Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:18
Static task
static1
General
-
Target
faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe
-
Size
1.0MB
-
MD5
0fdcf3be4e540a72ac834df059548149
-
SHA1
1a699e2100d0b8c8b94664c57be35dce5f569d92
-
SHA256
faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50
-
SHA512
cfea853b34fee30f1bd7a5d0e245722cea1cf8a1234cc9826dd81749e29c3abfe554b8927babdcc7bb38906b8fd08ac689cc5486083ca9757b80e0214a82f722
-
SSDEEP
24576:wypSgZouDRYXVa236EbSyy4cRtfYIfTS1JjRF3yYL4Q/+jLFQa:3GuDRcV5365lfTSjdFuRjLFQ
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it972848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it972848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it972848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it972848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it972848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it972848.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it972848.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exejr955558.exelr445257.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation jr955558.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr445257.exe -
Executes dropped EXE 10 IoCs
Processes:
ziTj0130.exeziAa5992.exeit972848.exejr955558.exe1.exekp246054.exelr445257.exeoneetx.exeoneetx.exeoneetx.exepid process 4316 ziTj0130.exe 1324 ziAa5992.exe 4224 it972848.exe 3580 jr955558.exe 4380 1.exe 3288 kp246054.exe 1984 lr445257.exe 4704 oneetx.exe 3084 oneetx.exe 4828 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2148 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it972848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it972848.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exeziTj0130.exeziAa5992.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTj0130.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTj0130.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAa5992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziAa5992.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 824 3580 WerFault.exe jr955558.exe 4292 1984 WerFault.exe lr445257.exe 4848 1984 WerFault.exe lr445257.exe 368 1984 WerFault.exe lr445257.exe 4568 1984 WerFault.exe lr445257.exe 320 1984 WerFault.exe lr445257.exe 3972 1984 WerFault.exe lr445257.exe 1796 1984 WerFault.exe lr445257.exe 4760 1984 WerFault.exe lr445257.exe 1752 1984 WerFault.exe lr445257.exe 2216 1984 WerFault.exe lr445257.exe 4600 4704 WerFault.exe oneetx.exe 5044 4704 WerFault.exe oneetx.exe 3108 4704 WerFault.exe oneetx.exe 4740 4704 WerFault.exe oneetx.exe 4744 4704 WerFault.exe oneetx.exe 1820 4704 WerFault.exe oneetx.exe 4152 4704 WerFault.exe oneetx.exe 872 4704 WerFault.exe oneetx.exe 1248 4704 WerFault.exe oneetx.exe 1860 4704 WerFault.exe oneetx.exe 4256 4704 WerFault.exe oneetx.exe 4692 4704 WerFault.exe oneetx.exe 3688 3084 WerFault.exe oneetx.exe 4364 3084 WerFault.exe oneetx.exe 4924 3084 WerFault.exe oneetx.exe 1820 4704 WerFault.exe oneetx.exe 4016 4704 WerFault.exe oneetx.exe 3512 4704 WerFault.exe oneetx.exe 4232 4704 WerFault.exe oneetx.exe 5092 4828 WerFault.exe oneetx.exe 3860 4828 WerFault.exe oneetx.exe 5040 4828 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it972848.exe1.exekp246054.exepid process 4224 it972848.exe 4224 it972848.exe 4380 1.exe 3288 kp246054.exe 4380 1.exe 3288 kp246054.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it972848.exejr955558.exe1.exekp246054.exedescription pid process Token: SeDebugPrivilege 4224 it972848.exe Token: SeDebugPrivilege 3580 jr955558.exe Token: SeDebugPrivilege 4380 1.exe Token: SeDebugPrivilege 3288 kp246054.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr445257.exepid process 1984 lr445257.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exeziTj0130.exeziAa5992.exejr955558.exelr445257.exeoneetx.exedescription pid process target process PID 3568 wrote to memory of 4316 3568 faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe ziTj0130.exe PID 3568 wrote to memory of 4316 3568 faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe ziTj0130.exe PID 3568 wrote to memory of 4316 3568 faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe ziTj0130.exe PID 4316 wrote to memory of 1324 4316 ziTj0130.exe ziAa5992.exe PID 4316 wrote to memory of 1324 4316 ziTj0130.exe ziAa5992.exe PID 4316 wrote to memory of 1324 4316 ziTj0130.exe ziAa5992.exe PID 1324 wrote to memory of 4224 1324 ziAa5992.exe it972848.exe PID 1324 wrote to memory of 4224 1324 ziAa5992.exe it972848.exe PID 1324 wrote to memory of 3580 1324 ziAa5992.exe jr955558.exe PID 1324 wrote to memory of 3580 1324 ziAa5992.exe jr955558.exe PID 1324 wrote to memory of 3580 1324 ziAa5992.exe jr955558.exe PID 3580 wrote to memory of 4380 3580 jr955558.exe 1.exe PID 3580 wrote to memory of 4380 3580 jr955558.exe 1.exe PID 3580 wrote to memory of 4380 3580 jr955558.exe 1.exe PID 4316 wrote to memory of 3288 4316 ziTj0130.exe kp246054.exe PID 4316 wrote to memory of 3288 4316 ziTj0130.exe kp246054.exe PID 4316 wrote to memory of 3288 4316 ziTj0130.exe kp246054.exe PID 3568 wrote to memory of 1984 3568 faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe lr445257.exe PID 3568 wrote to memory of 1984 3568 faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe lr445257.exe PID 3568 wrote to memory of 1984 3568 faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe lr445257.exe PID 1984 wrote to memory of 4704 1984 lr445257.exe oneetx.exe PID 1984 wrote to memory of 4704 1984 lr445257.exe oneetx.exe PID 1984 wrote to memory of 4704 1984 lr445257.exe oneetx.exe PID 4704 wrote to memory of 4160 4704 oneetx.exe schtasks.exe PID 4704 wrote to memory of 4160 4704 oneetx.exe schtasks.exe PID 4704 wrote to memory of 4160 4704 oneetx.exe schtasks.exe PID 4704 wrote to memory of 2148 4704 oneetx.exe rundll32.exe PID 4704 wrote to memory of 2148 4704 oneetx.exe rundll32.exe PID 4704 wrote to memory of 2148 4704 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe"C:\Users\Admin\AppData\Local\Temp\faf406856cea54759e2400590ffb349f09c665ea623bd895065ce996f58b6b50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTj0130.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTj0130.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAa5992.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAa5992.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it972848.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it972848.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr955558.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr955558.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 14965⤵
- Program crash
PID:824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp246054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp246054.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr445257.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr445257.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 7003⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 7323⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 8083⤵
- Program crash
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 9763⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 9523⤵
- Program crash
PID:320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 9603⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 12243⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 12243⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 13243⤵
- Program crash
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 6964⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9004⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9524⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10924⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10844⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10844⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9604⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10284⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 7804⤵
- Program crash
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 6804⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 8764⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 14924⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 11164⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 16044⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 15004⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 16364⤵
- Program crash
PID:4232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 14123⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3580 -ip 35801⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1984 -ip 19841⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1984 -ip 19841⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1984 -ip 19841⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1984 -ip 19841⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1984 -ip 19841⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1984 -ip 19841⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1984 -ip 19841⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1984 -ip 19841⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1984 -ip 19841⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1984 -ip 19841⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4704 -ip 47041⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4704 -ip 47041⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4704 -ip 47041⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4704 -ip 47041⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4704 -ip 47041⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4704 -ip 47041⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4704 -ip 47041⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4704 -ip 47041⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4704 -ip 47041⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4704 -ip 47041⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4704 -ip 47041⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4704 -ip 47041⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 3962⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 4402⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 4402⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3084 -ip 30841⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3084 -ip 30841⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3084 -ip 30841⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4704 -ip 47041⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4704 -ip 47041⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4704 -ip 47041⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4704 -ip 47041⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 3962⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 4402⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 4402⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4828 -ip 48281⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4828 -ip 48281⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4828 -ip 48281⤵PID:4380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD5f62f37ebb1529131a57b8d89f432596e
SHA156b40ebe8a2642c6d7900e9df6181c9373c62960
SHA25691ac44d764a230e6c0d2ece678fd6dd13a3e79f915463d8785f45d49f078d894
SHA512e5bc0699a60516577b0e9a44d4baf44786eacb3a8de9226f8c23f4bb3c4a70214670d3141280e392c71eb58a1abdce73af0d34c7ade3cd205afd836917e9985a
-
Filesize
723KB
MD5f62f37ebb1529131a57b8d89f432596e
SHA156b40ebe8a2642c6d7900e9df6181c9373c62960
SHA25691ac44d764a230e6c0d2ece678fd6dd13a3e79f915463d8785f45d49f078d894
SHA512e5bc0699a60516577b0e9a44d4baf44786eacb3a8de9226f8c23f4bb3c4a70214670d3141280e392c71eb58a1abdce73af0d34c7ade3cd205afd836917e9985a
-
Filesize
169KB
MD567840696b5f14245822118fd0d5dfcc9
SHA17f75e455a1de1f13f8538a91ec735f7f7f791c97
SHA2565f319ccf55d681dfb46153bb3535c3553a325f962dbbb00ac6df7cdcfbbc234c
SHA512c0c9b7491d73361caa552260fa8d02ffc6bd7ea683305861b5613e1e87c6fcd72fbcc849f47c8db284a5acf93e534badafbcbcf1bec6430cab5e7e2aca8cca1c
-
Filesize
169KB
MD567840696b5f14245822118fd0d5dfcc9
SHA17f75e455a1de1f13f8538a91ec735f7f7f791c97
SHA2565f319ccf55d681dfb46153bb3535c3553a325f962dbbb00ac6df7cdcfbbc234c
SHA512c0c9b7491d73361caa552260fa8d02ffc6bd7ea683305861b5613e1e87c6fcd72fbcc849f47c8db284a5acf93e534badafbcbcf1bec6430cab5e7e2aca8cca1c
-
Filesize
569KB
MD51de50a6bcf2d2f2fba3f9f320c101e1d
SHA1770d5214555d612ee378f9d353189c70bf5db5d1
SHA2564b5e75c633b4bd09a49821cb12ecccc800a801e4dc759cf9a463e736957f74b2
SHA51201cbc7dc2931b830585fcfce966bc70ef59c33f172cf6d1aafc9d241815d4b909612772191cdaff1f5866062f7cedcb1844e36e3c3354c2b983bbfb621f41e45
-
Filesize
569KB
MD51de50a6bcf2d2f2fba3f9f320c101e1d
SHA1770d5214555d612ee378f9d353189c70bf5db5d1
SHA2564b5e75c633b4bd09a49821cb12ecccc800a801e4dc759cf9a463e736957f74b2
SHA51201cbc7dc2931b830585fcfce966bc70ef59c33f172cf6d1aafc9d241815d4b909612772191cdaff1f5866062f7cedcb1844e36e3c3354c2b983bbfb621f41e45
-
Filesize
11KB
MD504f3c63ce81835b2054683bcfc3dde69
SHA1cd1f5d0a2a905ac46c556dd1157ae6bfddfdae4e
SHA2567539469ced6e51a6dad4db72bc209948028e863dbda0a33910f700056964a6f9
SHA5120593f081909f7fd614dc073404527c64341929a90bf93fbdef9758100d99260eb94c8e521e70cae42cd9ee0921e93860588ab8e8a9f88c3cb819567f215277ad
-
Filesize
11KB
MD504f3c63ce81835b2054683bcfc3dde69
SHA1cd1f5d0a2a905ac46c556dd1157ae6bfddfdae4e
SHA2567539469ced6e51a6dad4db72bc209948028e863dbda0a33910f700056964a6f9
SHA5120593f081909f7fd614dc073404527c64341929a90bf93fbdef9758100d99260eb94c8e521e70cae42cd9ee0921e93860588ab8e8a9f88c3cb819567f215277ad
-
Filesize
588KB
MD5f798d4c8f66c26c6cc9b024e828ddf18
SHA1f6eed46d8abcbe24a11f995845423aed21126d70
SHA256f290f54952270bd84b7f3ca5519023ef16495c0dae55858d080bb0513ae4c576
SHA512002e91aac4d60ffd0be77789eb826ba483c0c2dac4abe99fc927de4983d6ae18ff44b179f7fae388bd4b72da87d5a49381ac29b2cdc16754de76a823177f53b8
-
Filesize
588KB
MD5f798d4c8f66c26c6cc9b024e828ddf18
SHA1f6eed46d8abcbe24a11f995845423aed21126d70
SHA256f290f54952270bd84b7f3ca5519023ef16495c0dae55858d080bb0513ae4c576
SHA512002e91aac4d60ffd0be77789eb826ba483c0c2dac4abe99fc927de4983d6ae18ff44b179f7fae388bd4b72da87d5a49381ac29b2cdc16754de76a823177f53b8
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1