⤵
- Program crash
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 6964⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 9444⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 10764⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 10844⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 10964⤵
- Program crash
PID:528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 11244⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 11404⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 11484⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 10164⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 7564⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 8764⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 7804⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 11324⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 16204⤵
- Program crash
PID:1980
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 11524⤵
- Program crash
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 16364⤵
- Program crash
PID:1792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 14123⤵
- Program crash
PID:3796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3952 -ip 39521⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4424 -ip 44241⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4424 -ip 44241⤵PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4424 -ip 44241⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4424 -ip 44241⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4424 -ip 44241⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4424 -ip 44241⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4424 -ip 44241⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4424 -ip 44241⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4424 -ip 44241⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4424 -ip 44241⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4224 -ip 42241⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4224 -ip 42241⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4224 -ip 42241⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4224 -ip 42241⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4224 -ip 42241⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4224 -ip 42241⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4224 -ip 42241⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4224 -ip 42241⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4224 -ip 42241⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4224 -ip 42241⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4224 -ip 42241⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4224 -ip 42241⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4224 -ip 42241⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 3962⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 4402⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 4402⤵
- Program crash
PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2252 -ip 22521⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2252 -ip 22521⤵PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2252 -ip 22521⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4224 -ip 42241⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4224 -ip 42241⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4224 -ip 42241⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 3962⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 4402⤵
- Program crash
PID:676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 4402⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4336 -ip 43361⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4336 -ip 43361⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4336 -ip 43361⤵PID:2640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD51dfb674d952998e5b5e10ea987af4f28
SHA1fb93b7189c9acd890819db8083394e90f666f4d2
SHA256cf82a1e263a878351791480d07c2b35d2ac5e5ed273a91052f19c74f46d7df04
SHA51242e8dd3c9e771d2f528e9d35d1132c490711252d234b223ba372eb0356198b9250ee0553dadcbd10c5c4d5fa08231c7d7fa91cddcd39132b9997e12300c7e94e
-
Filesize
723KB
MD51dfb674d952998e5b5e10ea987af4f28
SHA1fb93b7189c9acd890819db8083394e90f666f4d2
SHA256cf82a1e263a878351791480d07c2b35d2ac5e5ed273a91052f19c74f46d7df04
SHA51242e8dd3c9e771d2f528e9d35d1132c490711252d234b223ba372eb0356198b9250ee0553dadcbd10c5c4d5fa08231c7d7fa91cddcd39132b9997e12300c7e94e
-
Filesize
169KB
MD55dc5cb42df548fbb59e48792a0aa4dda
SHA1f239b1a6521609ff7b3294d61307fa52a7935103
SHA2560feffc9fd9e5713c8190f243fd29febd311782f291ab59ea4d9084999f9a9c68
SHA5127499b096a149fb7be87a9b8d2f592624268c9bc29011bf561c1c0f64dd35ae68c3c3740f23aa55fb70c008a29809fc32042cce9eac561ea2afe5083d6448cb07
-
Filesize
169KB
MD55dc5cb42df548fbb59e48792a0aa4dda
SHA1f239b1a6521609ff7b3294d61307fa52a7935103
SHA2560feffc9fd9e5713c8190f243fd29febd311782f291ab59ea4d9084999f9a9c68
SHA5127499b096a149fb7be87a9b8d2f592624268c9bc29011bf561c1c0f64dd35ae68c3c3740f23aa55fb70c008a29809fc32042cce9eac561ea2afe5083d6448cb07
-
Filesize
569KB
MD5d323244bdbf1cd987ac9b075034b90de
SHA1880cfc11f4931f824ca85194b86da6ee78532663
SHA25668da480f708af9c78406ca71b51aa2232a67032c96ca6ea5d43e9b429561398c
SHA512fd114701daaf8e77f3155546ac1093e72813e57986512428af90680fd5c233180b5b8223802bc3c9192579b2aef80dade62db25b74601f76576a61b5e2954a23
-
Filesize
569KB
MD5d323244bdbf1cd987ac9b075034b90de
SHA1880cfc11f4931f824ca85194b86da6ee78532663
SHA25668da480f708af9c78406ca71b51aa2232a67032c96ca6ea5d43e9b429561398c
SHA512fd114701daaf8e77f3155546ac1093e72813e57986512428af90680fd5c233180b5b8223802bc3c9192579b2aef80dade62db25b74601f76576a61b5e2954a23
-
Filesize
11KB
MD5b975d3458649d99f72a20025f14c1a0b
SHA18f8f73e48c8551367ea9f963d46c95478ec344fa
SHA256405ee0e68d1e7888c944ea842e2b6bfda9a6f1ce20e6936969bdc5c28e152c50
SHA51245fa5bc5d9eb93744e47f65cacb93042b16448a56ac5930a1b69bdf05297bc9e2e4c82c172f14a832c3d69e144b9304de05c517d87edcd3555c31a9501ccb7d8
-
Filesize
11KB
MD5b975d3458649d99f72a20025f14c1a0b
SHA18f8f73e48c8551367ea9f963d46c95478ec344fa
SHA256405ee0e68d1e7888c944ea842e2b6bfda9a6f1ce20e6936969bdc5c28e152c50
SHA51245fa5bc5d9eb93744e47f65cacb93042b16448a56ac5930a1b69bdf05297bc9e2e4c82c172f14a832c3d69e144b9304de05c517d87edcd3555c31a9501ccb7d8
-
Filesize
588KB
MD5353f99a2ac59e6e0701a86ca4799928c
SHA1199c60926c983c222469c0584e05774af92c9f2b
SHA256ec5ee242cbab0d856128b3961eb589575083bac227dd0def98b17bf73b9d5a71
SHA51264965935473cbb45a4ddee2889fb4b62e8b13fa80d189aff7020a494139ca4c154d85699a52f4b95dc9ff1adc1327b039d5fa81eddd867635de1e7926f38f057
-
Filesize
588KB
MD5353f99a2ac59e6e0701a86ca4799928c
SHA1199c60926c983c222469c0584e05774af92c9f2b
SHA256ec5ee242cbab0d856128b3961eb589575083bac227dd0def98b17bf73b9d5a71
SHA51264965935473cbb45a4ddee2889fb4b62e8b13fa80d189aff7020a494139ca4c154d85699a52f4b95dc9ff1adc1327b039d5fa81eddd867635de1e7926f38f057
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1