Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:36
Static task
static1
General
-
Target
4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe
-
Size
1.0MB
-
MD5
87f0dde58abe8b51114758c1450e2956
-
SHA1
d7295583f28956ae27c4f928d3a1e4b8da3f0c47
-
SHA256
4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8
-
SHA512
bc6e4a1893e9c2d073d3f7fdd94e97144e014d48d0a189fe6d2c0efa310bf960340dcdf85c6db53cb2042ed0d7eb4b1e4d9c7a6e8d96cc8c2f121e45e6712fd1
-
SSDEEP
24576:gyWtkJSlMkgHAzt8j7smymueSyJjRxav+Iqo5VNuao5jO:nbJSlYgzm7ueSmdxwz5VNu
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it788016.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it788016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it788016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it788016.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it788016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it788016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it788016.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr901179.exelr642994.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation jr901179.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr642994.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zimP7356.exezisp0519.exeit788016.exejr901179.exe1.exekp216334.exelr642994.exeoneetx.exeoneetx.exeoneetx.exepid process 1944 zimP7356.exe 1332 zisp0519.exe 400 it788016.exe 4240 jr901179.exe 3040 1.exe 5012 kp216334.exe 4984 lr642994.exe 4276 oneetx.exe 1332 oneetx.exe 2280 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3312 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it788016.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it788016.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exezimP7356.exezisp0519.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimP7356.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimP7356.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisp0519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zisp0519.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3448 4240 WerFault.exe jr901179.exe 3552 4984 WerFault.exe lr642994.exe 2340 4984 WerFault.exe lr642994.exe 4812 4984 WerFault.exe lr642994.exe 4720 4984 WerFault.exe lr642994.exe 3480 4984 WerFault.exe lr642994.exe 4868 4984 WerFault.exe lr642994.exe 3308 4984 WerFault.exe lr642994.exe 3244 4984 WerFault.exe lr642994.exe 3096 4984 WerFault.exe lr642994.exe 3708 4984 WerFault.exe lr642994.exe 5024 4276 WerFault.exe oneetx.exe 4996 4276 WerFault.exe oneetx.exe 464 4276 WerFault.exe oneetx.exe 2512 4276 WerFault.exe oneetx.exe 2020 4276 WerFault.exe oneetx.exe 3736 4276 WerFault.exe oneetx.exe 4256 4276 WerFault.exe oneetx.exe 796 4276 WerFault.exe oneetx.exe 4536 4276 WerFault.exe oneetx.exe 4736 4276 WerFault.exe oneetx.exe 908 4276 WerFault.exe oneetx.exe 1804 1332 WerFault.exe oneetx.exe 624 1332 WerFault.exe oneetx.exe 1008 1332 WerFault.exe oneetx.exe 4128 4276 WerFault.exe oneetx.exe 4676 4276 WerFault.exe oneetx.exe 3632 4276 WerFault.exe oneetx.exe 4952 2280 WerFault.exe oneetx.exe 4088 2280 WerFault.exe oneetx.exe 920 2280 WerFault.exe oneetx.exe 3740 4276 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it788016.exekp216334.exe1.exepid process 400 it788016.exe 400 it788016.exe 5012 kp216334.exe 5012 kp216334.exe 3040 1.exe 3040 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it788016.exejr901179.exekp216334.exe1.exedescription pid process Token: SeDebugPrivilege 400 it788016.exe Token: SeDebugPrivilege 4240 jr901179.exe Token: SeDebugPrivilege 5012 kp216334.exe Token: SeDebugPrivilege 3040 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr642994.exepid process 4984 lr642994.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exezimP7356.exezisp0519.exejr901179.exelr642994.exeoneetx.exedescription pid process target process PID 2548 wrote to memory of 1944 2548 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe zimP7356.exe PID 2548 wrote to memory of 1944 2548 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe zimP7356.exe PID 2548 wrote to memory of 1944 2548 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe zimP7356.exe PID 1944 wrote to memory of 1332 1944 zimP7356.exe zisp0519.exe PID 1944 wrote to memory of 1332 1944 zimP7356.exe zisp0519.exe PID 1944 wrote to memory of 1332 1944 zimP7356.exe zisp0519.exe PID 1332 wrote to memory of 400 1332 zisp0519.exe it788016.exe PID 1332 wrote to memory of 400 1332 zisp0519.exe it788016.exe PID 1332 wrote to memory of 4240 1332 zisp0519.exe jr901179.exe PID 1332 wrote to memory of 4240 1332 zisp0519.exe jr901179.exe PID 1332 wrote to memory of 4240 1332 zisp0519.exe jr901179.exe PID 4240 wrote to memory of 3040 4240 jr901179.exe 1.exe PID 4240 wrote to memory of 3040 4240 jr901179.exe 1.exe PID 4240 wrote to memory of 3040 4240 jr901179.exe 1.exe PID 1944 wrote to memory of 5012 1944 zimP7356.exe kp216334.exe PID 1944 wrote to memory of 5012 1944 zimP7356.exe kp216334.exe PID 1944 wrote to memory of 5012 1944 zimP7356.exe kp216334.exe PID 2548 wrote to memory of 4984 2548 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe lr642994.exe PID 2548 wrote to memory of 4984 2548 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe lr642994.exe PID 2548 wrote to memory of 4984 2548 4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe lr642994.exe PID 4984 wrote to memory of 4276 4984 lr642994.exe oneetx.exe PID 4984 wrote to memory of 4276 4984 lr642994.exe oneetx.exe PID 4984 wrote to memory of 4276 4984 lr642994.exe oneetx.exe PID 4276 wrote to memory of 368 4276 oneetx.exe schtasks.exe PID 4276 wrote to memory of 368 4276 oneetx.exe schtasks.exe PID 4276 wrote to memory of 368 4276 oneetx.exe schtasks.exe PID 4276 wrote to memory of 3312 4276 oneetx.exe rundll32.exe PID 4276 wrote to memory of 3312 4276 oneetx.exe rundll32.exe PID 4276 wrote to memory of 3312 4276 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe"C:\Users\Admin\AppData\Local\Temp\4361f5607565c7fe0d5f4c423988d76ec24341609ce17cfe1eaee641d6762cc8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimP7356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimP7356.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisp0519.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zisp0519.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it788016.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it788016.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr901179.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr901179.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 13885⤵
- Program crash
PID:3448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp216334.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp216334.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr642994.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr642994.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 7003⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 7843⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 8603⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 9563⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 8763⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 8763⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 12203⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 12683⤵
- Program crash
PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 12363⤵
- Program crash
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6964⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 8604⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 8964⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10564⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10644⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10884⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11324⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9964⤵
- Program crash
PID:796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 7484⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 12964⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 7844⤵
- Program crash
PID:908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11204⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11204⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 15844⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 13764⤵
- Program crash
PID:3740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 13603⤵
- Program crash
PID:3708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4240 -ip 42401⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4984 -ip 49841⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4984 -ip 49841⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4984 -ip 49841⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4984 -ip 49841⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4984 -ip 49841⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4984 -ip 49841⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4984 -ip 49841⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4984 -ip 49841⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4984 -ip 49841⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4984 -ip 49841⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4276 -ip 42761⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4276 -ip 42761⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4276 -ip 42761⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4276 -ip 42761⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4276 -ip 42761⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4276 -ip 42761⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4276 -ip 42761⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4276 -ip 42761⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4276 -ip 42761⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4276 -ip 42761⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4276 -ip 42761⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 3962⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 4402⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 4402⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1332 -ip 13321⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1332 -ip 13321⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1332 -ip 13321⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4276 -ip 42761⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4276 -ip 42761⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4276 -ip 42761⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 3962⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 4402⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 4402⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2280 -ip 22801⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2280 -ip 22801⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2280 -ip 22801⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4276 -ip 42761⤵PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD5754d9a7024a9f14ba92e387d2a03b928
SHA1d48d2c789d586905a21e808c24b463dda2796804
SHA256197425654342e6703924f5720e59d1678778699353390152e7932d30a5ea8ce7
SHA5126c4b676f3b170cd9f5e72e6add788d916498147815979527c953eebd398dd22c1cc712b83886e4a7036170d628a3b7635cd78f4e2f433bd5a52d69915d6de6d6
-
Filesize
723KB
MD5754d9a7024a9f14ba92e387d2a03b928
SHA1d48d2c789d586905a21e808c24b463dda2796804
SHA256197425654342e6703924f5720e59d1678778699353390152e7932d30a5ea8ce7
SHA5126c4b676f3b170cd9f5e72e6add788d916498147815979527c953eebd398dd22c1cc712b83886e4a7036170d628a3b7635cd78f4e2f433bd5a52d69915d6de6d6
-
Filesize
169KB
MD5a737ba03069c4a9d2636d91ac680b0b0
SHA1537666578cf70ee8e94361e67a614be18ec965aa
SHA256ecae60ca32a8fc9b04706e18007938519731b5b0dc36cfadfd9757b5faeea656
SHA512872b5fc6433046b55ebfed846b659dd1a6b3ea3888bda479b16568f69bb5ef0adcc4f10b9303ff5bcdc822b5a4aa06093aabe1284264e4392754e1d2170d9476
-
Filesize
169KB
MD5a737ba03069c4a9d2636d91ac680b0b0
SHA1537666578cf70ee8e94361e67a614be18ec965aa
SHA256ecae60ca32a8fc9b04706e18007938519731b5b0dc36cfadfd9757b5faeea656
SHA512872b5fc6433046b55ebfed846b659dd1a6b3ea3888bda479b16568f69bb5ef0adcc4f10b9303ff5bcdc822b5a4aa06093aabe1284264e4392754e1d2170d9476
-
Filesize
569KB
MD579375541f59970d40cfc8f7e4838dce4
SHA1fa1b32914fc7921a443415ad30d12862a62fb1b1
SHA256b54812ea04deb5dbd37f720718540a3ea0201d693cd9ba938821156ebe548fac
SHA51208fd97b307c7121c878fc3cb0777122f99d718e55bd9c114ec4bdd7f86f1f51d35896533cd1b9e7a3d7ac02f6d177045b04c1067e6a74faf2f51ddba813b848e
-
Filesize
569KB
MD579375541f59970d40cfc8f7e4838dce4
SHA1fa1b32914fc7921a443415ad30d12862a62fb1b1
SHA256b54812ea04deb5dbd37f720718540a3ea0201d693cd9ba938821156ebe548fac
SHA51208fd97b307c7121c878fc3cb0777122f99d718e55bd9c114ec4bdd7f86f1f51d35896533cd1b9e7a3d7ac02f6d177045b04c1067e6a74faf2f51ddba813b848e
-
Filesize
11KB
MD5b2bec61005ca2195355095166a1ef055
SHA1d0460844fc181a7c0e56b68bafb58118a6700a93
SHA25633b52364b2d186fba477abe0737ebd3cfb6b083313b5c5b42e73c08b29b9395f
SHA5123d8e465131ae7c833795327fadb791ea79d43391bc5ef33f1bddd823858e2ea419fcf514c24fca1734ef22fc28ac6ee4aae092f1efd4a5a57107e29bab420089
-
Filesize
11KB
MD5b2bec61005ca2195355095166a1ef055
SHA1d0460844fc181a7c0e56b68bafb58118a6700a93
SHA25633b52364b2d186fba477abe0737ebd3cfb6b083313b5c5b42e73c08b29b9395f
SHA5123d8e465131ae7c833795327fadb791ea79d43391bc5ef33f1bddd823858e2ea419fcf514c24fca1734ef22fc28ac6ee4aae092f1efd4a5a57107e29bab420089
-
Filesize
588KB
MD5a0d07ccc212a2d254404125a5d716218
SHA1c96ab85a4ba35805977457be9320ed69b806e50b
SHA2563fddd63204ec19a97fa929602d2481655f5110a0e89563ce77fc8f2bf83057be
SHA5125b4a5212b3d4ee1584feca047d14beeb9f51e0271e2ac64a567fe281d7df27049153ed004bef5e715fdb4dde9a0042930e38158e1a420b74e56bf15c12cb70d9
-
Filesize
588KB
MD5a0d07ccc212a2d254404125a5d716218
SHA1c96ab85a4ba35805977457be9320ed69b806e50b
SHA2563fddd63204ec19a97fa929602d2481655f5110a0e89563ce77fc8f2bf83057be
SHA5125b4a5212b3d4ee1584feca047d14beeb9f51e0271e2ac64a567fe281d7df27049153ed004bef5e715fdb4dde9a0042930e38158e1a420b74e56bf15c12cb70d9
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1