Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:46
Static task
static1
General
-
Target
f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe
-
Size
1.2MB
-
MD5
26a98be31b8cc17dfea69c76bbf69600
-
SHA1
5ea70e9881df2a92da9a243e0501a898e1c3b933
-
SHA256
f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2
-
SHA512
51545a73a96893ecb2356ef186e2394d13cc1a4703ad5bc56c6d2ca37adbfeabdd0ffa7d23f99b1171cf66d266ae3834f2372f670a22f9ffcb82ba1c96dac3f8
-
SSDEEP
24576:jyGicM/PDxbaxJoddE8d3o0VD2j864YNe9u2SZJzR+iE/xQcGdLfVxQILBF:2bBaQddR9/tk5Eu2Sft+iE/OXdrPT
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr879583.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr879583.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr879583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr879583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr879583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr879583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr879583.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu775265.exesi125994.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation qu775265.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si125994.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un814076.exeun199199.exepr879583.exequ775265.exe1.exerk384612.exesi125994.exeoneetx.exeoneetx.exepid process 3488 un814076.exe 2412 un199199.exe 4468 pr879583.exe 3376 qu775265.exe 3936 1.exe 1812 rk384612.exe 4484 si125994.exe 760 oneetx.exe 2652 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1476 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr879583.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr879583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr879583.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exeun814076.exeun199199.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un814076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un814076.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un199199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un199199.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5100 4468 WerFault.exe pr879583.exe 4000 3376 WerFault.exe qu775265.exe 1516 4484 WerFault.exe si125994.exe 4956 4484 WerFault.exe si125994.exe 1240 4484 WerFault.exe si125994.exe 812 4484 WerFault.exe si125994.exe 2512 4484 WerFault.exe si125994.exe 1888 4484 WerFault.exe si125994.exe 3220 4484 WerFault.exe si125994.exe 2772 4484 WerFault.exe si125994.exe 3108 4484 WerFault.exe si125994.exe 3576 4484 WerFault.exe si125994.exe 3884 760 WerFault.exe oneetx.exe 4432 760 WerFault.exe oneetx.exe 1292 760 WerFault.exe oneetx.exe 444 760 WerFault.exe oneetx.exe 2208 760 WerFault.exe oneetx.exe 3568 760 WerFault.exe oneetx.exe 1212 760 WerFault.exe oneetx.exe 4000 760 WerFault.exe oneetx.exe 2760 760 WerFault.exe oneetx.exe 2280 760 WerFault.exe oneetx.exe 480 760 WerFault.exe oneetx.exe 4660 760 WerFault.exe oneetx.exe 3112 2652 WerFault.exe oneetx.exe 3488 2652 WerFault.exe oneetx.exe 1576 2652 WerFault.exe oneetx.exe 1020 760 WerFault.exe oneetx.exe 3872 760 WerFault.exe oneetx.exe 3848 760 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr879583.exerk384612.exe1.exepid process 4468 pr879583.exe 4468 pr879583.exe 1812 rk384612.exe 3936 1.exe 3936 1.exe 1812 rk384612.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr879583.exequ775265.exerk384612.exe1.exedescription pid process Token: SeDebugPrivilege 4468 pr879583.exe Token: SeDebugPrivilege 3376 qu775265.exe Token: SeDebugPrivilege 1812 rk384612.exe Token: SeDebugPrivilege 3936 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si125994.exepid process 4484 si125994.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exeun814076.exeun199199.exequ775265.exesi125994.exeoneetx.exedescription pid process target process PID 2676 wrote to memory of 3488 2676 f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe un814076.exe PID 2676 wrote to memory of 3488 2676 f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe un814076.exe PID 2676 wrote to memory of 3488 2676 f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe un814076.exe PID 3488 wrote to memory of 2412 3488 un814076.exe un199199.exe PID 3488 wrote to memory of 2412 3488 un814076.exe un199199.exe PID 3488 wrote to memory of 2412 3488 un814076.exe un199199.exe PID 2412 wrote to memory of 4468 2412 un199199.exe pr879583.exe PID 2412 wrote to memory of 4468 2412 un199199.exe pr879583.exe PID 2412 wrote to memory of 4468 2412 un199199.exe pr879583.exe PID 2412 wrote to memory of 3376 2412 un199199.exe qu775265.exe PID 2412 wrote to memory of 3376 2412 un199199.exe qu775265.exe PID 2412 wrote to memory of 3376 2412 un199199.exe qu775265.exe PID 3376 wrote to memory of 3936 3376 qu775265.exe 1.exe PID 3376 wrote to memory of 3936 3376 qu775265.exe 1.exe PID 3376 wrote to memory of 3936 3376 qu775265.exe 1.exe PID 3488 wrote to memory of 1812 3488 un814076.exe rk384612.exe PID 3488 wrote to memory of 1812 3488 un814076.exe rk384612.exe PID 3488 wrote to memory of 1812 3488 un814076.exe rk384612.exe PID 2676 wrote to memory of 4484 2676 f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe si125994.exe PID 2676 wrote to memory of 4484 2676 f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe si125994.exe PID 2676 wrote to memory of 4484 2676 f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe si125994.exe PID 4484 wrote to memory of 760 4484 si125994.exe oneetx.exe PID 4484 wrote to memory of 760 4484 si125994.exe oneetx.exe PID 4484 wrote to memory of 760 4484 si125994.exe oneetx.exe PID 760 wrote to memory of 2840 760 oneetx.exe schtasks.exe PID 760 wrote to memory of 2840 760 oneetx.exe schtasks.exe PID 760 wrote to memory of 2840 760 oneetx.exe schtasks.exe PID 760 wrote to memory of 1476 760 oneetx.exe rundll32.exe PID 760 wrote to memory of 1476 760 oneetx.exe rundll32.exe PID 760 wrote to memory of 1476 760 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe"C:\Users\Admin\AppData\Local\Temp\f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814076.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814076.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un199199.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un199199.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr879583.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr879583.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 10885⤵
- Program crash
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu775265.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu775265.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 13805⤵
- Program crash
PID:4000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk384612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk384612.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125994.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125994.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 7003⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 7683⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 8123⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 9563⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 9563⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 8723⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 12203⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 12683⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 13203⤵
- Program crash
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 6964⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 8484⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 8884⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 10564⤵
- Program crash
PID:444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 10924⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 10924⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 10844⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 9964⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 7804⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 8964⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 7724⤵
- Program crash
PID:480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 11364⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 16124⤵
- Program crash
PID:1020
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 15284⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 16284⤵
- Program crash
PID:3848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 8083⤵
- Program crash
PID:3576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4468 -ip 44681⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3376 -ip 33761⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4484 -ip 44841⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4484 -ip 44841⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4484 -ip 44841⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4484 -ip 44841⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4484 -ip 44841⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4484 -ip 44841⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4484 -ip 44841⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4484 -ip 44841⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4484 -ip 44841⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4484 -ip 44841⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 760 -ip 7601⤵PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 760 -ip 7601⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 760 -ip 7601⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 760 -ip 7601⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 760 -ip 7601⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 760 -ip 7601⤵PID:844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 760 -ip 7601⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 760 -ip 7601⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 760 -ip 7601⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 760 -ip 7601⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 760 -ip 7601⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 760 -ip 7601⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 3962⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 4402⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 4842⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2652 -ip 26521⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2652 -ip 26521⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2652 -ip 26521⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 760 -ip 7601⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 760 -ip 7601⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 760 -ip 7601⤵PID:2176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD584961f0fc5de98cbd3d9443315fa6921
SHA13a1f1f0029153f4449be0b050ad438bb8286f834
SHA256dd1dfb565183b0855f36205d8121f680776b1eeb1e8b7984c55342f153f6af8a
SHA512cc6ee7f2e1a9bf87057eaa8f4139d89fa23643d93032626b5d7644c90f5f23df84ebe35f8d8cebcaac2992f3c5997495cd4b6a7c5ee61611dc21ad63ef97a348
-
Filesize
862KB
MD584961f0fc5de98cbd3d9443315fa6921
SHA13a1f1f0029153f4449be0b050ad438bb8286f834
SHA256dd1dfb565183b0855f36205d8121f680776b1eeb1e8b7984c55342f153f6af8a
SHA512cc6ee7f2e1a9bf87057eaa8f4139d89fa23643d93032626b5d7644c90f5f23df84ebe35f8d8cebcaac2992f3c5997495cd4b6a7c5ee61611dc21ad63ef97a348
-
Filesize
169KB
MD59da9b5abb353f8afe51ade39fb03f93d
SHA1ff15f56b8d072bae96221dacc8ee219f6da32fa3
SHA2565d978960b9128ee8f9a16317656e0e08fefd7c954f6b6ac536e0af4cb89ca813
SHA5127728c3a7a11968e5c4fa8153f632ebd5f2aaf1fbac84c3eda03df84032b78d497e959e274a3b2950e57b0e266d894f656dbe6432446660ff04a4719978e9b261
-
Filesize
169KB
MD59da9b5abb353f8afe51ade39fb03f93d
SHA1ff15f56b8d072bae96221dacc8ee219f6da32fa3
SHA2565d978960b9128ee8f9a16317656e0e08fefd7c954f6b6ac536e0af4cb89ca813
SHA5127728c3a7a11968e5c4fa8153f632ebd5f2aaf1fbac84c3eda03df84032b78d497e959e274a3b2950e57b0e266d894f656dbe6432446660ff04a4719978e9b261
-
Filesize
708KB
MD59abf8ade890d55a642040977de0d176c
SHA1c0c37c67c8e4ab353c3fbdc10e21992514b6bb6e
SHA25685065b1f540e5c940fac987294d3676d42f52dff8db07ff45fe6882a8e6aea07
SHA5121cfd17f095f8d5d78fc9fe8f70af6908f84b9fd2d417a3efce940b75fb7091725e5f735b699f173c87eda19d11c94c819235e444b5b79656e31a700fe80148f5
-
Filesize
708KB
MD59abf8ade890d55a642040977de0d176c
SHA1c0c37c67c8e4ab353c3fbdc10e21992514b6bb6e
SHA25685065b1f540e5c940fac987294d3676d42f52dff8db07ff45fe6882a8e6aea07
SHA5121cfd17f095f8d5d78fc9fe8f70af6908f84b9fd2d417a3efce940b75fb7091725e5f735b699f173c87eda19d11c94c819235e444b5b79656e31a700fe80148f5
-
Filesize
405KB
MD5357542cc90a4e09ae056bf89f1dee8b6
SHA1ed93ac98a4469fab070ebdf1c402c4fe8819f555
SHA256bf7c5b52cd767c7922170ef8ae8b5f657c84812aa073289a499b5179ef663e61
SHA5124cfcd83f25ce3ad1dffeed90ed17f1e1ae26f6076e56e20ddfaf7ef48e42d4853bb291d0f8891763617ed5b999cd9424051481bab42dfcaac57a9fc3f0bb5842
-
Filesize
405KB
MD5357542cc90a4e09ae056bf89f1dee8b6
SHA1ed93ac98a4469fab070ebdf1c402c4fe8819f555
SHA256bf7c5b52cd767c7922170ef8ae8b5f657c84812aa073289a499b5179ef663e61
SHA5124cfcd83f25ce3ad1dffeed90ed17f1e1ae26f6076e56e20ddfaf7ef48e42d4853bb291d0f8891763617ed5b999cd9424051481bab42dfcaac57a9fc3f0bb5842
-
Filesize
588KB
MD5b9b49f1a67e41c2339fc33d81f4ab82f
SHA186c2d0e1569e221b0f03fd369c51a0fda8327791
SHA256212b87d3a5f48c07a0d278eda54131b4c019a488724fb199b9d2537c27f3a5e1
SHA51287001bc9fac30ae4eb5fbcfc1047e225d60d565361620d3b7b2120715dca7c920be1d2d29c8b0b28279ee3caf4282e2959dff2a405624e52ade671c308890057
-
Filesize
588KB
MD5b9b49f1a67e41c2339fc33d81f4ab82f
SHA186c2d0e1569e221b0f03fd369c51a0fda8327791
SHA256212b87d3a5f48c07a0d278eda54131b4c019a488724fb199b9d2537c27f3a5e1
SHA51287001bc9fac30ae4eb5fbcfc1047e225d60d565361620d3b7b2120715dca7c920be1d2d29c8b0b28279ee3caf4282e2959dff2a405624e52ade671c308890057
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1