Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:04
Static task
static1
General
-
Target
103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe
-
Size
1.2MB
-
MD5
2d6239e7faa4564426002706f0bdabf7
-
SHA1
5f4b833be1560ed93cb365e30c2d3e94a79de94c
-
SHA256
103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f
-
SHA512
b5be0f6998b0b48ea51fa0d33a1649e05afbc24dd5b684882062ba542f9a5699981783b01b3e92f8f15837285273999783f49a1966439750cb71eecc49b338ae
-
SSDEEP
24576:ZyXii6+ZRp68bXbZn64ACanbo3Xm2YHYaL4SZJKR7pSf8qwiro86:MQyH68bXbZc3o89L4SfC7i8mo
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr940010.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr940010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr940010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr940010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr940010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr940010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr940010.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu154337.exesi981608.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation qu154337.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si981608.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un395238.exeun953677.exepr940010.exequ154337.exe1.exerk543362.exesi981608.exeoneetx.exeoneetx.exeoneetx.exepid process 428 un395238.exe 4832 un953677.exe 4640 pr940010.exe 3416 qu154337.exe 3412 1.exe 3912 rk543362.exe 4456 si981608.exe 4360 oneetx.exe 4536 oneetx.exe 1672 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3900 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr940010.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr940010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr940010.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un395238.exeun953677.exe103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un395238.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un953677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un953677.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un395238.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3640 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2020 4640 WerFault.exe pr940010.exe 4616 3416 WerFault.exe qu154337.exe 4660 4456 WerFault.exe si981608.exe 756 4456 WerFault.exe si981608.exe 4016 4456 WerFault.exe si981608.exe 3596 4456 WerFault.exe si981608.exe 812 4456 WerFault.exe si981608.exe 3644 4456 WerFault.exe si981608.exe 3816 4456 WerFault.exe si981608.exe 2912 4456 WerFault.exe si981608.exe 808 4456 WerFault.exe si981608.exe 4684 4456 WerFault.exe si981608.exe 1028 4360 WerFault.exe oneetx.exe 460 4360 WerFault.exe oneetx.exe 716 4360 WerFault.exe oneetx.exe 3788 4360 WerFault.exe oneetx.exe 1048 4360 WerFault.exe oneetx.exe 3324 4360 WerFault.exe oneetx.exe 3664 4360 WerFault.exe oneetx.exe 4616 4360 WerFault.exe oneetx.exe 2032 4360 WerFault.exe oneetx.exe 4780 4360 WerFault.exe oneetx.exe 4712 4360 WerFault.exe oneetx.exe 2124 4360 WerFault.exe oneetx.exe 428 4536 WerFault.exe oneetx.exe 4864 4536 WerFault.exe oneetx.exe 4528 4536 WerFault.exe oneetx.exe 4016 4360 WerFault.exe oneetx.exe 4336 4360 WerFault.exe oneetx.exe 524 4360 WerFault.exe oneetx.exe 4604 1672 WerFault.exe oneetx.exe 3944 1672 WerFault.exe oneetx.exe 4684 1672 WerFault.exe oneetx.exe 964 4360 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr940010.exerk543362.exe1.exepid process 4640 pr940010.exe 4640 pr940010.exe 3912 rk543362.exe 3412 1.exe 3412 1.exe 3912 rk543362.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr940010.exequ154337.exerk543362.exe1.exedescription pid process Token: SeDebugPrivilege 4640 pr940010.exe Token: SeDebugPrivilege 3416 qu154337.exe Token: SeDebugPrivilege 3912 rk543362.exe Token: SeDebugPrivilege 3412 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si981608.exepid process 4456 si981608.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exeun395238.exeun953677.exequ154337.exesi981608.exeoneetx.exedescription pid process target process PID 2700 wrote to memory of 428 2700 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe un395238.exe PID 2700 wrote to memory of 428 2700 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe un395238.exe PID 2700 wrote to memory of 428 2700 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe un395238.exe PID 428 wrote to memory of 4832 428 un395238.exe un953677.exe PID 428 wrote to memory of 4832 428 un395238.exe un953677.exe PID 428 wrote to memory of 4832 428 un395238.exe un953677.exe PID 4832 wrote to memory of 4640 4832 un953677.exe pr940010.exe PID 4832 wrote to memory of 4640 4832 un953677.exe pr940010.exe PID 4832 wrote to memory of 4640 4832 un953677.exe pr940010.exe PID 4832 wrote to memory of 3416 4832 un953677.exe qu154337.exe PID 4832 wrote to memory of 3416 4832 un953677.exe qu154337.exe PID 4832 wrote to memory of 3416 4832 un953677.exe qu154337.exe PID 3416 wrote to memory of 3412 3416 qu154337.exe 1.exe PID 3416 wrote to memory of 3412 3416 qu154337.exe 1.exe PID 3416 wrote to memory of 3412 3416 qu154337.exe 1.exe PID 428 wrote to memory of 3912 428 un395238.exe rk543362.exe PID 428 wrote to memory of 3912 428 un395238.exe rk543362.exe PID 428 wrote to memory of 3912 428 un395238.exe rk543362.exe PID 2700 wrote to memory of 4456 2700 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe si981608.exe PID 2700 wrote to memory of 4456 2700 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe si981608.exe PID 2700 wrote to memory of 4456 2700 103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe si981608.exe PID 4456 wrote to memory of 4360 4456 si981608.exe oneetx.exe PID 4456 wrote to memory of 4360 4456 si981608.exe oneetx.exe PID 4456 wrote to memory of 4360 4456 si981608.exe oneetx.exe PID 4360 wrote to memory of 3920 4360 oneetx.exe schtasks.exe PID 4360 wrote to memory of 3920 4360 oneetx.exe schtasks.exe PID 4360 wrote to memory of 3920 4360 oneetx.exe schtasks.exe PID 4360 wrote to memory of 3900 4360 oneetx.exe rundll32.exe PID 4360 wrote to memory of 3900 4360 oneetx.exe rundll32.exe PID 4360 wrote to memory of 3900 4360 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe"C:\Users\Admin\AppData\Local\Temp\103ff47cb8303b6647f2ce2777d21a60ca977bf94cbf2f728daa61b8c4c0538f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un395238.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un395238.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un953677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un953677.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr940010.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr940010.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 10845⤵
- Program crash
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu154337.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu154337.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 11845⤵
- Program crash
PID:4616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk543362.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk543362.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981608.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981608.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 7003⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 7843⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 8163⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 9723⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 9803⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 9803⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 12203⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 12683⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 13443⤵
- Program crash
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 6964⤵
- Program crash
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 10084⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 10204⤵
- Program crash
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 11124⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 10204⤵
- Program crash
PID:1048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 11284⤵
- Program crash
PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 10764⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 10804⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 9964⤵
- Program crash
PID:2032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 7204⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 7404⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 7804⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 10204⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 16124⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 15724⤵
- Program crash
PID:524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 16604⤵
- Program crash
PID:964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 13723⤵
- Program crash
PID:4684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4640 -ip 46401⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3416 -ip 34161⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4456 -ip 44561⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4456 -ip 44561⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4456 -ip 44561⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4456 -ip 44561⤵PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4456 -ip 44561⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4456 -ip 44561⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4456 -ip 44561⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4456 -ip 44561⤵PID:524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4456 -ip 44561⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4456 -ip 44561⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4360 -ip 43601⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4360 -ip 43601⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4360 -ip 43601⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4360 -ip 43601⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4360 -ip 43601⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4360 -ip 43601⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4360 -ip 43601⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4360 -ip 43601⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4360 -ip 43601⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4360 -ip 43601⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4360 -ip 43601⤵PID:2624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4360 -ip 43601⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 3962⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 4402⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 5122⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4536 -ip 45361⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4536 -ip 45361⤵PID:112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4536 -ip 45361⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4360 -ip 43601⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4360 -ip 43601⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4360 -ip 43601⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 4002⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 4402⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 4402⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1672 -ip 16721⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1672 -ip 16721⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1672 -ip 16721⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4360 -ip 43601⤵PID:1436
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
862KB
MD58082f4b6473bd613d839f23f843f03c9
SHA16920076c8ab0ae874726dd2207e4613e076a32fd
SHA256e138b33cb12432a5eb14afa9cf863603f21e1f1cf7e59f3b7496820e039575fe
SHA5126aa0b1b6ab008ecbc7660f81cfb90693e64843429a4587d1b9477d279c02f5d48677241ddeab0edb1f0e4182570e33b0b12e7cd558368d6a3a86b56489fb7bd5
-
Filesize
862KB
MD58082f4b6473bd613d839f23f843f03c9
SHA16920076c8ab0ae874726dd2207e4613e076a32fd
SHA256e138b33cb12432a5eb14afa9cf863603f21e1f1cf7e59f3b7496820e039575fe
SHA5126aa0b1b6ab008ecbc7660f81cfb90693e64843429a4587d1b9477d279c02f5d48677241ddeab0edb1f0e4182570e33b0b12e7cd558368d6a3a86b56489fb7bd5
-
Filesize
169KB
MD5bfbf7e2663f7ac23234bc40571dc4a01
SHA14149fac6cfbdb889eb5e1ba252895615688ae8d7
SHA256a1dbf0610c90aa833dcccd697463dafc29e81e765dd56e933d831f98924268ac
SHA512569b92d1a7dc9962ab2840a9dc8b3bbba7c3353440db208e63c4083a29f8bceaacdb3d397b6fb34e9a5ae3748d1c68a37eaaf34063049d71be4bdb3a032ce127
-
Filesize
169KB
MD5bfbf7e2663f7ac23234bc40571dc4a01
SHA14149fac6cfbdb889eb5e1ba252895615688ae8d7
SHA256a1dbf0610c90aa833dcccd697463dafc29e81e765dd56e933d831f98924268ac
SHA512569b92d1a7dc9962ab2840a9dc8b3bbba7c3353440db208e63c4083a29f8bceaacdb3d397b6fb34e9a5ae3748d1c68a37eaaf34063049d71be4bdb3a032ce127
-
Filesize
708KB
MD5f7bbcf9c1c3a253af0fcd8db64dfb273
SHA1abe9983f5b253a174cc3177e5617df1e5c0d3d7d
SHA25633a42efe51b3bb132fed87118aed9028cd748fc13310d38523ee4a339e6499f7
SHA512f2762c13e2d2dc83423f7d8b0f8c762afef608bc4c16e04f249e964c6f484699c0f5df618fd9633780031688fa4efb61cf1c54a7562eab8e461efbd8bf71632a
-
Filesize
708KB
MD5f7bbcf9c1c3a253af0fcd8db64dfb273
SHA1abe9983f5b253a174cc3177e5617df1e5c0d3d7d
SHA25633a42efe51b3bb132fed87118aed9028cd748fc13310d38523ee4a339e6499f7
SHA512f2762c13e2d2dc83423f7d8b0f8c762afef608bc4c16e04f249e964c6f484699c0f5df618fd9633780031688fa4efb61cf1c54a7562eab8e461efbd8bf71632a
-
Filesize
405KB
MD5d2773d9b882fecc4ed779a2aeb542df0
SHA136d28ea79fe27e3e32f4da6665ade8a3cc133159
SHA2564dc283ad6056f008ec4b40f2aa86416dd371734084141fb4d1403adde909b93e
SHA512869c149d44fbc778c4df4e4e38858449f9266babc6beb3b33a9ecd0e7fc8db314076237e1fbc7c4ad88e76df3deaa897f17670283f46f013ceec692a4129a231
-
Filesize
405KB
MD5d2773d9b882fecc4ed779a2aeb542df0
SHA136d28ea79fe27e3e32f4da6665ade8a3cc133159
SHA2564dc283ad6056f008ec4b40f2aa86416dd371734084141fb4d1403adde909b93e
SHA512869c149d44fbc778c4df4e4e38858449f9266babc6beb3b33a9ecd0e7fc8db314076237e1fbc7c4ad88e76df3deaa897f17670283f46f013ceec692a4129a231
-
Filesize
588KB
MD5a81689f9e172c043e112905ee822107e
SHA1f7389f747febfb395d51b9d5cffc93e4ff906d39
SHA25690d96a7349fb640588d2d01a13a852574c7f51a9de2523a0fc7cdab423790b53
SHA512df204db122f801f9562ef3a2147f42d18bc582d91cd441b2f33c27eb5f78594139aa96560078434b1383310ae9dca792c6f27402a557c55746de01b9ec0e4b01
-
Filesize
588KB
MD5a81689f9e172c043e112905ee822107e
SHA1f7389f747febfb395d51b9d5cffc93e4ff906d39
SHA25690d96a7349fb640588d2d01a13a852574c7f51a9de2523a0fc7cdab423790b53
SHA512df204db122f801f9562ef3a2147f42d18bc582d91cd441b2f33c27eb5f78594139aa96560078434b1383310ae9dca792c6f27402a557c55746de01b9ec0e4b01
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1