Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:12
Static task
static1
General
-
Target
c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe
-
Size
1.2MB
-
MD5
ed799acfce69e2965f110ae2733c17b0
-
SHA1
385c9f74017e41be5c81beded3021e2d5c9aa64f
-
SHA256
c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc
-
SHA512
2a05e130c6ebdea63fd4878463d4e1f60c2d81a4ec0522a3bf20dcf6421967ddec4089cc21b516c78645ff51f3d754eb2eb8d1e83413e91a7635e04149459bdb
-
SSDEEP
24576:HyPtzzdi/VCBUt/G0G3zywTZ1VetY7bgAISZJsMkPDjUqSCFGZ:SPtvBWo5Z0AISf5kP0l
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr469170.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr469170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr469170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr469170.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr469170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr469170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr469170.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu002223.exesi107605.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu002223.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si107605.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un021479.exeun511021.exepr469170.exequ002223.exe1.exerk745641.exesi107605.exeoneetx.exeoneetx.exeoneetx.exepid process 2328 un021479.exe 2704 un511021.exe 1052 pr469170.exe 4756 qu002223.exe 4036 1.exe 2020 rk745641.exe 4136 si107605.exe 1692 oneetx.exe 2632 oneetx.exe 4348 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4168 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr469170.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr469170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr469170.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exeun021479.exeun511021.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un021479.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un021479.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un511021.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un511021.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4040 1052 WerFault.exe pr469170.exe 4260 4756 WerFault.exe qu002223.exe 4988 4136 WerFault.exe si107605.exe 2436 4136 WerFault.exe si107605.exe 1400 4136 WerFault.exe si107605.exe 2852 4136 WerFault.exe si107605.exe 5080 4136 WerFault.exe si107605.exe 2644 4136 WerFault.exe si107605.exe 4264 4136 WerFault.exe si107605.exe 4628 4136 WerFault.exe si107605.exe 1680 4136 WerFault.exe si107605.exe 668 4136 WerFault.exe si107605.exe 3512 1692 WerFault.exe oneetx.exe 4368 1692 WerFault.exe oneetx.exe 1952 1692 WerFault.exe oneetx.exe 260 1692 WerFault.exe oneetx.exe 3112 1692 WerFault.exe oneetx.exe 5108 1692 WerFault.exe oneetx.exe 1072 1692 WerFault.exe oneetx.exe 640 1692 WerFault.exe oneetx.exe 4632 1692 WerFault.exe oneetx.exe 3452 1692 WerFault.exe oneetx.exe 4276 1692 WerFault.exe oneetx.exe 2336 2632 WerFault.exe oneetx.exe 580 2632 WerFault.exe oneetx.exe 2604 2632 WerFault.exe oneetx.exe 928 1692 WerFault.exe oneetx.exe 1632 1692 WerFault.exe oneetx.exe 3024 1692 WerFault.exe oneetx.exe 4184 4348 WerFault.exe oneetx.exe 64 4348 WerFault.exe oneetx.exe 4660 4348 WerFault.exe oneetx.exe 4696 1692 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr469170.exe1.exerk745641.exepid process 1052 pr469170.exe 1052 pr469170.exe 4036 1.exe 4036 1.exe 2020 rk745641.exe 2020 rk745641.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr469170.exequ002223.exe1.exerk745641.exedescription pid process Token: SeDebugPrivilege 1052 pr469170.exe Token: SeDebugPrivilege 4756 qu002223.exe Token: SeDebugPrivilege 4036 1.exe Token: SeDebugPrivilege 2020 rk745641.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si107605.exepid process 4136 si107605.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exeun021479.exeun511021.exequ002223.exesi107605.exeoneetx.exedescription pid process target process PID 4944 wrote to memory of 2328 4944 c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe un021479.exe PID 4944 wrote to memory of 2328 4944 c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe un021479.exe PID 4944 wrote to memory of 2328 4944 c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe un021479.exe PID 2328 wrote to memory of 2704 2328 un021479.exe un511021.exe PID 2328 wrote to memory of 2704 2328 un021479.exe un511021.exe PID 2328 wrote to memory of 2704 2328 un021479.exe un511021.exe PID 2704 wrote to memory of 1052 2704 un511021.exe pr469170.exe PID 2704 wrote to memory of 1052 2704 un511021.exe pr469170.exe PID 2704 wrote to memory of 1052 2704 un511021.exe pr469170.exe PID 2704 wrote to memory of 4756 2704 un511021.exe qu002223.exe PID 2704 wrote to memory of 4756 2704 un511021.exe qu002223.exe PID 2704 wrote to memory of 4756 2704 un511021.exe qu002223.exe PID 4756 wrote to memory of 4036 4756 qu002223.exe 1.exe PID 4756 wrote to memory of 4036 4756 qu002223.exe 1.exe PID 4756 wrote to memory of 4036 4756 qu002223.exe 1.exe PID 2328 wrote to memory of 2020 2328 un021479.exe rk745641.exe PID 2328 wrote to memory of 2020 2328 un021479.exe rk745641.exe PID 2328 wrote to memory of 2020 2328 un021479.exe rk745641.exe PID 4944 wrote to memory of 4136 4944 c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe si107605.exe PID 4944 wrote to memory of 4136 4944 c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe si107605.exe PID 4944 wrote to memory of 4136 4944 c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe si107605.exe PID 4136 wrote to memory of 1692 4136 si107605.exe oneetx.exe PID 4136 wrote to memory of 1692 4136 si107605.exe oneetx.exe PID 4136 wrote to memory of 1692 4136 si107605.exe oneetx.exe PID 1692 wrote to memory of 4724 1692 oneetx.exe schtasks.exe PID 1692 wrote to memory of 4724 1692 oneetx.exe schtasks.exe PID 1692 wrote to memory of 4724 1692 oneetx.exe schtasks.exe PID 1692 wrote to memory of 4168 1692 oneetx.exe rundll32.exe PID 1692 wrote to memory of 4168 1692 oneetx.exe rundll32.exe PID 1692 wrote to memory of 4168 1692 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe"C:\Users\Admin\AppData\Local\Temp\c79573d3c2f40b8a3eb60b69962bff83a89c621fb485f77e46e3789799979ffc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un021479.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un021479.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un511021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un511021.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr469170.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr469170.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 10885⤵
- Program crash
PID:4040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu002223.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu002223.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 14645⤵
- Program crash
PID:4260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk745641.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk745641.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si107605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si107605.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 7003⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 7843⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 8603⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 9843⤵
- Program crash
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 9883⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 9883⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 12243⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 12843⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 12403⤵
- Program crash
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 6964⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 8884⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 9404⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 10564⤵
- Program crash
PID:260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 10764⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 10764⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 11084⤵
- Program crash
PID:1072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 8964⤵
- Program crash
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 7724⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 9124⤵
- Program crash
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 12044⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 10764⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 16044⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 13724⤵
- Program crash
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 16204⤵
- Program crash
PID:4696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 17323⤵
- Program crash
PID:668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1052 -ip 10521⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4756 -ip 47561⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4136 -ip 41361⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4136 -ip 41361⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4136 -ip 41361⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4136 -ip 41361⤵PID:904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4136 -ip 41361⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4136 -ip 41361⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4136 -ip 41361⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4136 -ip 41361⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4136 -ip 41361⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4136 -ip 41361⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1692 -ip 16921⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1692 -ip 16921⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1692 -ip 16921⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1692 -ip 16921⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1692 -ip 16921⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1692 -ip 16921⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1692 -ip 16921⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1692 -ip 16921⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1692 -ip 16921⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1692 -ip 16921⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1692 -ip 16921⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 3962⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 4402⤵
- Program crash
PID:580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 4402⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2632 -ip 26321⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2632 -ip 26321⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2632 -ip 26321⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1692 -ip 16921⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1692 -ip 16921⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1692 -ip 16921⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 3962⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 4402⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 4402⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4348 -ip 43481⤵PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4348 -ip 43481⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4348 -ip 43481⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1692 -ip 16921⤵PID:4628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
863KB
MD5531e1b81b3bf3388b4ac7df1544ff1eb
SHA18616015b7dfd2ffb6d99ca7ba8d9ca9848431341
SHA256f447d20671e4c76fae5cd3c86b9246d8a6c36ce455771b57f4768c397cad1947
SHA5120e8f5644ef28f88f059d5e8802011b8958577c3e134cc485bf2b25b360123560e5757a77e39784f8f0c2f227f091395de52610ac48b5d526457e063f087dcfd3
-
Filesize
863KB
MD5531e1b81b3bf3388b4ac7df1544ff1eb
SHA18616015b7dfd2ffb6d99ca7ba8d9ca9848431341
SHA256f447d20671e4c76fae5cd3c86b9246d8a6c36ce455771b57f4768c397cad1947
SHA5120e8f5644ef28f88f059d5e8802011b8958577c3e134cc485bf2b25b360123560e5757a77e39784f8f0c2f227f091395de52610ac48b5d526457e063f087dcfd3
-
Filesize
169KB
MD5bfc4275f6bcb07dfbc654baeb12d4853
SHA1fcef66c09c193a31ffa1fa80560e7a9ce40014c7
SHA256e6bbc653a4c08b8a47fe99f48835f9edeaa270b99c8af5c8dd2ceacfe8fd9c8e
SHA512473e1662e86d73bb8a9da03fbab30a07dcbe53c49914dc4c8c30669b038dbd29445aed6c312f6607d2106b9a8963ebea812fa981c5f3b1840de71191c4fd4cdd
-
Filesize
169KB
MD5bfc4275f6bcb07dfbc654baeb12d4853
SHA1fcef66c09c193a31ffa1fa80560e7a9ce40014c7
SHA256e6bbc653a4c08b8a47fe99f48835f9edeaa270b99c8af5c8dd2ceacfe8fd9c8e
SHA512473e1662e86d73bb8a9da03fbab30a07dcbe53c49914dc4c8c30669b038dbd29445aed6c312f6607d2106b9a8963ebea812fa981c5f3b1840de71191c4fd4cdd
-
Filesize
709KB
MD53be3d6c00d62dc52f7422d3e8b8c5833
SHA1ed53d71adb5d4baded231f4fe885bf15293c5a69
SHA25638e2eebdc6952bb1af2532fe67f3fb46342b1d09583c53e3a510296784c320c8
SHA512613f29d3315a65340ac20aa53d1b7a81a93e21de435bf5f8731f44d8c73672b0e5113b7e22e2abab96e28d08af8e36a0495f4d0f4ae81c6edd6e94a270800635
-
Filesize
709KB
MD53be3d6c00d62dc52f7422d3e8b8c5833
SHA1ed53d71adb5d4baded231f4fe885bf15293c5a69
SHA25638e2eebdc6952bb1af2532fe67f3fb46342b1d09583c53e3a510296784c320c8
SHA512613f29d3315a65340ac20aa53d1b7a81a93e21de435bf5f8731f44d8c73672b0e5113b7e22e2abab96e28d08af8e36a0495f4d0f4ae81c6edd6e94a270800635
-
Filesize
405KB
MD56c4585da758403febfad01b606cbbb0d
SHA1342204caf241e3556b92dafaae86bdad3297d21b
SHA256b01ed5f30212df2de8f701e3b675dca7a788e70ef738740fcdde3bcb7d929a70
SHA512050c2543ea3be48a4d01d502adbdaf76acae30e302e368763ac7a96e4387dac4530c25d9974c2ed18830377ffdd517a43e7c9482137b173d7410cf86747aaf56
-
Filesize
405KB
MD56c4585da758403febfad01b606cbbb0d
SHA1342204caf241e3556b92dafaae86bdad3297d21b
SHA256b01ed5f30212df2de8f701e3b675dca7a788e70ef738740fcdde3bcb7d929a70
SHA512050c2543ea3be48a4d01d502adbdaf76acae30e302e368763ac7a96e4387dac4530c25d9974c2ed18830377ffdd517a43e7c9482137b173d7410cf86747aaf56
-
Filesize
588KB
MD56b7f26e1688906b8328622fd399211d0
SHA1b5294ce8af1e4bded088bfe1e6564ab0cd4aa8e9
SHA256445b7b3bc9a5f7b3ddfce7f31c804a52b5622f40d537dbf178748f5e20ecf718
SHA512123016a1809864849a2c16826174b721c8dc2d5738cb4c2c9b078d9811f1ae5242114bcfb072c6d6fd6b6896f4103d3569973b74d300120333b4e8b9f5ce97aa
-
Filesize
588KB
MD56b7f26e1688906b8328622fd399211d0
SHA1b5294ce8af1e4bded088bfe1e6564ab0cd4aa8e9
SHA256445b7b3bc9a5f7b3ddfce7f31c804a52b5622f40d537dbf178748f5e20ecf718
SHA512123016a1809864849a2c16826174b721c8dc2d5738cb4c2c9b078d9811f1ae5242114bcfb072c6d6fd6b6896f4103d3569973b74d300120333b4e8b9f5ce97aa
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1