Analysis
-
max time kernel
148s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:58
Static task
static1
General
-
Target
1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe
-
Size
1.0MB
-
MD5
8fac22152bb238410890cea4b3a092b4
-
SHA1
42a05be506a1cdc0acd384423d1e7ab669eb4357
-
SHA256
1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d
-
SHA512
441ddf60c7580627b82fd1bae4b76463bc86c19d9fe13220af6f136456ef8f30df918d4ba090929b837b7338b1a949e206236219758bd10ebb60ce8470f71984
-
SSDEEP
24576:/yEPd7AAdD9yfuzb1e1alM+/QeP0SJdU3WvcZdfc8Mz/Hs:KEuOD9yG/hL/QGvncZdfcVz/
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it128563.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it128563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it128563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it128563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it128563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it128563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it128563.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr389757.exelr440359.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr389757.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr440359.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziPC1937.exeziyg2543.exeit128563.exejr389757.exe1.exekp842252.exelr440359.exeoneetx.exeoneetx.exeoneetx.exepid process 3080 ziPC1937.exe 4524 ziyg2543.exe 1028 it128563.exe 408 jr389757.exe 3912 1.exe 4884 kp842252.exe 1192 lr440359.exe 2028 oneetx.exe 3168 oneetx.exe 4068 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4188 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it128563.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it128563.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziPC1937.exeziyg2543.exe1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPC1937.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyg2543.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziyg2543.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPC1937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2108 408 WerFault.exe jr389757.exe 3276 1192 WerFault.exe lr440359.exe 4068 1192 WerFault.exe lr440359.exe 1968 1192 WerFault.exe lr440359.exe 1988 1192 WerFault.exe lr440359.exe 2976 1192 WerFault.exe lr440359.exe 2424 1192 WerFault.exe lr440359.exe 4304 1192 WerFault.exe lr440359.exe 2412 1192 WerFault.exe lr440359.exe 4948 1192 WerFault.exe lr440359.exe 4652 1192 WerFault.exe lr440359.exe 2900 2028 WerFault.exe oneetx.exe 4256 2028 WerFault.exe oneetx.exe 1104 2028 WerFault.exe oneetx.exe 4064 2028 WerFault.exe oneetx.exe 1196 2028 WerFault.exe oneetx.exe 4008 2028 WerFault.exe oneetx.exe 3956 2028 WerFault.exe oneetx.exe 5008 2028 WerFault.exe oneetx.exe 2960 2028 WerFault.exe oneetx.exe 5088 2028 WerFault.exe oneetx.exe 4232 2028 WerFault.exe oneetx.exe 4364 2028 WerFault.exe oneetx.exe 1548 3168 WerFault.exe oneetx.exe 1556 3168 WerFault.exe oneetx.exe 4432 3168 WerFault.exe oneetx.exe 2820 2028 WerFault.exe oneetx.exe 3776 2028 WerFault.exe oneetx.exe 2808 2028 WerFault.exe oneetx.exe 1968 4068 WerFault.exe oneetx.exe 1680 4068 WerFault.exe oneetx.exe 4712 4068 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it128563.exekp842252.exe1.exepid process 1028 it128563.exe 1028 it128563.exe 4884 kp842252.exe 3912 1.exe 3912 1.exe 4884 kp842252.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it128563.exejr389757.exekp842252.exe1.exedescription pid process Token: SeDebugPrivilege 1028 it128563.exe Token: SeDebugPrivilege 408 jr389757.exe Token: SeDebugPrivilege 4884 kp842252.exe Token: SeDebugPrivilege 3912 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr440359.exepid process 1192 lr440359.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exeziPC1937.exeziyg2543.exejr389757.exelr440359.exeoneetx.exedescription pid process target process PID 1020 wrote to memory of 3080 1020 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe ziPC1937.exe PID 1020 wrote to memory of 3080 1020 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe ziPC1937.exe PID 1020 wrote to memory of 3080 1020 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe ziPC1937.exe PID 3080 wrote to memory of 4524 3080 ziPC1937.exe ziyg2543.exe PID 3080 wrote to memory of 4524 3080 ziPC1937.exe ziyg2543.exe PID 3080 wrote to memory of 4524 3080 ziPC1937.exe ziyg2543.exe PID 4524 wrote to memory of 1028 4524 ziyg2543.exe it128563.exe PID 4524 wrote to memory of 1028 4524 ziyg2543.exe it128563.exe PID 4524 wrote to memory of 408 4524 ziyg2543.exe jr389757.exe PID 4524 wrote to memory of 408 4524 ziyg2543.exe jr389757.exe PID 4524 wrote to memory of 408 4524 ziyg2543.exe jr389757.exe PID 408 wrote to memory of 3912 408 jr389757.exe 1.exe PID 408 wrote to memory of 3912 408 jr389757.exe 1.exe PID 408 wrote to memory of 3912 408 jr389757.exe 1.exe PID 3080 wrote to memory of 4884 3080 ziPC1937.exe kp842252.exe PID 3080 wrote to memory of 4884 3080 ziPC1937.exe kp842252.exe PID 3080 wrote to memory of 4884 3080 ziPC1937.exe kp842252.exe PID 1020 wrote to memory of 1192 1020 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe lr440359.exe PID 1020 wrote to memory of 1192 1020 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe lr440359.exe PID 1020 wrote to memory of 1192 1020 1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe lr440359.exe PID 1192 wrote to memory of 2028 1192 lr440359.exe oneetx.exe PID 1192 wrote to memory of 2028 1192 lr440359.exe oneetx.exe PID 1192 wrote to memory of 2028 1192 lr440359.exe oneetx.exe PID 2028 wrote to memory of 1536 2028 oneetx.exe schtasks.exe PID 2028 wrote to memory of 1536 2028 oneetx.exe schtasks.exe PID 2028 wrote to memory of 1536 2028 oneetx.exe schtasks.exe PID 2028 wrote to memory of 4188 2028 oneetx.exe rundll32.exe PID 2028 wrote to memory of 4188 2028 oneetx.exe rundll32.exe PID 2028 wrote to memory of 4188 2028 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe"C:\Users\Admin\AppData\Local\Temp\1da55d9c027c69456acb420b4c5213528a84e5108eb96e6d373df67b73dd2c8d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPC1937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPC1937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyg2543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyg2543.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it128563.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it128563.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr389757.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr389757.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 13805⤵
- Program crash
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp842252.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp842252.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr440359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr440359.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7003⤵
- Program crash
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7843⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 8603⤵
- Program crash
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 8643⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 9683⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 9683⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 12203⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 12323⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 12643⤵
- Program crash
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 6964⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 8724⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 8964⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 10644⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 10644⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 10884⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 11324⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 9964⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 13004⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 13084⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 13164⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 11124⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 16044⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 10644⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 16204⤵
- Program crash
PID:2808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 14363⤵
- Program crash
PID:4652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 408 -ip 4081⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1192 -ip 11921⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1192 -ip 11921⤵PID:4900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1192 -ip 11921⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1192 -ip 11921⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1192 -ip 11921⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1192 -ip 11921⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1192 -ip 11921⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1192 -ip 11921⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1192 -ip 11921⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1192 -ip 11921⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2028 -ip 20281⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2028 -ip 20281⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2028 -ip 20281⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2028 -ip 20281⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2028 -ip 20281⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2028 -ip 20281⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2028 -ip 20281⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2028 -ip 20281⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2028 -ip 20281⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2028 -ip 20281⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2028 -ip 20281⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2028 -ip 20281⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 3962⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 4402⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 4402⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3168 -ip 31681⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3168 -ip 31681⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3168 -ip 31681⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2028 -ip 20281⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2028 -ip 20281⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2028 -ip 20281⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 4002⤵
- Program crash
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 4402⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 4402⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4068 -ip 40681⤵PID:844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4068 -ip 40681⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4068 -ip 40681⤵PID:4624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD52fab4c938c2584abae45013a8ffa57e5
SHA1c011dc6b2ee5c7e066c74667ce023553ffeb11ca
SHA2565ab4ef92a2687bcc605bfe932b71cfaff66d84fcc2ab58f50a3b8e334fd3a6f7
SHA5125dc6e20d5fa857cf750c7da431eabdabd6ad36b5e03804c78fbc14612706c82348fd0605151e6e1bfafa78c2ff660ecb904a01cfcf06555b022612f7faff31ff
-
Filesize
723KB
MD52fab4c938c2584abae45013a8ffa57e5
SHA1c011dc6b2ee5c7e066c74667ce023553ffeb11ca
SHA2565ab4ef92a2687bcc605bfe932b71cfaff66d84fcc2ab58f50a3b8e334fd3a6f7
SHA5125dc6e20d5fa857cf750c7da431eabdabd6ad36b5e03804c78fbc14612706c82348fd0605151e6e1bfafa78c2ff660ecb904a01cfcf06555b022612f7faff31ff
-
Filesize
169KB
MD51867a1bca728b6fcd340773fe83c9ed4
SHA1ad1cac1a10bf69c7ee6e28ba1c46c57856906f1a
SHA256137769d596822c3d5591aac9dfd9320cd20652e42ec7dc80ddb51f61a27da774
SHA5127565088191a050651ac12ddd5211e470c2ecc4b1f3002fa8a14028e450a3c63be673ba85fbf1b8d1522f2e868eaacd1c33cb45fea1fa46c73130a3e98de3ab7b
-
Filesize
169KB
MD51867a1bca728b6fcd340773fe83c9ed4
SHA1ad1cac1a10bf69c7ee6e28ba1c46c57856906f1a
SHA256137769d596822c3d5591aac9dfd9320cd20652e42ec7dc80ddb51f61a27da774
SHA5127565088191a050651ac12ddd5211e470c2ecc4b1f3002fa8a14028e450a3c63be673ba85fbf1b8d1522f2e868eaacd1c33cb45fea1fa46c73130a3e98de3ab7b
-
Filesize
569KB
MD50e53d303f33e022d7df4a84092506c43
SHA130ca432ef619e7024d109a1a75b94b7915122651
SHA2561c503ffe930f1dd70a9882ff21bd4917bf941586f13ecf26db069d2a3859b9ca
SHA512c50f6d290df45a2641fb2b0aece7ade2ea142c68812b564a8dba96b35d221b33ade6ab27f21635d2fd74a4ac694624bf35826d8049d0d2be8ecf1f762a533f4f
-
Filesize
569KB
MD50e53d303f33e022d7df4a84092506c43
SHA130ca432ef619e7024d109a1a75b94b7915122651
SHA2561c503ffe930f1dd70a9882ff21bd4917bf941586f13ecf26db069d2a3859b9ca
SHA512c50f6d290df45a2641fb2b0aece7ade2ea142c68812b564a8dba96b35d221b33ade6ab27f21635d2fd74a4ac694624bf35826d8049d0d2be8ecf1f762a533f4f
-
Filesize
11KB
MD52242a73e5d03dca57c8136edd90d2de1
SHA1a893a84a8048e464ad5dd78e62be9e4eac326aca
SHA256f55f37a6b45247381b7bd4f7629bd396d1ea86a919fc9a5e7866dc56921cb2d2
SHA51239e2eb06b62f81fc6287a1fa3bdcf3ec34bf5a1eb6e383956db43c28772dd8c281794668a5aaa7ae97c8adb81fc7f174f5676429cd8eeb1957a9ba4d9b454ef0
-
Filesize
11KB
MD52242a73e5d03dca57c8136edd90d2de1
SHA1a893a84a8048e464ad5dd78e62be9e4eac326aca
SHA256f55f37a6b45247381b7bd4f7629bd396d1ea86a919fc9a5e7866dc56921cb2d2
SHA51239e2eb06b62f81fc6287a1fa3bdcf3ec34bf5a1eb6e383956db43c28772dd8c281794668a5aaa7ae97c8adb81fc7f174f5676429cd8eeb1957a9ba4d9b454ef0
-
Filesize
588KB
MD551fd14578ad0c50c779b009dcca912ba
SHA146d0e348e332aeafe2beece04d63fd9732ca7805
SHA256e0b50055ac512b6a639751d4e84de2451f0e8d4c5f8c9e60bc21108a5543695a
SHA512f0264ec5172828765f20ca49f949638a8c1fbbb38ced5abb00e52f9c955cb060578ab7fc5fa0c33fcf9ad6097fcddd67ddb7c5504fc44d96f8c32fca3db536c3
-
Filesize
588KB
MD551fd14578ad0c50c779b009dcca912ba
SHA146d0e348e332aeafe2beece04d63fd9732ca7805
SHA256e0b50055ac512b6a639751d4e84de2451f0e8d4c5f8c9e60bc21108a5543695a
SHA512f0264ec5172828765f20ca49f949638a8c1fbbb38ced5abb00e52f9c955cb060578ab7fc5fa0c33fcf9ad6097fcddd67ddb7c5504fc44d96f8c32fca3db536c3
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1