Analysis
-
max time kernel
151s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:38
Static task
static1
General
-
Target
4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe
-
Size
1.2MB
-
MD5
300c777884a5b08b58950bafd1d9d63b
-
SHA1
dfb8e4ba86802b5e086c1923aee60a29c944987e
-
SHA256
4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0
-
SHA512
72bd2931e6f77565add1fae172d8bda602045a9834f940c98e86baa60e96e49715676a69397ac1c7b1f67ed1fe2ddafdfa7942d944287659ab9b1ed4fb49b0ca
-
SSDEEP
24576:5y53jetne6OSPeKgQq/whYzMt7UfGwyy8DUvouGWE+:s5onTOSPeRQy07UQqoufE
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr414054.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr414054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr414054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr414054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr414054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr414054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr414054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu927751.exesi450667.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu927751.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si450667.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un797769.exeun397938.exepr414054.exequ927751.exe1.exerk232863.exesi450667.exeoneetx.exeoneetx.exeoneetx.exepid process 4560 un797769.exe 1948 un397938.exe 3712 pr414054.exe 4936 qu927751.exe 4292 1.exe 4380 rk232863.exe 2184 si450667.exe 2228 oneetx.exe 1148 oneetx.exe 708 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5104 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr414054.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr414054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr414054.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un397938.exe4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exeun797769.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un397938.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un397938.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un797769.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un797769.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3176 3712 WerFault.exe pr414054.exe 3884 4936 WerFault.exe qu927751.exe 3428 2184 WerFault.exe si450667.exe 3172 2184 WerFault.exe si450667.exe 748 2184 WerFault.exe si450667.exe 2532 2184 WerFault.exe si450667.exe 3656 2184 WerFault.exe si450667.exe 1768 2184 WerFault.exe si450667.exe 1764 2184 WerFault.exe si450667.exe 4848 2184 WerFault.exe si450667.exe 1396 2184 WerFault.exe si450667.exe 4460 2184 WerFault.exe si450667.exe 4844 2228 WerFault.exe oneetx.exe 3580 2228 WerFault.exe oneetx.exe 3668 2228 WerFault.exe oneetx.exe 5080 2228 WerFault.exe oneetx.exe 1820 2228 WerFault.exe oneetx.exe 960 2228 WerFault.exe oneetx.exe 1888 2228 WerFault.exe oneetx.exe 5000 2228 WerFault.exe oneetx.exe 3896 2228 WerFault.exe oneetx.exe 4668 2228 WerFault.exe oneetx.exe 3404 2228 WerFault.exe oneetx.exe 3400 2228 WerFault.exe oneetx.exe 3800 1148 WerFault.exe oneetx.exe 4624 1148 WerFault.exe oneetx.exe 3324 1148 WerFault.exe oneetx.exe 2596 2228 WerFault.exe oneetx.exe 3628 2228 WerFault.exe oneetx.exe 1536 2228 WerFault.exe oneetx.exe 5052 708 WerFault.exe oneetx.exe 2084 708 WerFault.exe oneetx.exe 32 708 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr414054.exerk232863.exe1.exepid process 3712 pr414054.exe 3712 pr414054.exe 4380 rk232863.exe 4292 1.exe 4292 1.exe 4380 rk232863.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr414054.exequ927751.exerk232863.exe1.exedescription pid process Token: SeDebugPrivilege 3712 pr414054.exe Token: SeDebugPrivilege 4936 qu927751.exe Token: SeDebugPrivilege 4380 rk232863.exe Token: SeDebugPrivilege 4292 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si450667.exepid process 2184 si450667.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exeun797769.exeun397938.exequ927751.exesi450667.exeoneetx.exedescription pid process target process PID 2364 wrote to memory of 4560 2364 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe un797769.exe PID 2364 wrote to memory of 4560 2364 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe un797769.exe PID 2364 wrote to memory of 4560 2364 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe un797769.exe PID 4560 wrote to memory of 1948 4560 un797769.exe un397938.exe PID 4560 wrote to memory of 1948 4560 un797769.exe un397938.exe PID 4560 wrote to memory of 1948 4560 un797769.exe un397938.exe PID 1948 wrote to memory of 3712 1948 un397938.exe pr414054.exe PID 1948 wrote to memory of 3712 1948 un397938.exe pr414054.exe PID 1948 wrote to memory of 3712 1948 un397938.exe pr414054.exe PID 1948 wrote to memory of 4936 1948 un397938.exe qu927751.exe PID 1948 wrote to memory of 4936 1948 un397938.exe qu927751.exe PID 1948 wrote to memory of 4936 1948 un397938.exe qu927751.exe PID 4936 wrote to memory of 4292 4936 qu927751.exe 1.exe PID 4936 wrote to memory of 4292 4936 qu927751.exe 1.exe PID 4936 wrote to memory of 4292 4936 qu927751.exe 1.exe PID 4560 wrote to memory of 4380 4560 un797769.exe rk232863.exe PID 4560 wrote to memory of 4380 4560 un797769.exe rk232863.exe PID 4560 wrote to memory of 4380 4560 un797769.exe rk232863.exe PID 2364 wrote to memory of 2184 2364 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe si450667.exe PID 2364 wrote to memory of 2184 2364 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe si450667.exe PID 2364 wrote to memory of 2184 2364 4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe si450667.exe PID 2184 wrote to memory of 2228 2184 si450667.exe oneetx.exe PID 2184 wrote to memory of 2228 2184 si450667.exe oneetx.exe PID 2184 wrote to memory of 2228 2184 si450667.exe oneetx.exe PID 2228 wrote to memory of 2792 2228 oneetx.exe schtasks.exe PID 2228 wrote to memory of 2792 2228 oneetx.exe schtasks.exe PID 2228 wrote to memory of 2792 2228 oneetx.exe schtasks.exe PID 2228 wrote to memory of 5104 2228 oneetx.exe rundll32.exe PID 2228 wrote to memory of 5104 2228 oneetx.exe rundll32.exe PID 2228 wrote to memory of 5104 2228 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe"C:\Users\Admin\AppData\Local\Temp\4c5ae31e345dd342c38bddf7ddd30f30c63069f0e57e82d0a1402f8a802f10b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797769.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un397938.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un397938.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr414054.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr414054.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 10845⤵
- Program crash
PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu927751.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu927751.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 14445⤵
- Program crash
PID:3884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk232863.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk232863.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si450667.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si450667.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 7003⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 7763⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 8603⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 9843⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 8643⤵
- Program crash
PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 8643⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 12123⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 12163⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 13163⤵
- Program crash
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 6964⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 8884⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 9404⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 10564⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 10964⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 10964⤵
- Program crash
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 11124⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 9964⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 13084⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 6964⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 7804⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 11364⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 16164⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 12844⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 10724⤵
- Program crash
PID:1536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 13163⤵
- Program crash
PID:4460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3712 -ip 37121⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4936 -ip 49361⤵PID:3672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2184 -ip 21841⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2184 -ip 21841⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2184 -ip 21841⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2184 -ip 21841⤵PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2184 -ip 21841⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2184 -ip 21841⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2184 -ip 21841⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2184 -ip 21841⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2184 -ip 21841⤵PID:3132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2184 -ip 21841⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2228 -ip 22281⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2228 -ip 22281⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2228 -ip 22281⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2228 -ip 22281⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2228 -ip 22281⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2228 -ip 22281⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2228 -ip 22281⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2228 -ip 22281⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2228 -ip 22281⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2228 -ip 22281⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2228 -ip 22281⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2228 -ip 22281⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 3962⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 4402⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 4482⤵
- Program crash
PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 1148 -ip 11481⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1148 -ip 11481⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1148 -ip 11481⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2228 -ip 22281⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 2228 -ip 22281⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2228 -ip 22281⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 3962⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 4402⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 5122⤵
- Program crash
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 708 -ip 7081⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 708 -ip 7081⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 708 -ip 7081⤵PID:776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
863KB
MD5f3f7020cb01de6ef0055f74ffab8b2f0
SHA12fd50c2a82687370e72fd6c25aaddaedcbae7d0d
SHA256ff25aeb4f02ad6e68d18946b36f9c5286cea6bf6230353e6c3ee9febcef1e81b
SHA51277c2c0675379596f950cbcf74d06b963f8761e73cdefaeba6eba9f3de06fbafe044f903b7bfee5537664f14536b19a5a580fefa541edb22ba1ba6fd3bdc8fad6
-
Filesize
863KB
MD5f3f7020cb01de6ef0055f74ffab8b2f0
SHA12fd50c2a82687370e72fd6c25aaddaedcbae7d0d
SHA256ff25aeb4f02ad6e68d18946b36f9c5286cea6bf6230353e6c3ee9febcef1e81b
SHA51277c2c0675379596f950cbcf74d06b963f8761e73cdefaeba6eba9f3de06fbafe044f903b7bfee5537664f14536b19a5a580fefa541edb22ba1ba6fd3bdc8fad6
-
Filesize
169KB
MD50aa0e6c2c56d36e2caf56ac873ac1e70
SHA1bdcdd1374f94026f5c4662371715bd7dd022202e
SHA2563e9c7e99c5e83aefde7c6f25b309a82b9e375541f99103de870617935d1b6730
SHA512b3d484f8b75922993236246ef149a71375d474ccb7797b824afed56dc80cefa3fe9fe82e9e4abe0ce82bb7150985c9b547081e5d6139b8901a77fec2b33382dc
-
Filesize
169KB
MD50aa0e6c2c56d36e2caf56ac873ac1e70
SHA1bdcdd1374f94026f5c4662371715bd7dd022202e
SHA2563e9c7e99c5e83aefde7c6f25b309a82b9e375541f99103de870617935d1b6730
SHA512b3d484f8b75922993236246ef149a71375d474ccb7797b824afed56dc80cefa3fe9fe82e9e4abe0ce82bb7150985c9b547081e5d6139b8901a77fec2b33382dc
-
Filesize
709KB
MD56dbcffb2a92f53900495c5f8c5f1d89e
SHA1c39c44d31199143dfc2a821a1adf27b14e8c3aa9
SHA256cf6b490a73cb03919cb9bd9f84656b6a5c05cb7172f5c7cae4420a2ce79d0317
SHA512432af445c25522d3c9dea04329a8b90d34dc777eb3b50d55dfef378c21420c586c929e45451bb1d5c9bfdace5547b0531998a7a242fc53c99a47eb147ffe4f2d
-
Filesize
709KB
MD56dbcffb2a92f53900495c5f8c5f1d89e
SHA1c39c44d31199143dfc2a821a1adf27b14e8c3aa9
SHA256cf6b490a73cb03919cb9bd9f84656b6a5c05cb7172f5c7cae4420a2ce79d0317
SHA512432af445c25522d3c9dea04329a8b90d34dc777eb3b50d55dfef378c21420c586c929e45451bb1d5c9bfdace5547b0531998a7a242fc53c99a47eb147ffe4f2d
-
Filesize
405KB
MD5fb4715e3c20fb9c964a530d9fb585332
SHA18ee6e338ec9ef3dc917d8ce2e52d37d7ce44a3e4
SHA2567cb8df256197afedce04282e51a7e0b8e4bdf78ef1d8be49e7ff6f71864a4b05
SHA5129654c9212fa92302eb018a35952296891df6476b92488311ac776bfa84a1dd724e342422473b4d97d7c29de95c35bff7628383ca6a44d16b304465c1d46471f2
-
Filesize
405KB
MD5fb4715e3c20fb9c964a530d9fb585332
SHA18ee6e338ec9ef3dc917d8ce2e52d37d7ce44a3e4
SHA2567cb8df256197afedce04282e51a7e0b8e4bdf78ef1d8be49e7ff6f71864a4b05
SHA5129654c9212fa92302eb018a35952296891df6476b92488311ac776bfa84a1dd724e342422473b4d97d7c29de95c35bff7628383ca6a44d16b304465c1d46471f2
-
Filesize
588KB
MD57e1f502c7d70403fca0997d399e7e93d
SHA10f1995014840f28086eb44264faaf36c460fa94d
SHA2565adb30238ecb0c217db010cdb0973d4710b5b7f74ae5fb7d93a06177dd43cafb
SHA5120973986b821bcc888de7ec7f827192f1ce1ce495bb447270596662a543441675bab1ed7904cd586cf472940d36cf693cf5dcf9a76f25f5ca3d2b5e2b43bf1ff9
-
Filesize
588KB
MD57e1f502c7d70403fca0997d399e7e93d
SHA10f1995014840f28086eb44264faaf36c460fa94d
SHA2565adb30238ecb0c217db010cdb0973d4710b5b7f74ae5fb7d93a06177dd43cafb
SHA5120973986b821bcc888de7ec7f827192f1ce1ce495bb447270596662a543441675bab1ed7904cd586cf472940d36cf693cf5dcf9a76f25f5ca3d2b5e2b43bf1ff9
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1