Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:54
Static task
static1
General
-
Target
e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe
-
Size
1.2MB
-
MD5
f2661b980b1ceaf5f240ce4cb382edbc
-
SHA1
9f5d068df2167ca1f13dcd040e846870cdf53cc1
-
SHA256
e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3
-
SHA512
e2b82b489274a6fa7cc525005036ef53b12d69a0330e95b7c6bef3525d6e7ad6283ab0e0e22dd76a9caaf85deb1ff9d8bc3ad29d1e57337c31524e7d24d36c7a
-
SSDEEP
24576:7yDy7fbGcsdh/dURnAHdc2wl1IdtXxR+toQIAlQ:uej9o2RnA9WutXjc9T
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr035860.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr035860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr035860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr035860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr035860.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr035860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr035860.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exequ379270.exesi661978.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu379270.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si661978.exe -
Executes dropped EXE 9 IoCs
Processes:
un351949.exeun833873.exepr035860.exequ379270.exe1.exerk879552.exesi661978.exeoneetx.exeoneetx.exepid process 4176 un351949.exe 1680 un833873.exe 3232 pr035860.exe 5116 qu379270.exe 1376 1.exe 4764 rk879552.exe 3632 si661978.exe 1216 oneetx.exe 4968 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1608 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr035860.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr035860.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr035860.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exeun351949.exeun833873.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un351949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un351949.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un833873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un833873.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4628 3232 WerFault.exe pr035860.exe 3664 5116 WerFault.exe qu379270.exe 4592 3632 WerFault.exe si661978.exe 3276 3632 WerFault.exe si661978.exe 3740 3632 WerFault.exe si661978.exe 2768 3632 WerFault.exe si661978.exe 3848 3632 WerFault.exe si661978.exe 1536 3632 WerFault.exe si661978.exe 3800 3632 WerFault.exe si661978.exe 3296 3632 WerFault.exe si661978.exe 440 3632 WerFault.exe si661978.exe 2188 3632 WerFault.exe si661978.exe 5112 1216 WerFault.exe oneetx.exe 4436 1216 WerFault.exe oneetx.exe 2304 1216 WerFault.exe oneetx.exe 4548 1216 WerFault.exe oneetx.exe 3920 1216 WerFault.exe oneetx.exe 3288 1216 WerFault.exe oneetx.exe 4912 1216 WerFault.exe oneetx.exe 824 1216 WerFault.exe oneetx.exe 3388 1216 WerFault.exe oneetx.exe 1792 1216 WerFault.exe oneetx.exe 4152 1216 WerFault.exe oneetx.exe 3960 1216 WerFault.exe oneetx.exe 4840 1216 WerFault.exe oneetx.exe 228 4968 WerFault.exe oneetx.exe 232 1216 WerFault.exe oneetx.exe 4716 4968 WerFault.exe oneetx.exe 3400 1216 WerFault.exe oneetx.exe 3832 4968 WerFault.exe oneetx.exe 2144 1216 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr035860.exe1.exerk879552.exepid process 3232 pr035860.exe 3232 pr035860.exe 1376 1.exe 4764 rk879552.exe 4764 rk879552.exe 1376 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr035860.exequ379270.exe1.exerk879552.exedescription pid process Token: SeDebugPrivilege 3232 pr035860.exe Token: SeDebugPrivilege 5116 qu379270.exe Token: SeDebugPrivilege 1376 1.exe Token: SeDebugPrivilege 4764 rk879552.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si661978.exepid process 3632 si661978.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exeun351949.exeun833873.exequ379270.exesi661978.exeoneetx.exedescription pid process target process PID 2164 wrote to memory of 4176 2164 e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe un351949.exe PID 2164 wrote to memory of 4176 2164 e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe un351949.exe PID 2164 wrote to memory of 4176 2164 e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe un351949.exe PID 4176 wrote to memory of 1680 4176 un351949.exe un833873.exe PID 4176 wrote to memory of 1680 4176 un351949.exe un833873.exe PID 4176 wrote to memory of 1680 4176 un351949.exe un833873.exe PID 1680 wrote to memory of 3232 1680 un833873.exe pr035860.exe PID 1680 wrote to memory of 3232 1680 un833873.exe pr035860.exe PID 1680 wrote to memory of 3232 1680 un833873.exe pr035860.exe PID 1680 wrote to memory of 5116 1680 un833873.exe qu379270.exe PID 1680 wrote to memory of 5116 1680 un833873.exe qu379270.exe PID 1680 wrote to memory of 5116 1680 un833873.exe qu379270.exe PID 5116 wrote to memory of 1376 5116 qu379270.exe 1.exe PID 5116 wrote to memory of 1376 5116 qu379270.exe 1.exe PID 5116 wrote to memory of 1376 5116 qu379270.exe 1.exe PID 4176 wrote to memory of 4764 4176 un351949.exe rk879552.exe PID 4176 wrote to memory of 4764 4176 un351949.exe rk879552.exe PID 4176 wrote to memory of 4764 4176 un351949.exe rk879552.exe PID 2164 wrote to memory of 3632 2164 e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe si661978.exe PID 2164 wrote to memory of 3632 2164 e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe si661978.exe PID 2164 wrote to memory of 3632 2164 e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe si661978.exe PID 3632 wrote to memory of 1216 3632 si661978.exe oneetx.exe PID 3632 wrote to memory of 1216 3632 si661978.exe oneetx.exe PID 3632 wrote to memory of 1216 3632 si661978.exe oneetx.exe PID 1216 wrote to memory of 2596 1216 oneetx.exe schtasks.exe PID 1216 wrote to memory of 2596 1216 oneetx.exe schtasks.exe PID 1216 wrote to memory of 2596 1216 oneetx.exe schtasks.exe PID 1216 wrote to memory of 1608 1216 oneetx.exe rundll32.exe PID 1216 wrote to memory of 1608 1216 oneetx.exe rundll32.exe PID 1216 wrote to memory of 1608 1216 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe"C:\Users\Admin\AppData\Local\Temp\e17afd58e912c86bcd3bce3075ed4e949d694792fd1d6faf6aef31dd94a419c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un351949.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un351949.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un833873.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un833873.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr035860.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr035860.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 10925⤵
- Program crash
PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu379270.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu379270.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 13845⤵
- Program crash
PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk879552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk879552.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661978.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661978.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7003⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7683⤵
- Program crash
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8083⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9563⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10003⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10003⤵
- Program crash
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 12003⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 12003⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 13283⤵
- Program crash
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 6964⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 8684⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 8804⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10564⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10764⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10764⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10924⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 9964⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 7804⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 9084⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 7244⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 14324⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 11164⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10884⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 13764⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 16444⤵
- Program crash
PID:2144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 13643⤵
- Program crash
PID:2188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3232 -ip 32321⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5116 -ip 51161⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3632 -ip 36321⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3632 -ip 36321⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3632 -ip 36321⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3632 -ip 36321⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3632 -ip 36321⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3632 -ip 36321⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3632 -ip 36321⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3632 -ip 36321⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3632 -ip 36321⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3632 -ip 36321⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1216 -ip 12161⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1216 -ip 12161⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1216 -ip 12161⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1216 -ip 12161⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1216 -ip 12161⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1216 -ip 12161⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1216 -ip 12161⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1216 -ip 12161⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1216 -ip 12161⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1216 -ip 12161⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1216 -ip 12161⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1216 -ip 12161⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1216 -ip 12161⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 3962⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 4442⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 4762⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4968 -ip 49681⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1216 -ip 12161⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4968 -ip 49681⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1216 -ip 12161⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4968 -ip 49681⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1216 -ip 12161⤵PID:2396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
862KB
MD55b5d67e10aafc0cc3faa34ee405b9229
SHA109f986f16480e8a47f47dfa5a49cd1943783fe3b
SHA256304bd5881e3ccb5aa943804c832b71a8fe4086195ff6dd77a2283af48e263474
SHA5123a20b1281cf73cb2d2e92e0821788360f3c6073dbb1623c346b662074b8fa7300c801dd00971dd5114a4c4b846aebc2ea4238dc3fafcdb13dbdd6eb08fb7bb65
-
Filesize
862KB
MD55b5d67e10aafc0cc3faa34ee405b9229
SHA109f986f16480e8a47f47dfa5a49cd1943783fe3b
SHA256304bd5881e3ccb5aa943804c832b71a8fe4086195ff6dd77a2283af48e263474
SHA5123a20b1281cf73cb2d2e92e0821788360f3c6073dbb1623c346b662074b8fa7300c801dd00971dd5114a4c4b846aebc2ea4238dc3fafcdb13dbdd6eb08fb7bb65
-
Filesize
169KB
MD595c39ca0bfec9e0c59f76e17cdd0e088
SHA189c5d55a83ef95a0a79324899c38a43b19f1d43f
SHA256dad187876582da25e47a8ad047bce4eeded38ed194fcc9ca7ff53f7e9c2c1916
SHA51281b0d1387ba2d19fa6cb2fc096162464d99bb7b633627e6fb2568a0380c2595cff3d1629a13221fb845df0999f59c08c5592741dd0f6758271303d73130618a2
-
Filesize
169KB
MD595c39ca0bfec9e0c59f76e17cdd0e088
SHA189c5d55a83ef95a0a79324899c38a43b19f1d43f
SHA256dad187876582da25e47a8ad047bce4eeded38ed194fcc9ca7ff53f7e9c2c1916
SHA51281b0d1387ba2d19fa6cb2fc096162464d99bb7b633627e6fb2568a0380c2595cff3d1629a13221fb845df0999f59c08c5592741dd0f6758271303d73130618a2
-
Filesize
708KB
MD53e9bfa2a279914d550db3a9f9e226679
SHA107d99fcdf93cf13b445065be45e94015a92e05d1
SHA256f6cdf76e5fd6df9d08883c5729c262cf31259ff13cc5db077be979ad4d822707
SHA5124506211d6354cf8fc1cc04f42964e3408040e95242c6d62b528543852005215c0848114bb9a155bf99080aacb8b54feba365e8d9c72fec2f4ef5f5c9f919c1a3
-
Filesize
708KB
MD53e9bfa2a279914d550db3a9f9e226679
SHA107d99fcdf93cf13b445065be45e94015a92e05d1
SHA256f6cdf76e5fd6df9d08883c5729c262cf31259ff13cc5db077be979ad4d822707
SHA5124506211d6354cf8fc1cc04f42964e3408040e95242c6d62b528543852005215c0848114bb9a155bf99080aacb8b54feba365e8d9c72fec2f4ef5f5c9f919c1a3
-
Filesize
405KB
MD55c4d180eddbff3d6eb574ac2e5bc7a60
SHA1a2fc2be15a23966611499256ebd6c4622f003f29
SHA2565afa64fd1633abbaef4477a475e0a716212fcbf6812c2e542114efcc4414c8bb
SHA512ab0b2a2eff5b2d80fb00528b8dcddd05f09165cd8dbb8a26915daabfdf033a9fc0a4dd7fc9e412e96ad8dc012a7cb88c27cd1c64dba03f1c90b0b756c993f360
-
Filesize
405KB
MD55c4d180eddbff3d6eb574ac2e5bc7a60
SHA1a2fc2be15a23966611499256ebd6c4622f003f29
SHA2565afa64fd1633abbaef4477a475e0a716212fcbf6812c2e542114efcc4414c8bb
SHA512ab0b2a2eff5b2d80fb00528b8dcddd05f09165cd8dbb8a26915daabfdf033a9fc0a4dd7fc9e412e96ad8dc012a7cb88c27cd1c64dba03f1c90b0b756c993f360
-
Filesize
588KB
MD5e85ca7445f933d564b56237d394acfce
SHA1cd6c686903d0dda60fe6c4bc848869c04ec01510
SHA256abf2d97f51ab03c35f1e4c93d776aa7bb3b91dbdf4ea184138bcff631a303e64
SHA51238ef5c7a8fbc8c6eb47c8607c813d278fa60c3d638459a0bde30c99076f54c391751ece4d535990443395908b0f243e9df52d078a33bcecf317c630cce6bdede
-
Filesize
588KB
MD5e85ca7445f933d564b56237d394acfce
SHA1cd6c686903d0dda60fe6c4bc848869c04ec01510
SHA256abf2d97f51ab03c35f1e4c93d776aa7bb3b91dbdf4ea184138bcff631a303e64
SHA51238ef5c7a8fbc8c6eb47c8607c813d278fa60c3d638459a0bde30c99076f54c391751ece4d535990443395908b0f243e9df52d078a33bcecf317c630cce6bdede
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1