Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:10
Static task
static1
General
-
Target
3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe
-
Size
1.2MB
-
MD5
e92f3d25154f584581cd17743f4b249c
-
SHA1
28269ed374a1d61658eb391ab13422dbbc562e2e
-
SHA256
3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647
-
SHA512
b95098ad7b1682e6d8a72bb8d87141a6d4fef374a4cf2a3092d0e10f23ce8ab0fc4e6d9fd0307af190fee518b11e4df5764e465507e8ba062f228bdb67bb2ef9
-
SSDEEP
24576:OyxkTPcP73Q9iWpsARzBnQfQu5fqiYUdB+SSZJDAInw2IzF:dyoP0hHxpQfQgH+SSfkInwj
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr418026.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr418026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr418026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr418026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr418026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr418026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr418026.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu621861.exesi776442.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu621861.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si776442.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un641757.exeun970400.exepr418026.exequ621861.exe1.exerk961269.exesi776442.exeoneetx.exeoneetx.exeoneetx.exepid process 1300 un641757.exe 4852 un970400.exe 1980 pr418026.exe 2204 qu621861.exe 4780 1.exe 3256 rk961269.exe 4240 si776442.exe 2472 oneetx.exe 4528 oneetx.exe 1020 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3156 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr418026.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr418026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr418026.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exeun641757.exeun970400.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un641757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un641757.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un970400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un970400.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2524 1980 WerFault.exe pr418026.exe 3600 2204 WerFault.exe qu621861.exe 3668 4240 WerFault.exe si776442.exe 2144 4240 WerFault.exe si776442.exe 4372 4240 WerFault.exe si776442.exe 2600 4240 WerFault.exe si776442.exe 2272 4240 WerFault.exe si776442.exe 5040 4240 WerFault.exe si776442.exe 972 4240 WerFault.exe si776442.exe 2820 4240 WerFault.exe si776442.exe 692 4240 WerFault.exe si776442.exe 2232 4240 WerFault.exe si776442.exe 4060 2472 WerFault.exe oneetx.exe 4228 2472 WerFault.exe oneetx.exe 1208 2472 WerFault.exe oneetx.exe 2192 2472 WerFault.exe oneetx.exe 2888 2472 WerFault.exe oneetx.exe 2196 2472 WerFault.exe oneetx.exe 3628 2472 WerFault.exe oneetx.exe 2012 2472 WerFault.exe oneetx.exe 884 2472 WerFault.exe oneetx.exe 1388 2472 WerFault.exe oneetx.exe 4672 2472 WerFault.exe oneetx.exe 224 4528 WerFault.exe oneetx.exe 3256 4528 WerFault.exe oneetx.exe 1576 4528 WerFault.exe oneetx.exe 4436 2472 WerFault.exe oneetx.exe 2416 2472 WerFault.exe oneetx.exe 4812 2472 WerFault.exe oneetx.exe 1892 1020 WerFault.exe oneetx.exe 2848 1020 WerFault.exe oneetx.exe 2984 1020 WerFault.exe oneetx.exe 1988 2472 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr418026.exerk961269.exe1.exepid process 1980 pr418026.exe 1980 pr418026.exe 3256 rk961269.exe 3256 rk961269.exe 4780 1.exe 4780 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr418026.exequ621861.exerk961269.exe1.exedescription pid process Token: SeDebugPrivilege 1980 pr418026.exe Token: SeDebugPrivilege 2204 qu621861.exe Token: SeDebugPrivilege 3256 rk961269.exe Token: SeDebugPrivilege 4780 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si776442.exepid process 4240 si776442.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exeun641757.exeun970400.exequ621861.exesi776442.exeoneetx.exedescription pid process target process PID 3772 wrote to memory of 1300 3772 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe un641757.exe PID 3772 wrote to memory of 1300 3772 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe un641757.exe PID 3772 wrote to memory of 1300 3772 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe un641757.exe PID 1300 wrote to memory of 4852 1300 un641757.exe un970400.exe PID 1300 wrote to memory of 4852 1300 un641757.exe un970400.exe PID 1300 wrote to memory of 4852 1300 un641757.exe un970400.exe PID 4852 wrote to memory of 1980 4852 un970400.exe pr418026.exe PID 4852 wrote to memory of 1980 4852 un970400.exe pr418026.exe PID 4852 wrote to memory of 1980 4852 un970400.exe pr418026.exe PID 4852 wrote to memory of 2204 4852 un970400.exe qu621861.exe PID 4852 wrote to memory of 2204 4852 un970400.exe qu621861.exe PID 4852 wrote to memory of 2204 4852 un970400.exe qu621861.exe PID 2204 wrote to memory of 4780 2204 qu621861.exe 1.exe PID 2204 wrote to memory of 4780 2204 qu621861.exe 1.exe PID 2204 wrote to memory of 4780 2204 qu621861.exe 1.exe PID 1300 wrote to memory of 3256 1300 un641757.exe rk961269.exe PID 1300 wrote to memory of 3256 1300 un641757.exe rk961269.exe PID 1300 wrote to memory of 3256 1300 un641757.exe rk961269.exe PID 3772 wrote to memory of 4240 3772 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe si776442.exe PID 3772 wrote to memory of 4240 3772 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe si776442.exe PID 3772 wrote to memory of 4240 3772 3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe si776442.exe PID 4240 wrote to memory of 2472 4240 si776442.exe oneetx.exe PID 4240 wrote to memory of 2472 4240 si776442.exe oneetx.exe PID 4240 wrote to memory of 2472 4240 si776442.exe oneetx.exe PID 2472 wrote to memory of 3912 2472 oneetx.exe schtasks.exe PID 2472 wrote to memory of 3912 2472 oneetx.exe schtasks.exe PID 2472 wrote to memory of 3912 2472 oneetx.exe schtasks.exe PID 2472 wrote to memory of 3156 2472 oneetx.exe rundll32.exe PID 2472 wrote to memory of 3156 2472 oneetx.exe rundll32.exe PID 2472 wrote to memory of 3156 2472 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe"C:\Users\Admin\AppData\Local\Temp\3463d67b50720e2c82b2febd1da085c261ebaf184d15dda6379300ff2f09f647.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un641757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un641757.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un970400.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un970400.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr418026.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr418026.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 11045⤵
- Program crash
PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu621861.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu621861.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 13845⤵
- Program crash
PID:3600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk961269.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk961269.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si776442.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si776442.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 7003⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 7723⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 8803⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 9563⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 9803⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 9803⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 12123⤵
- Program crash
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 12443⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 13163⤵
- Program crash
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 6964⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 9124⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 9524⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 10844⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 9604⤵
- Program crash
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 11164⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 9644⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 10284⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 7564⤵
- Program crash
PID:884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 12644⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 12884⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 9604⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 16204⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 15764⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 16364⤵
- Program crash
PID:1988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 14363⤵
- Program crash
PID:2232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1980 -ip 19801⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2204 -ip 22041⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4240 -ip 42401⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4240 -ip 42401⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4240 -ip 42401⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4240 -ip 42401⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4240 -ip 42401⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4240 -ip 42401⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4240 -ip 42401⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4240 -ip 42401⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4240 -ip 42401⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4240 -ip 42401⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2472 -ip 24721⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2472 -ip 24721⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2472 -ip 24721⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2472 -ip 24721⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2472 -ip 24721⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2472 -ip 24721⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2472 -ip 24721⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2472 -ip 24721⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2472 -ip 24721⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2472 -ip 24721⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2472 -ip 24721⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 3962⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 4402⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 4402⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4528 -ip 45281⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4528 -ip 45281⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4528 -ip 45281⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2472 -ip 24721⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2472 -ip 24721⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2472 -ip 24721⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 3962⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 4602⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 4602⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1020 -ip 10201⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1020 -ip 10201⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1020 -ip 10201⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2472 -ip 24721⤵PID:3120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
862KB
MD5685435062ae42362b4a56a66179ccdf7
SHA117909ad52ffb0d82187b23ba0d392567ecfd392c
SHA25665c3198624ffffe2d1bee796d409ec43c59900551c5dd35cfe5b4201c89ee255
SHA51263064de8d0919b77c4adad8156d68f4db87d47d2e688f9b747fa893bba123286aa1aac023ad5204a98225ca3159ce478aeab586a2ddccb210499bebee582a8b1
-
Filesize
862KB
MD5685435062ae42362b4a56a66179ccdf7
SHA117909ad52ffb0d82187b23ba0d392567ecfd392c
SHA25665c3198624ffffe2d1bee796d409ec43c59900551c5dd35cfe5b4201c89ee255
SHA51263064de8d0919b77c4adad8156d68f4db87d47d2e688f9b747fa893bba123286aa1aac023ad5204a98225ca3159ce478aeab586a2ddccb210499bebee582a8b1
-
Filesize
169KB
MD550bc51f1bac80fa3034b956c52ce7db4
SHA1293d10b4598d5109c0c52cd366384ff919b89332
SHA2567f3bb361579039aa292747ae30f1fa0f629920658bfc422375b5304feede4059
SHA512331044babd14b6bab5baa505eb5dcc9bb6c00a53be4ce59d923929cd833f88973c8aff47e2e129e0ffd6479e311b108d62a04bdde839915c666a06e9daa59dc1
-
Filesize
169KB
MD550bc51f1bac80fa3034b956c52ce7db4
SHA1293d10b4598d5109c0c52cd366384ff919b89332
SHA2567f3bb361579039aa292747ae30f1fa0f629920658bfc422375b5304feede4059
SHA512331044babd14b6bab5baa505eb5dcc9bb6c00a53be4ce59d923929cd833f88973c8aff47e2e129e0ffd6479e311b108d62a04bdde839915c666a06e9daa59dc1
-
Filesize
709KB
MD541d2e20d1d0010df25b0dc0daf1ef471
SHA1cdb3c2f94ac55d856ee9a9ef4a24bb225df4acea
SHA256c58d870b389097dc524c14ea255b4d229520b3048ba1f47c21a530daf4e08b93
SHA512034d5ff351e3f7752cd4f900c20fcf3c4e9a33fc6df7e94c85a7e785edee79f9e6e572482b375100f684bd2d14a4bb0c8a76e37a61a334e18b51eaded0513c4f
-
Filesize
709KB
MD541d2e20d1d0010df25b0dc0daf1ef471
SHA1cdb3c2f94ac55d856ee9a9ef4a24bb225df4acea
SHA256c58d870b389097dc524c14ea255b4d229520b3048ba1f47c21a530daf4e08b93
SHA512034d5ff351e3f7752cd4f900c20fcf3c4e9a33fc6df7e94c85a7e785edee79f9e6e572482b375100f684bd2d14a4bb0c8a76e37a61a334e18b51eaded0513c4f
-
Filesize
405KB
MD53656074f1c3e12dd287af3121e7dddda
SHA10e387781b458326ea016009d69ba6c7b067617d4
SHA2565a08003f2350fd3c1397a830469c5e0ad355f618c155dc83c9da25d8f837c67c
SHA51250b80509d183ba7b1a2e0658be0ed570ec9833ca83b7db7e627a29128d65458e237cf29b08791c7863499bb53995bd5b63a7978e4d33d25126b2e834b8acf2ad
-
Filesize
405KB
MD53656074f1c3e12dd287af3121e7dddda
SHA10e387781b458326ea016009d69ba6c7b067617d4
SHA2565a08003f2350fd3c1397a830469c5e0ad355f618c155dc83c9da25d8f837c67c
SHA51250b80509d183ba7b1a2e0658be0ed570ec9833ca83b7db7e627a29128d65458e237cf29b08791c7863499bb53995bd5b63a7978e4d33d25126b2e834b8acf2ad
-
Filesize
588KB
MD5e36dd77d68ad0419d88ff877da9708f7
SHA1f6d9d9ea4b11a1f7d3c8023bb40857d191549b90
SHA2566d886bc7738587b4900ce3f1993aab7b4e96500e5cba067c78d719c91320fed3
SHA5128e7f802fea136ed39cba6881b81644a4ad6a17674c8fd8f40fce1f5d6461c3b1eb5ae5fc7c9d60afd93f11866025cd1b804bcb92bc74ed411d775ec708544b3b
-
Filesize
588KB
MD5e36dd77d68ad0419d88ff877da9708f7
SHA1f6d9d9ea4b11a1f7d3c8023bb40857d191549b90
SHA2566d886bc7738587b4900ce3f1993aab7b4e96500e5cba067c78d719c91320fed3
SHA5128e7f802fea136ed39cba6881b81644a4ad6a17674c8fd8f40fce1f5d6461c3b1eb5ae5fc7c9d60afd93f11866025cd1b804bcb92bc74ed411d775ec708544b3b
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1