Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 06:29
Static task
static1
General
-
Target
0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe
-
Size
1.0MB
-
MD5
118d7d134fb726883f8dd0cf1e08e1b7
-
SHA1
93c2f19ef5730605ca72c1758531cbbbe685d742
-
SHA256
0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798
-
SHA512
cfe8de8963028c3cf026a3382cd311c2dc035c664cf649d8e2dffdb2945e196f0d9e2f0956fbf2d446af28053c09db79137be37899ce75b1d9270143c6af5106
-
SSDEEP
24576:0yfX1ySgqOG4Vvgwkg/V9ckL/FkMTpNTD2DTwwKX6ImwDzfI:Df1ySxOG4+9g/B/yMdNvF+wDzf
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it395416.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it395416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it395416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it395416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it395416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it395416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it395416.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr691859.exelr906494.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr691859.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr906494.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zizb9460.exeziwe0198.exeit395416.exejr691859.exe1.exekp570375.exelr906494.exeoneetx.exeoneetx.exeoneetx.exepid process 1536 zizb9460.exe 4004 ziwe0198.exe 440 it395416.exe 112 jr691859.exe 636 1.exe 3636 kp570375.exe 4436 lr906494.exe 3632 oneetx.exe 1824 oneetx.exe 1336 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4828 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it395416.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it395416.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exezizb9460.exeziwe0198.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizb9460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizb9460.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziwe0198.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziwe0198.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4864 112 WerFault.exe jr691859.exe 1692 4436 WerFault.exe lr906494.exe 4680 4436 WerFault.exe lr906494.exe 5088 4436 WerFault.exe lr906494.exe 3216 4436 WerFault.exe lr906494.exe 3924 4436 WerFault.exe lr906494.exe 3408 4436 WerFault.exe lr906494.exe 3796 4436 WerFault.exe lr906494.exe 4464 4436 WerFault.exe lr906494.exe 3000 4436 WerFault.exe lr906494.exe 2848 4436 WerFault.exe lr906494.exe 4952 3632 WerFault.exe oneetx.exe 4468 3632 WerFault.exe oneetx.exe 4144 3632 WerFault.exe oneetx.exe 1468 3632 WerFault.exe oneetx.exe 4016 3632 WerFault.exe oneetx.exe 4404 3632 WerFault.exe oneetx.exe 4108 3632 WerFault.exe oneetx.exe 1648 3632 WerFault.exe oneetx.exe 3028 3632 WerFault.exe oneetx.exe 3784 3632 WerFault.exe oneetx.exe 2156 3632 WerFault.exe oneetx.exe 4480 3632 WerFault.exe oneetx.exe 3852 1824 WerFault.exe oneetx.exe 1432 1824 WerFault.exe oneetx.exe 1064 1824 WerFault.exe oneetx.exe 1924 3632 WerFault.exe oneetx.exe 1696 3632 WerFault.exe oneetx.exe 3404 3632 WerFault.exe oneetx.exe 2304 1336 WerFault.exe oneetx.exe 3672 1336 WerFault.exe oneetx.exe 3332 1336 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it395416.exekp570375.exe1.exepid process 440 it395416.exe 440 it395416.exe 3636 kp570375.exe 636 1.exe 636 1.exe 3636 kp570375.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it395416.exejr691859.exekp570375.exe1.exedescription pid process Token: SeDebugPrivilege 440 it395416.exe Token: SeDebugPrivilege 112 jr691859.exe Token: SeDebugPrivilege 3636 kp570375.exe Token: SeDebugPrivilege 636 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr906494.exepid process 4436 lr906494.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exezizb9460.exeziwe0198.exejr691859.exelr906494.exeoneetx.exedescription pid process target process PID 4224 wrote to memory of 1536 4224 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe zizb9460.exe PID 4224 wrote to memory of 1536 4224 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe zizb9460.exe PID 4224 wrote to memory of 1536 4224 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe zizb9460.exe PID 1536 wrote to memory of 4004 1536 zizb9460.exe ziwe0198.exe PID 1536 wrote to memory of 4004 1536 zizb9460.exe ziwe0198.exe PID 1536 wrote to memory of 4004 1536 zizb9460.exe ziwe0198.exe PID 4004 wrote to memory of 440 4004 ziwe0198.exe it395416.exe PID 4004 wrote to memory of 440 4004 ziwe0198.exe it395416.exe PID 4004 wrote to memory of 112 4004 ziwe0198.exe jr691859.exe PID 4004 wrote to memory of 112 4004 ziwe0198.exe jr691859.exe PID 4004 wrote to memory of 112 4004 ziwe0198.exe jr691859.exe PID 112 wrote to memory of 636 112 jr691859.exe 1.exe PID 112 wrote to memory of 636 112 jr691859.exe 1.exe PID 112 wrote to memory of 636 112 jr691859.exe 1.exe PID 1536 wrote to memory of 3636 1536 zizb9460.exe kp570375.exe PID 1536 wrote to memory of 3636 1536 zizb9460.exe kp570375.exe PID 1536 wrote to memory of 3636 1536 zizb9460.exe kp570375.exe PID 4224 wrote to memory of 4436 4224 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe lr906494.exe PID 4224 wrote to memory of 4436 4224 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe lr906494.exe PID 4224 wrote to memory of 4436 4224 0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe lr906494.exe PID 4436 wrote to memory of 3632 4436 lr906494.exe oneetx.exe PID 4436 wrote to memory of 3632 4436 lr906494.exe oneetx.exe PID 4436 wrote to memory of 3632 4436 lr906494.exe oneetx.exe PID 3632 wrote to memory of 1840 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 1840 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 1840 3632 oneetx.exe schtasks.exe PID 3632 wrote to memory of 4828 3632 oneetx.exe rundll32.exe PID 3632 wrote to memory of 4828 3632 oneetx.exe rundll32.exe PID 3632 wrote to memory of 4828 3632 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe"C:\Users\Admin\AppData\Local\Temp\0c56b0a80644a6bb460cba2d54aa8b71f4e264cb5b4491d1a07381188317a798.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizb9460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizb9460.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwe0198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwe0198.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it395416.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it395416.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr691859.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr691859.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 15445⤵
- Program crash
PID:4864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp570375.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp570375.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906494.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 7003⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 7683⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 8603⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 8683⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 8643⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 8643⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 12163⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 12363⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 13163⤵
- Program crash
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 6964⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8404⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8404⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10564⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11004⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10564⤵
- Program crash
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10924⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10044⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8724⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7404⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7364⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10564⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 16364⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10844⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 16444⤵
- Program crash
PID:3404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 13603⤵
- Program crash
PID:2848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 112 -ip 1121⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4436 -ip 44361⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4436 -ip 44361⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4436 -ip 44361⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4436 -ip 44361⤵PID:512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4436 -ip 44361⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4436 -ip 44361⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4436 -ip 44361⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4436 -ip 44361⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4436 -ip 44361⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4436 -ip 44361⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3632 -ip 36321⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3632 -ip 36321⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3632 -ip 36321⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3632 -ip 36321⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3632 -ip 36321⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3632 -ip 36321⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3632 -ip 36321⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3632 -ip 36321⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3632 -ip 36321⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3632 -ip 36321⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 4002⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 4402⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 4402⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1824 -ip 18241⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1824 -ip 18241⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1824 -ip 18241⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3632 -ip 36321⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3632 -ip 36321⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3632 -ip 36321⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 3962⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 4402⤵
- Program crash
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 4402⤵
- Program crash
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1336 -ip 13361⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1336 -ip 13361⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1336 -ip 13361⤵PID:4688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD542ec30da2c220ae9bf5bf8f863536b2f
SHA17f7faecd2f523674f6e3441dc3016b824836dda9
SHA256516092a33409e02704a1c7e572a0f94566213e2d9fa7a2fc808d1e31c59f1373
SHA51236ac04ace9540ed0ba79a0b3fec110e806aa0ba0edc29a4832e874e15df509c7974e6ada364d540d72cc2c87ff391bb5bd9cef1f7a426bf54f94e7f4bf0a82fa
-
Filesize
723KB
MD542ec30da2c220ae9bf5bf8f863536b2f
SHA17f7faecd2f523674f6e3441dc3016b824836dda9
SHA256516092a33409e02704a1c7e572a0f94566213e2d9fa7a2fc808d1e31c59f1373
SHA51236ac04ace9540ed0ba79a0b3fec110e806aa0ba0edc29a4832e874e15df509c7974e6ada364d540d72cc2c87ff391bb5bd9cef1f7a426bf54f94e7f4bf0a82fa
-
Filesize
169KB
MD5579e41590e569afa9e73c3093607fffa
SHA1dd88cac7df48f6ad1de458b1c3e31db8bebcdfac
SHA2564207c547b3e3a9907274aaa412a17c34cbb9957a5a46f8b40673711a57fa8ada
SHA512dd2be135c9e7689678db41abe033a41fa53c8eefa230dc9bf30e58995475110209a41e223f8716dca02fe2a3c4227fa619659ed7b4c430368b74827b6171b460
-
Filesize
169KB
MD5579e41590e569afa9e73c3093607fffa
SHA1dd88cac7df48f6ad1de458b1c3e31db8bebcdfac
SHA2564207c547b3e3a9907274aaa412a17c34cbb9957a5a46f8b40673711a57fa8ada
SHA512dd2be135c9e7689678db41abe033a41fa53c8eefa230dc9bf30e58995475110209a41e223f8716dca02fe2a3c4227fa619659ed7b4c430368b74827b6171b460
-
Filesize
569KB
MD56226d938e2059e1f74e1f348c880432f
SHA1aac82382b4d7738ecf240969b20762f91964c54f
SHA2561546dcafdc7349ecf4901e14e7f5d748394310a7b53cc1f05b886817e154c714
SHA512d4e96d3e1e5243e6d4a8575ffa289e18f8ce031980cbc4e793df60c767704bcb47515cafba718e1d417b0e34c4360fa7624fa19267e087ad13e94e2f8c910aa0
-
Filesize
569KB
MD56226d938e2059e1f74e1f348c880432f
SHA1aac82382b4d7738ecf240969b20762f91964c54f
SHA2561546dcafdc7349ecf4901e14e7f5d748394310a7b53cc1f05b886817e154c714
SHA512d4e96d3e1e5243e6d4a8575ffa289e18f8ce031980cbc4e793df60c767704bcb47515cafba718e1d417b0e34c4360fa7624fa19267e087ad13e94e2f8c910aa0
-
Filesize
11KB
MD520a5ad7bd434d8aa535c4d8492ad8077
SHA11066d688402a69e37c54054594ec11528f8fe1b9
SHA25619208e6f205b52447a51a79d81b8db75f91a926664d993343c071ebeb3eeb77d
SHA51216cba28218388d99e7f6c3c0cc08effed9c073452b7a331ae3f819d3567d0a3b8ca2b198b88203f46d0ddb7d129e9d5e44dd8ed0dbca2b0a35402b1209343a2c
-
Filesize
11KB
MD520a5ad7bd434d8aa535c4d8492ad8077
SHA11066d688402a69e37c54054594ec11528f8fe1b9
SHA25619208e6f205b52447a51a79d81b8db75f91a926664d993343c071ebeb3eeb77d
SHA51216cba28218388d99e7f6c3c0cc08effed9c073452b7a331ae3f819d3567d0a3b8ca2b198b88203f46d0ddb7d129e9d5e44dd8ed0dbca2b0a35402b1209343a2c
-
Filesize
587KB
MD5000890d65f767ac857486a42d793acb1
SHA1414a5a1aa533a0a372c32b8e697ddba28d2fcb0c
SHA256cd2f5102114dc98981e0646df4e2143084804c63355bf066a61ff9feb2feb510
SHA5128106403199250bc04fd35c5ec4d2235c38b8ce852226ad5cfff1f1c2a842bca1aebbb88555ffffbbe0fa541513216854b23b1c4293aa3698ff231ecdd0de34e1
-
Filesize
587KB
MD5000890d65f767ac857486a42d793acb1
SHA1414a5a1aa533a0a372c32b8e697ddba28d2fcb0c
SHA256cd2f5102114dc98981e0646df4e2143084804c63355bf066a61ff9feb2feb510
SHA5128106403199250bc04fd35c5ec4d2235c38b8ce852226ad5cfff1f1c2a842bca1aebbb88555ffffbbe0fa541513216854b23b1c4293aa3698ff231ecdd0de34e1
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1