Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:56
Static task
static1
General
-
Target
ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe
-
Size
1.0MB
-
MD5
446b7f58fd509835d0459597e5a8d750
-
SHA1
dbf8d848fbd5cd42b7964e194d5f52acc19d7699
-
SHA256
ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e
-
SHA512
3f2967ec99add3f145291d9ccf42822f116105ece1627854c50343e62ccef6cfc3305d8480ce4b2fa8874570c7f3f4a4a2df57fb09878575d7c80cb5512d0db9
-
SSDEEP
24576:3yXdGaUqmdFlnXchgKeI26egh3vsAhVxwqkS0Yi5:CNGaxmdjnFj6ZlphbVkSTi
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it248572.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it248572.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it248572.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it248572.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it248572.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it248572.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it248572.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr304795.exelr091891.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr304795.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr091891.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziaJ8267.exezioC7726.exeit248572.exejr304795.exe1.exekp742289.exelr091891.exeoneetx.exeoneetx.exeoneetx.exepid process 2656 ziaJ8267.exe 772 zioC7726.exe 4644 it248572.exe 4168 jr304795.exe 4260 1.exe 1848 kp742289.exe 4608 lr091891.exe 1292 oneetx.exe 4136 oneetx.exe 1344 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2912 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it248572.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it248572.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exeziaJ8267.exezioC7726.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziaJ8267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziaJ8267.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zioC7726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zioC7726.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1452 4168 WerFault.exe jr304795.exe 1768 4608 WerFault.exe lr091891.exe 2108 4608 WerFault.exe lr091891.exe 4992 4608 WerFault.exe lr091891.exe 4832 4608 WerFault.exe lr091891.exe 404 4608 WerFault.exe lr091891.exe 2092 4608 WerFault.exe lr091891.exe 3048 4608 WerFault.exe lr091891.exe 1344 4608 WerFault.exe lr091891.exe 4428 4608 WerFault.exe lr091891.exe 4556 4608 WerFault.exe lr091891.exe 4692 1292 WerFault.exe oneetx.exe 4208 1292 WerFault.exe oneetx.exe 3748 1292 WerFault.exe oneetx.exe 4584 1292 WerFault.exe oneetx.exe 5060 1292 WerFault.exe oneetx.exe 3204 1292 WerFault.exe oneetx.exe 4264 1292 WerFault.exe oneetx.exe 2708 1292 WerFault.exe oneetx.exe 4212 1292 WerFault.exe oneetx.exe 4168 1292 WerFault.exe oneetx.exe 4244 1292 WerFault.exe oneetx.exe 4908 1292 WerFault.exe oneetx.exe 2892 4136 WerFault.exe oneetx.exe 4888 4136 WerFault.exe oneetx.exe 1768 4136 WerFault.exe oneetx.exe 1060 1292 WerFault.exe oneetx.exe 4540 1292 WerFault.exe oneetx.exe 3360 1292 WerFault.exe oneetx.exe 2388 1344 WerFault.exe oneetx.exe 4544 1344 WerFault.exe oneetx.exe 3980 1344 WerFault.exe oneetx.exe 3784 1292 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it248572.exe1.exekp742289.exepid process 4644 it248572.exe 4644 it248572.exe 4260 1.exe 1848 kp742289.exe 1848 kp742289.exe 4260 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it248572.exejr304795.exe1.exekp742289.exedescription pid process Token: SeDebugPrivilege 4644 it248572.exe Token: SeDebugPrivilege 4168 jr304795.exe Token: SeDebugPrivilege 4260 1.exe Token: SeDebugPrivilege 1848 kp742289.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr091891.exepid process 4608 lr091891.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exeziaJ8267.exezioC7726.exejr304795.exelr091891.exeoneetx.exedescription pid process target process PID 1600 wrote to memory of 2656 1600 ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe ziaJ8267.exe PID 1600 wrote to memory of 2656 1600 ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe ziaJ8267.exe PID 1600 wrote to memory of 2656 1600 ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe ziaJ8267.exe PID 2656 wrote to memory of 772 2656 ziaJ8267.exe zioC7726.exe PID 2656 wrote to memory of 772 2656 ziaJ8267.exe zioC7726.exe PID 2656 wrote to memory of 772 2656 ziaJ8267.exe zioC7726.exe PID 772 wrote to memory of 4644 772 zioC7726.exe it248572.exe PID 772 wrote to memory of 4644 772 zioC7726.exe it248572.exe PID 772 wrote to memory of 4168 772 zioC7726.exe jr304795.exe PID 772 wrote to memory of 4168 772 zioC7726.exe jr304795.exe PID 772 wrote to memory of 4168 772 zioC7726.exe jr304795.exe PID 4168 wrote to memory of 4260 4168 jr304795.exe 1.exe PID 4168 wrote to memory of 4260 4168 jr304795.exe 1.exe PID 4168 wrote to memory of 4260 4168 jr304795.exe 1.exe PID 2656 wrote to memory of 1848 2656 ziaJ8267.exe kp742289.exe PID 2656 wrote to memory of 1848 2656 ziaJ8267.exe kp742289.exe PID 2656 wrote to memory of 1848 2656 ziaJ8267.exe kp742289.exe PID 1600 wrote to memory of 4608 1600 ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe lr091891.exe PID 1600 wrote to memory of 4608 1600 ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe lr091891.exe PID 1600 wrote to memory of 4608 1600 ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe lr091891.exe PID 4608 wrote to memory of 1292 4608 lr091891.exe oneetx.exe PID 4608 wrote to memory of 1292 4608 lr091891.exe oneetx.exe PID 4608 wrote to memory of 1292 4608 lr091891.exe oneetx.exe PID 1292 wrote to memory of 1180 1292 oneetx.exe schtasks.exe PID 1292 wrote to memory of 1180 1292 oneetx.exe schtasks.exe PID 1292 wrote to memory of 1180 1292 oneetx.exe schtasks.exe PID 1292 wrote to memory of 2912 1292 oneetx.exe rundll32.exe PID 1292 wrote to memory of 2912 1292 oneetx.exe rundll32.exe PID 1292 wrote to memory of 2912 1292 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe"C:\Users\Admin\AppData\Local\Temp\ee36e18f1db920d73c3f9d36d1316dffedf63396dba115ae76596d978c4f134e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaJ8267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaJ8267.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioC7726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioC7726.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it248572.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it248572.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr304795.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr304795.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 13885⤵
- Program crash
PID:1452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp742289.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp742289.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr091891.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr091891.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7003⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7203⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8043⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 9723⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 9803⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 9803⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 12163⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 12243⤵
- Program crash
PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 13203⤵
- Program crash
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 6964⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 8644⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 9124⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10564⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10644⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10764⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10844⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 9964⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 7844⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 7724⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 12684⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 14364⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 10884⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 16284⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 11444⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 16444⤵
- Program crash
PID:3784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 13883⤵
- Program crash
PID:4556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4168 -ip 41681⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4608 -ip 46081⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4608 -ip 46081⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4608 -ip 46081⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4608 -ip 46081⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4608 -ip 46081⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4608 -ip 46081⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4608 -ip 46081⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4608 -ip 46081⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4608 -ip 46081⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4608 -ip 46081⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1292 -ip 12921⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1292 -ip 12921⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1292 -ip 12921⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1292 -ip 12921⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1292 -ip 12921⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1292 -ip 12921⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1292 -ip 12921⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1292 -ip 12921⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1292 -ip 12921⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1292 -ip 12921⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1292 -ip 12921⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1292 -ip 12921⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 3962⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 4402⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 4402⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4136 -ip 41361⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4136 -ip 41361⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4136 -ip 41361⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1292 -ip 12921⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1292 -ip 12921⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1292 -ip 12921⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4002⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4402⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4402⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1344 -ip 13441⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1344 -ip 13441⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1344 -ip 13441⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1292 -ip 12921⤵PID:5052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD50175318953a27acfddd5bf4ec49eb99d
SHA17a0abff8821bf75d0ba0f7f4e9ed297eeacc70b5
SHA256fe6ed2be27e2cc77ecc560ec5f82ece0006b8a82f6eba17087ab53144ae0f055
SHA512a4dff2ec45e18df9753627b5050dbd8774e9b24848e646250fea91368a4369fafd3ea886f1dbe3a4ef4cb723cb22670564de3a19c7aa23e20bcfcc8619c318eb
-
Filesize
723KB
MD50175318953a27acfddd5bf4ec49eb99d
SHA17a0abff8821bf75d0ba0f7f4e9ed297eeacc70b5
SHA256fe6ed2be27e2cc77ecc560ec5f82ece0006b8a82f6eba17087ab53144ae0f055
SHA512a4dff2ec45e18df9753627b5050dbd8774e9b24848e646250fea91368a4369fafd3ea886f1dbe3a4ef4cb723cb22670564de3a19c7aa23e20bcfcc8619c318eb
-
Filesize
169KB
MD5f18eeaa5e27b88344a9b84bf269b0eee
SHA1169004f85a9443bdd8c6c93cfa73ecbf5621fb73
SHA25658abab3331b5f124b1afccece1c4d4b7d888223e96e9e58357212ead123e02ea
SHA512176dfd11a214910cdcc3e5c709cb39ea654780ee83cc942178caeabd1aadeb4d7a3444400c54b09fc4a2eac67232942587d6e11001e2ae5e377b5169d37cf1e8
-
Filesize
169KB
MD5f18eeaa5e27b88344a9b84bf269b0eee
SHA1169004f85a9443bdd8c6c93cfa73ecbf5621fb73
SHA25658abab3331b5f124b1afccece1c4d4b7d888223e96e9e58357212ead123e02ea
SHA512176dfd11a214910cdcc3e5c709cb39ea654780ee83cc942178caeabd1aadeb4d7a3444400c54b09fc4a2eac67232942587d6e11001e2ae5e377b5169d37cf1e8
-
Filesize
570KB
MD561b47690b0a44a1b11d893f1171498e0
SHA15ed690a218b4f0046779884aa8756fd2e2f3da3a
SHA256a89e5bde3db26ccfbe14698814ba96bd89806e97ffcd73a104920bfc1ffe111b
SHA512833efc0fd65376361fb0c657e452b09db562a96ba1def3bdc8de4e8f7888bc8ae5c12173275a5047dfb7c2c7c01f33d1509e51035fd9a3793364566c3f7c7d14
-
Filesize
570KB
MD561b47690b0a44a1b11d893f1171498e0
SHA15ed690a218b4f0046779884aa8756fd2e2f3da3a
SHA256a89e5bde3db26ccfbe14698814ba96bd89806e97ffcd73a104920bfc1ffe111b
SHA512833efc0fd65376361fb0c657e452b09db562a96ba1def3bdc8de4e8f7888bc8ae5c12173275a5047dfb7c2c7c01f33d1509e51035fd9a3793364566c3f7c7d14
-
Filesize
11KB
MD57720e60b1e2818e47418fa2551f90f07
SHA1caa232d9a1939650cfd54f7890a74d46c7291356
SHA25683ba14557a7847fb9fd3b925051db3c3b6a32edadd232c8a7fd0bcc6e35ed98d
SHA512cfd3f0be18ddde002d0b778b6231d24cc3dcf816fc47cd8a731e41419cdd833d66a11d9551076374dd61bf9dd5c0abf81606879f5ef4bceb7b87a93fcaa4e1bc
-
Filesize
11KB
MD57720e60b1e2818e47418fa2551f90f07
SHA1caa232d9a1939650cfd54f7890a74d46c7291356
SHA25683ba14557a7847fb9fd3b925051db3c3b6a32edadd232c8a7fd0bcc6e35ed98d
SHA512cfd3f0be18ddde002d0b778b6231d24cc3dcf816fc47cd8a731e41419cdd833d66a11d9551076374dd61bf9dd5c0abf81606879f5ef4bceb7b87a93fcaa4e1bc
-
Filesize
588KB
MD53223ffb952ff3f8c9506072cc40c0bb3
SHA17afec2f6e5f9cb5ad9f58d63b21703be8a21c576
SHA256225b50b701a887b7e081c0773d47c7530877c6e754214b0a9ef666f821bd1aef
SHA5122475ec7b760d23c5ab37559a8586c3b3a8de675fe192853e56143ecaa35a97a1e5663d16ee09ad0e255a3575859de6530360031031eb38b6d6f92d3c8df05834
-
Filesize
588KB
MD53223ffb952ff3f8c9506072cc40c0bb3
SHA17afec2f6e5f9cb5ad9f58d63b21703be8a21c576
SHA256225b50b701a887b7e081c0773d47c7530877c6e754214b0a9ef666f821bd1aef
SHA5122475ec7b760d23c5ab37559a8586c3b3a8de675fe192853e56143ecaa35a97a1e5663d16ee09ad0e255a3575859de6530360031031eb38b6d6f92d3c8df05834
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1