Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:06
Static task
static1
General
-
Target
7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe
-
Size
1.0MB
-
MD5
3f88a379ff0c6e855d7c0c87371aa3e7
-
SHA1
11c42eb192bf0a04b0bc6dd9732811f02ec6ad68
-
SHA256
7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86
-
SHA512
747ee219e7dd28ea0f8f6484b55ca0e2f1e281d37c7e3889d7bf78e975f9abe47af26616856c5140e95b9aa496f4158e50f4575a91619d40f3adecd06d5b8bd6
-
SSDEEP
24576:UyLDdxMKCOLUuR6KQx0RkkrZ2stO8lpreIn3:jLDdxMKCFq6eF20iIn
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it337080.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it337080.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it337080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it337080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it337080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it337080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it337080.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr707320.exelr492125.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr707320.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr492125.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
zimU9868.exeziXO1965.exeit337080.exejr707320.exe1.exekp560283.exelr492125.exeoneetx.exeoneetx.exepid process 2268 zimU9868.exe 4416 ziXO1965.exe 3544 it337080.exe 2976 jr707320.exe 224 1.exe 4804 kp560283.exe 2220 lr492125.exe 1784 oneetx.exe 900 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1440 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it337080.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it337080.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziXO1965.exe7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exezimU9868.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXO1965.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziXO1965.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimU9868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimU9868.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3392 2976 WerFault.exe jr707320.exe 404 2220 WerFault.exe lr492125.exe 4316 2220 WerFault.exe lr492125.exe 4448 2220 WerFault.exe lr492125.exe 3592 2220 WerFault.exe lr492125.exe 1904 2220 WerFault.exe lr492125.exe 2176 2220 WerFault.exe lr492125.exe 4328 2220 WerFault.exe lr492125.exe 5068 2220 WerFault.exe lr492125.exe 2004 2220 WerFault.exe lr492125.exe 1916 2220 WerFault.exe lr492125.exe 1800 2220 WerFault.exe lr492125.exe 4724 1784 WerFault.exe oneetx.exe 2296 1784 WerFault.exe oneetx.exe 4276 1784 WerFault.exe oneetx.exe 3364 1784 WerFault.exe oneetx.exe 816 1784 WerFault.exe oneetx.exe 4140 1784 WerFault.exe oneetx.exe 228 1784 WerFault.exe oneetx.exe 1516 1784 WerFault.exe oneetx.exe 4416 1784 WerFault.exe oneetx.exe 3488 1784 WerFault.exe oneetx.exe 2564 1784 WerFault.exe oneetx.exe 4360 1784 WerFault.exe oneetx.exe 3076 900 WerFault.exe oneetx.exe 2824 900 WerFault.exe oneetx.exe 4272 900 WerFault.exe oneetx.exe 4280 1784 WerFault.exe oneetx.exe 4516 1784 WerFault.exe oneetx.exe 1100 1784 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it337080.exe1.exekp560283.exepid process 3544 it337080.exe 3544 it337080.exe 224 1.exe 4804 kp560283.exe 224 1.exe 4804 kp560283.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it337080.exejr707320.exe1.exekp560283.exedescription pid process Token: SeDebugPrivilege 3544 it337080.exe Token: SeDebugPrivilege 2976 jr707320.exe Token: SeDebugPrivilege 224 1.exe Token: SeDebugPrivilege 4804 kp560283.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr492125.exepid process 2220 lr492125.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exezimU9868.exeziXO1965.exejr707320.exelr492125.exeoneetx.exedescription pid process target process PID 3304 wrote to memory of 2268 3304 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe zimU9868.exe PID 3304 wrote to memory of 2268 3304 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe zimU9868.exe PID 3304 wrote to memory of 2268 3304 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe zimU9868.exe PID 2268 wrote to memory of 4416 2268 zimU9868.exe ziXO1965.exe PID 2268 wrote to memory of 4416 2268 zimU9868.exe ziXO1965.exe PID 2268 wrote to memory of 4416 2268 zimU9868.exe ziXO1965.exe PID 4416 wrote to memory of 3544 4416 ziXO1965.exe it337080.exe PID 4416 wrote to memory of 3544 4416 ziXO1965.exe it337080.exe PID 4416 wrote to memory of 2976 4416 ziXO1965.exe jr707320.exe PID 4416 wrote to memory of 2976 4416 ziXO1965.exe jr707320.exe PID 4416 wrote to memory of 2976 4416 ziXO1965.exe jr707320.exe PID 2976 wrote to memory of 224 2976 jr707320.exe 1.exe PID 2976 wrote to memory of 224 2976 jr707320.exe 1.exe PID 2976 wrote to memory of 224 2976 jr707320.exe 1.exe PID 2268 wrote to memory of 4804 2268 zimU9868.exe kp560283.exe PID 2268 wrote to memory of 4804 2268 zimU9868.exe kp560283.exe PID 2268 wrote to memory of 4804 2268 zimU9868.exe kp560283.exe PID 3304 wrote to memory of 2220 3304 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe lr492125.exe PID 3304 wrote to memory of 2220 3304 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe lr492125.exe PID 3304 wrote to memory of 2220 3304 7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe lr492125.exe PID 2220 wrote to memory of 1784 2220 lr492125.exe oneetx.exe PID 2220 wrote to memory of 1784 2220 lr492125.exe oneetx.exe PID 2220 wrote to memory of 1784 2220 lr492125.exe oneetx.exe PID 1784 wrote to memory of 1760 1784 oneetx.exe schtasks.exe PID 1784 wrote to memory of 1760 1784 oneetx.exe schtasks.exe PID 1784 wrote to memory of 1760 1784 oneetx.exe schtasks.exe PID 1784 wrote to memory of 1440 1784 oneetx.exe rundll32.exe PID 1784 wrote to memory of 1440 1784 oneetx.exe rundll32.exe PID 1784 wrote to memory of 1440 1784 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe"C:\Users\Admin\AppData\Local\Temp\7d1db2ed01de30d2ce3279662d3bb1eb3aae985a77b2ad0fd68abfae1dffef86.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimU9868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimU9868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXO1965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXO1965.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it337080.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it337080.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr707320.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr707320.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 13845⤵
- Program crash
PID:3392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp560283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp560283.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr492125.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr492125.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 7003⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 7923⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 8123⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9563⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9883⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9763⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 12203⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 12403⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 13163⤵
- Program crash
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 13123⤵
- Program crash
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 6964⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 8604⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 9004⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 10564⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 10764⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 10764⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 10884⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 9964⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 12684⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 12844⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 6804⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 11204⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 16084⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 15404⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 16284⤵
- Program crash
PID:1100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 13643⤵
- Program crash
PID:1800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2976 -ip 29761⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2220 -ip 22201⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2220 -ip 22201⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2220 -ip 22201⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2220 -ip 22201⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2220 -ip 22201⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2220 -ip 22201⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2220 -ip 22201⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2220 -ip 22201⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2220 -ip 22201⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2220 -ip 22201⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2220 -ip 22201⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1784 -ip 17841⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1784 -ip 17841⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1784 -ip 17841⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1784 -ip 17841⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1784 -ip 17841⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1784 -ip 17841⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1784 -ip 17841⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1784 -ip 17841⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1784 -ip 17841⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1784 -ip 17841⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1784 -ip 17841⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1784 -ip 17841⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 3962⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 4402⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 4402⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 900 -ip 9001⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 900 -ip 9001⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 900 -ip 9001⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1784 -ip 17841⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1784 -ip 17841⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1784 -ip 17841⤵PID:4812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
724KB
MD55c100894d9db8c875db152281ad5a8db
SHA1ba67271504a5adfd2e95b9adaf1dad713b1b31ad
SHA256a7234eb1a4784f4897ab61fd6ff5d1019b03b4b2d2b86d25242a13a95149319e
SHA512866ca1c3abd8e3693050a9b45f65b8fbbde29d6a4893cb352fe59005eaabfb3d617c86f9d87441adc5e9f0d5ac40b42bc410525320f7cd5409e72ce6aa307d9d
-
Filesize
724KB
MD55c100894d9db8c875db152281ad5a8db
SHA1ba67271504a5adfd2e95b9adaf1dad713b1b31ad
SHA256a7234eb1a4784f4897ab61fd6ff5d1019b03b4b2d2b86d25242a13a95149319e
SHA512866ca1c3abd8e3693050a9b45f65b8fbbde29d6a4893cb352fe59005eaabfb3d617c86f9d87441adc5e9f0d5ac40b42bc410525320f7cd5409e72ce6aa307d9d
-
Filesize
169KB
MD575e5217f9d569cfa90a22fc124dc6f0f
SHA1e279f3e47e572f7c8092ecff84cf809c47eb21b7
SHA2562b4097cff1ec4c86ffc7b4f8ba579defbd83cb6eb999cc3f0bddf90c888a1115
SHA51263b3705ba3f8e505dadcd861095a3b76defca766667c3c918c4d9760cdc2e3c0e148b431871776bf13e2b6cd88d0cf76ac99cb432d1f070a7136e98ccbfc5c30
-
Filesize
169KB
MD575e5217f9d569cfa90a22fc124dc6f0f
SHA1e279f3e47e572f7c8092ecff84cf809c47eb21b7
SHA2562b4097cff1ec4c86ffc7b4f8ba579defbd83cb6eb999cc3f0bddf90c888a1115
SHA51263b3705ba3f8e505dadcd861095a3b76defca766667c3c918c4d9760cdc2e3c0e148b431871776bf13e2b6cd88d0cf76ac99cb432d1f070a7136e98ccbfc5c30
-
Filesize
570KB
MD5a69a3b7d7d8e55ecceaeb15b058136b1
SHA152290342027c0855411e1b5d66ef5fa94d4a2ca9
SHA2563ee30b0138e3ca05c4b02ac1f05b7738a3b53b5f7e53cc63a437b6c11e90ceef
SHA5124c364d0d8b2ea8b0714b357c5a281fceeded53c2b79660999daabcdd715a68d97a2229f2d29ae3688b1a686e6c584fd0d6fdf646da51dbbcc4e780bbca3551f0
-
Filesize
570KB
MD5a69a3b7d7d8e55ecceaeb15b058136b1
SHA152290342027c0855411e1b5d66ef5fa94d4a2ca9
SHA2563ee30b0138e3ca05c4b02ac1f05b7738a3b53b5f7e53cc63a437b6c11e90ceef
SHA5124c364d0d8b2ea8b0714b357c5a281fceeded53c2b79660999daabcdd715a68d97a2229f2d29ae3688b1a686e6c584fd0d6fdf646da51dbbcc4e780bbca3551f0
-
Filesize
11KB
MD5b1012939445665048847458f18e14b06
SHA109fddb3f24f89d154dac1acda18a8582b439765e
SHA256e135361042ba8f18b123c3797892db31a74ae696747214968cc22b27c1d362e8
SHA5123a441f9e06d1cecfe439369013c24cef115ff261b2e94af8270ae0e9d1910bc9f329cdceb82eed3141a14dc6f6b1a9a7efe0a6ce4e7f861f1d683d9dc6bc0b08
-
Filesize
11KB
MD5b1012939445665048847458f18e14b06
SHA109fddb3f24f89d154dac1acda18a8582b439765e
SHA256e135361042ba8f18b123c3797892db31a74ae696747214968cc22b27c1d362e8
SHA5123a441f9e06d1cecfe439369013c24cef115ff261b2e94af8270ae0e9d1910bc9f329cdceb82eed3141a14dc6f6b1a9a7efe0a6ce4e7f861f1d683d9dc6bc0b08
-
Filesize
588KB
MD513c79d7dc2f90c19e7c1b302c57a9ba9
SHA15367dd944e98f67b5af41f85358dc49bf7fa4a97
SHA256f09d5ddcf56b5164f69e70d5a877b10493914c83b931d134c48d508b93db8513
SHA512b0f959ae8f98f1e939fdf45897b36fdf866b7c866f8c8a40e22018d868ff6f61f22695a94b6394a801480b70482f53cb748a740c65b0116cc0cb5005817c6e74
-
Filesize
588KB
MD513c79d7dc2f90c19e7c1b302c57a9ba9
SHA15367dd944e98f67b5af41f85358dc49bf7fa4a97
SHA256f09d5ddcf56b5164f69e70d5a877b10493914c83b931d134c48d508b93db8513
SHA512b0f959ae8f98f1e939fdf45897b36fdf866b7c866f8c8a40e22018d868ff6f61f22695a94b6394a801480b70482f53cb748a740c65b0116cc0cb5005817c6e74
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1