Analysis
-
max time kernel
147s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:37
Static task
static1
General
-
Target
7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe
-
Size
1.2MB
-
MD5
1628cc688611be6c813fba2a495017df
-
SHA1
b7c14f8b29df649e3ab5ed44a43314d828bad573
-
SHA256
7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014
-
SHA512
20c07b7079277cfb212a5d230dcd27a47701426b7f02d6b04c133e2e61b5aaa4e1421edd923efb401bf07ecc88f8c68cd424876140430f7be4d5bab18fe2dc57
-
SSDEEP
24576:ey8F81eyoG9uBP/xw1xSX7Y2WV/S3gI9U0ykuE:tzeyoGQ9xwvI8/SQI9U0d
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr105125.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr105125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr105125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr105125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr105125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr105125.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr105125.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu942220.exesi931608.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation qu942220.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation si931608.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un932590.exeun452063.exepr105125.exequ942220.exe1.exerk468008.exesi931608.exeoneetx.exeoneetx.exeoneetx.exepid process 3768 un932590.exe 3624 un452063.exe 224 pr105125.exe 2876 qu942220.exe 4588 1.exe 3876 rk468008.exe 1288 si931608.exe 3312 oneetx.exe 4840 oneetx.exe 5000 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1424 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr105125.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr105125.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr105125.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un932590.exeun452063.exe7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un932590.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un452063.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un452063.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un932590.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1900 224 WerFault.exe pr105125.exe 1340 2876 WerFault.exe qu942220.exe 2732 1288 WerFault.exe si931608.exe 1036 1288 WerFault.exe si931608.exe 2084 1288 WerFault.exe si931608.exe 948 1288 WerFault.exe si931608.exe 1708 1288 WerFault.exe si931608.exe 2196 1288 WerFault.exe si931608.exe 4964 1288 WerFault.exe si931608.exe 4540 1288 WerFault.exe si931608.exe 2836 1288 WerFault.exe si931608.exe 1568 1288 WerFault.exe si931608.exe 3328 3312 WerFault.exe oneetx.exe 3992 3312 WerFault.exe oneetx.exe 4904 3312 WerFault.exe oneetx.exe 3916 3312 WerFault.exe oneetx.exe 3760 3312 WerFault.exe oneetx.exe 3892 3312 WerFault.exe oneetx.exe 1456 3312 WerFault.exe oneetx.exe 2200 3312 WerFault.exe oneetx.exe 380 3312 WerFault.exe oneetx.exe 3308 3312 WerFault.exe oneetx.exe 3876 3312 WerFault.exe oneetx.exe 1976 3312 WerFault.exe oneetx.exe 2656 4840 WerFault.exe oneetx.exe 2416 4840 WerFault.exe oneetx.exe 4808 4840 WerFault.exe oneetx.exe 760 3312 WerFault.exe oneetx.exe 4120 3312 WerFault.exe oneetx.exe 4316 3312 WerFault.exe oneetx.exe 4084 5000 WerFault.exe oneetx.exe 4052 5000 WerFault.exe oneetx.exe 2704 5000 WerFault.exe oneetx.exe 3940 3312 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr105125.exe1.exerk468008.exepid process 224 pr105125.exe 224 pr105125.exe 4588 1.exe 3876 rk468008.exe 3876 rk468008.exe 4588 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr105125.exequ942220.exe1.exerk468008.exedescription pid process Token: SeDebugPrivilege 224 pr105125.exe Token: SeDebugPrivilege 2876 qu942220.exe Token: SeDebugPrivilege 4588 1.exe Token: SeDebugPrivilege 3876 rk468008.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si931608.exepid process 1288 si931608.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exeun932590.exeun452063.exequ942220.exesi931608.exeoneetx.exedescription pid process target process PID 2616 wrote to memory of 3768 2616 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe un932590.exe PID 2616 wrote to memory of 3768 2616 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe un932590.exe PID 2616 wrote to memory of 3768 2616 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe un932590.exe PID 3768 wrote to memory of 3624 3768 un932590.exe un452063.exe PID 3768 wrote to memory of 3624 3768 un932590.exe un452063.exe PID 3768 wrote to memory of 3624 3768 un932590.exe un452063.exe PID 3624 wrote to memory of 224 3624 un452063.exe pr105125.exe PID 3624 wrote to memory of 224 3624 un452063.exe pr105125.exe PID 3624 wrote to memory of 224 3624 un452063.exe pr105125.exe PID 3624 wrote to memory of 2876 3624 un452063.exe qu942220.exe PID 3624 wrote to memory of 2876 3624 un452063.exe qu942220.exe PID 3624 wrote to memory of 2876 3624 un452063.exe qu942220.exe PID 2876 wrote to memory of 4588 2876 qu942220.exe 1.exe PID 2876 wrote to memory of 4588 2876 qu942220.exe 1.exe PID 2876 wrote to memory of 4588 2876 qu942220.exe 1.exe PID 3768 wrote to memory of 3876 3768 un932590.exe rk468008.exe PID 3768 wrote to memory of 3876 3768 un932590.exe rk468008.exe PID 3768 wrote to memory of 3876 3768 un932590.exe rk468008.exe PID 2616 wrote to memory of 1288 2616 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe si931608.exe PID 2616 wrote to memory of 1288 2616 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe si931608.exe PID 2616 wrote to memory of 1288 2616 7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe si931608.exe PID 1288 wrote to memory of 3312 1288 si931608.exe oneetx.exe PID 1288 wrote to memory of 3312 1288 si931608.exe oneetx.exe PID 1288 wrote to memory of 3312 1288 si931608.exe oneetx.exe PID 3312 wrote to memory of 3868 3312 oneetx.exe schtasks.exe PID 3312 wrote to memory of 3868 3312 oneetx.exe schtasks.exe PID 3312 wrote to memory of 3868 3312 oneetx.exe schtasks.exe PID 3312 wrote to memory of 1424 3312 oneetx.exe rundll32.exe PID 3312 wrote to memory of 1424 3312 oneetx.exe rundll32.exe PID 3312 wrote to memory of 1424 3312 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe"C:\Users\Admin\AppData\Local\Temp\7d3c01e3af1efba2c375903809e5f8bc1767b9f45bb16e5613ac2bc09cdae014.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932590.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932590.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un452063.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un452063.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr105125.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr105125.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10885⤵
- Program crash
PID:1900
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu942220.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu942220.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 14445⤵
- Program crash
PID:1340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk468008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk468008.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931608.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931608.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 7003⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 7683⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 8003⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 9563⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 9563⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 9563⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 12203⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 12723⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 13243⤵
- Program crash
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 6964⤵
- Program crash
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 8404⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 8724⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 10644⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 10924⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 10924⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 11204⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 9964⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 7324⤵
- Program crash
PID:380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 13044⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 7684⤵
- Program crash
PID:3876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 14204⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 11044⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 16604⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 15964⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 16764⤵
- Program crash
PID:3940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 7923⤵
- Program crash
PID:1568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 224 -ip 2241⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2876 -ip 28761⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1288 -ip 12881⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1288 -ip 12881⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1288 -ip 12881⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1288 -ip 12881⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1288 -ip 12881⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1288 -ip 12881⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1288 -ip 12881⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1288 -ip 12881⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1288 -ip 12881⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1288 -ip 12881⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3312 -ip 33121⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3312 -ip 33121⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3312 -ip 33121⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3312 -ip 33121⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3312 -ip 33121⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3312 -ip 33121⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3312 -ip 33121⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3312 -ip 33121⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3312 -ip 33121⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3312 -ip 33121⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3312 -ip 33121⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3312 -ip 33121⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 3962⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 4402⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 4682⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4840 -ip 48401⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4840 -ip 48401⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4840 -ip 48401⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3312 -ip 33121⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3312 -ip 33121⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3312 -ip 33121⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 3962⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 4402⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 4402⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5000 -ip 50001⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5000 -ip 50001⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5000 -ip 50001⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3312 -ip 33121⤵PID:3328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
865KB
MD5c176dd1283f9d74abc3759727ab72b8e
SHA1fe2f2271707d3f82be1d7b496ed0506c5d8277dd
SHA2569127e85639dd9f8b5bbc9f1caeefef7a5f348bacf45915f6dca6ddc452a616d4
SHA51238b5b80de5a0f25e6c3b07aec5978262412239adb518e210e0b9155d268dc856707950ae104f325b1cb5f30d73270484df2f981127374b57c08419c68176480b
-
Filesize
865KB
MD5c176dd1283f9d74abc3759727ab72b8e
SHA1fe2f2271707d3f82be1d7b496ed0506c5d8277dd
SHA2569127e85639dd9f8b5bbc9f1caeefef7a5f348bacf45915f6dca6ddc452a616d4
SHA51238b5b80de5a0f25e6c3b07aec5978262412239adb518e210e0b9155d268dc856707950ae104f325b1cb5f30d73270484df2f981127374b57c08419c68176480b
-
Filesize
169KB
MD59fe659f55e814fd80a7fc8d3574cff01
SHA18c241e687a80291766e98dffd8856e05f6d06f3d
SHA256b3438c11317c605d299c698a454eb882a27da2f40e64af962a0148292c159e83
SHA512a3ae4021103b8cc4caa221fa3b83f71bcf187ffdbd614d0c17476c4f292f0b10897d3dd19f7674a9c6a65dfd991f60f218e3cfccf30cc1fce4543ecafd1f038e
-
Filesize
169KB
MD59fe659f55e814fd80a7fc8d3574cff01
SHA18c241e687a80291766e98dffd8856e05f6d06f3d
SHA256b3438c11317c605d299c698a454eb882a27da2f40e64af962a0148292c159e83
SHA512a3ae4021103b8cc4caa221fa3b83f71bcf187ffdbd614d0c17476c4f292f0b10897d3dd19f7674a9c6a65dfd991f60f218e3cfccf30cc1fce4543ecafd1f038e
-
Filesize
711KB
MD541f3b8aa01b4a514c26c0cc6a7f59b6f
SHA1140b23b1e9a283b5e8b0bdefc9336f494c8b8476
SHA25696cc65c38a063ddbba2496d8373de7178056412dcfd8ade1d153aba28321b2e9
SHA5127dc52921b7767547f290003543b65bbe42b9e5f89a57e456ff895aedcb4c58145a7de95c713d54d5b1172063eba0d079e8c93cf69875c1fea1bcac99630d9b68
-
Filesize
711KB
MD541f3b8aa01b4a514c26c0cc6a7f59b6f
SHA1140b23b1e9a283b5e8b0bdefc9336f494c8b8476
SHA25696cc65c38a063ddbba2496d8373de7178056412dcfd8ade1d153aba28321b2e9
SHA5127dc52921b7767547f290003543b65bbe42b9e5f89a57e456ff895aedcb4c58145a7de95c713d54d5b1172063eba0d079e8c93cf69875c1fea1bcac99630d9b68
-
Filesize
405KB
MD5ac2ebb27e26df73c116dbc0bc0ed8ab8
SHA15d48434e952e5e3569c90c1ff0f6abb987aa26d5
SHA2564f4d00711168518df3f3f48f58cab951f02985dc5c2d1258b8a0118b7a33c197
SHA5128be0a0f315beaac4625d41fcd6793fb588cb063a37d274ce993a5cb816b72717c347437a30a4c78bf5744ca5c25f16cc04dddbb77383de06b4094447291a70dd
-
Filesize
405KB
MD5ac2ebb27e26df73c116dbc0bc0ed8ab8
SHA15d48434e952e5e3569c90c1ff0f6abb987aa26d5
SHA2564f4d00711168518df3f3f48f58cab951f02985dc5c2d1258b8a0118b7a33c197
SHA5128be0a0f315beaac4625d41fcd6793fb588cb063a37d274ce993a5cb816b72717c347437a30a4c78bf5744ca5c25f16cc04dddbb77383de06b4094447291a70dd
-
Filesize
588KB
MD5d6b67a527247c51eb099915fb8f6509d
SHA14cf13e196f749ed7d59beebb874c62864dbdd527
SHA25623434d4852c0ae75a8bdd7d31fc5803ee9e35788a4321775a663dea0b6685939
SHA5125dfc398e944ab084643da30dc62b04e07341ac5e693340e818c3d125e018d9b60eb8799a7843a773cf25924eaff383f3a6701bb17f43f1fe45979584112ca68b
-
Filesize
588KB
MD5d6b67a527247c51eb099915fb8f6509d
SHA14cf13e196f749ed7d59beebb874c62864dbdd527
SHA25623434d4852c0ae75a8bdd7d31fc5803ee9e35788a4321775a663dea0b6685939
SHA5125dfc398e944ab084643da30dc62b04e07341ac5e693340e818c3d125e018d9b60eb8799a7843a773cf25924eaff383f3a6701bb17f43f1fe45979584112ca68b
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1