Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:52
Static task
static1
General
-
Target
a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe
-
Size
1.2MB
-
MD5
23fa403007e91f14efc78a7968d8ab55
-
SHA1
f19b4cc46b3948039e2116b695e52a6ae12d93c6
-
SHA256
a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b
-
SHA512
13e8419386260ed767b3e616da502440f5918db98af6d11f4c924cbf6ce4362d9f391049aad2090a64141eaf0a764acfd86f52857b25e0110432db49a057a806
-
SSDEEP
24576:6y6DQv1eOawW+MBZAidNeKM+9AV/Z1LSCBzxH8SYS0J2MZLt4Ss:BEQtTz/SZbAZSqhMZJpz4
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr957629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr957629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr957629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr957629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr957629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr957629.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu345913.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si314782.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 988 un938127.exe 716 un823137.exe 3288 pr957629.exe 4608 qu345913.exe 4548 1.exe 1384 rk013331.exe 3488 si314782.exe 1672 oneetx.exe 1976 oneetx.exe 2836 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4472 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr957629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr957629.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un823137.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un823137.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un938127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un938127.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
pid pid_target Process procid_target 3852 3288 WerFault.exe 86 2812 4608 WerFault.exe 91 2988 3488 WerFault.exe 97 4744 3488 WerFault.exe 97 4992 3488 WerFault.exe 97 4840 3488 WerFault.exe 97 5064 3488 WerFault.exe 97 4980 3488 WerFault.exe 97 1596 3488 WerFault.exe 97 1640 3488 WerFault.exe 97 4876 3488 WerFault.exe 97 4404 3488 WerFault.exe 97 5088 1672 WerFault.exe 116 720 1672 WerFault.exe 116 632 1672 WerFault.exe 116 3008 1672 WerFault.exe 116 1340 1672 WerFault.exe 116 2156 1672 WerFault.exe 116 2740 1672 WerFault.exe 116 1404 1672 WerFault.exe 116 4536 1672 WerFault.exe 116 3740 1672 WerFault.exe 116 3472 1672 WerFault.exe 116 4584 1672 WerFault.exe 116 5008 1976 WerFault.exe 145 1056 1976 WerFault.exe 145 920 1976 WerFault.exe 145 4372 1672 WerFault.exe 116 2256 1672 WerFault.exe 116 3464 1672 WerFault.exe 116 820 2836 WerFault.exe 159 4968 2836 WerFault.exe 159 4476 2836 WerFault.exe 159 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4128 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3288 pr957629.exe 3288 pr957629.exe 1384 rk013331.exe 4548 1.exe 4548 1.exe 1384 rk013331.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3288 pr957629.exe Token: SeDebugPrivilege 4608 qu345913.exe Token: SeDebugPrivilege 1384 rk013331.exe Token: SeDebugPrivilege 4548 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3488 si314782.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 616 wrote to memory of 988 616 a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe 84 PID 616 wrote to memory of 988 616 a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe 84 PID 616 wrote to memory of 988 616 a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe 84 PID 988 wrote to memory of 716 988 un938127.exe 85 PID 988 wrote to memory of 716 988 un938127.exe 85 PID 988 wrote to memory of 716 988 un938127.exe 85 PID 716 wrote to memory of 3288 716 un823137.exe 86 PID 716 wrote to memory of 3288 716 un823137.exe 86 PID 716 wrote to memory of 3288 716 un823137.exe 86 PID 716 wrote to memory of 4608 716 un823137.exe 91 PID 716 wrote to memory of 4608 716 un823137.exe 91 PID 716 wrote to memory of 4608 716 un823137.exe 91 PID 4608 wrote to memory of 4548 4608 qu345913.exe 92 PID 4608 wrote to memory of 4548 4608 qu345913.exe 92 PID 4608 wrote to memory of 4548 4608 qu345913.exe 92 PID 988 wrote to memory of 1384 988 un938127.exe 95 PID 988 wrote to memory of 1384 988 un938127.exe 95 PID 988 wrote to memory of 1384 988 un938127.exe 95 PID 616 wrote to memory of 3488 616 a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe 97 PID 616 wrote to memory of 3488 616 a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe 97 PID 616 wrote to memory of 3488 616 a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe 97 PID 3488 wrote to memory of 1672 3488 si314782.exe 116 PID 3488 wrote to memory of 1672 3488 si314782.exe 116 PID 3488 wrote to memory of 1672 3488 si314782.exe 116 PID 1672 wrote to memory of 4128 1672 oneetx.exe 133 PID 1672 wrote to memory of 4128 1672 oneetx.exe 133 PID 1672 wrote to memory of 4128 1672 oneetx.exe 133 PID 1672 wrote to memory of 4472 1672 oneetx.exe 154 PID 1672 wrote to memory of 4472 1672 oneetx.exe 154 PID 1672 wrote to memory of 4472 1672 oneetx.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe"C:\Users\Admin\AppData\Local\Temp\a21ea1d39b1622364b324381b1d133b865229ce299b969a4e82ca396899e935b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un938127.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un938127.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un823137.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un823137.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr957629.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr957629.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 10845⤵
- Program crash
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu345913.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu345913.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 13805⤵
- Program crash
PID:2812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk013331.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk013331.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si314782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si314782.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 7003⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 7723⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 8603⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 9563⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 9923⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 10123⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 12203⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 12323⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 13163⤵
- Program crash
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 6964⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 8884⤵
- Program crash
PID:720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 9404⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10564⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10644⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10844⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10964⤵
- Program crash
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 9964⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 7244⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 6964⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 13324⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 11204⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 16324⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 15364⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 16524⤵
- Program crash
PID:3464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 14363⤵
- Program crash
PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3288 -ip 32881⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4608 -ip 46081⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3488 -ip 34881⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3488 -ip 34881⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3488 -ip 34881⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3488 -ip 34881⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3488 -ip 34881⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3488 -ip 34881⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 3488 -ip 34881⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3488 -ip 34881⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3488 -ip 34881⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3488 -ip 34881⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1672 -ip 16721⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1672 -ip 16721⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1672 -ip 16721⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1672 -ip 16721⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1672 -ip 16721⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1672 -ip 16721⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1672 -ip 16721⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1672 -ip 16721⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1672 -ip 16721⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1672 -ip 16721⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1672 -ip 16721⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1672 -ip 16721⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 3962⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 4602⤵
- Program crash
PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 3962⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1976 -ip 19761⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1976 -ip 19761⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1976 -ip 19761⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1672 -ip 16721⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1672 -ip 16721⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1672 -ip 16721⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 3962⤵
- Program crash
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 4442⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 5042⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2836 -ip 28361⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2836 -ip 28361⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2836 -ip 28361⤵PID:4876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
861KB
MD5fd3624ac48c889ea8db4bf0be309d584
SHA1202fbda23308918c70b31d35cb2d9d5eb760c568
SHA25664ec14cd9cd783e29be8cd8bd0f416615c45fb92cf15d0972f845fefeef33cad
SHA512119ac86588d5280183c0436d7044c028d6e1d0cce3dee89f0340bb075e8955653626d656918d7cdea9549976a9b61a8c321aa95dc9cd403ef50d777bf7d3612d
-
Filesize
861KB
MD5fd3624ac48c889ea8db4bf0be309d584
SHA1202fbda23308918c70b31d35cb2d9d5eb760c568
SHA25664ec14cd9cd783e29be8cd8bd0f416615c45fb92cf15d0972f845fefeef33cad
SHA512119ac86588d5280183c0436d7044c028d6e1d0cce3dee89f0340bb075e8955653626d656918d7cdea9549976a9b61a8c321aa95dc9cd403ef50d777bf7d3612d
-
Filesize
169KB
MD509ae8d3eda738bc8a21423c8ae9c28ef
SHA150ce30a5e2bd1a3bac4dbb76fdfd34078653317c
SHA256bc47d34e42548ab098644c7ab07817319de8bcb24666590547e87034cce143c2
SHA512486a0ca8867c9a41f67be02a25874cd950873c066bfc4b11bdd965186ed1b704ba025e45127ae8d3359eecb10559a3b7e6dbb183471e3dcaeb3c187e757e83d7
-
Filesize
169KB
MD509ae8d3eda738bc8a21423c8ae9c28ef
SHA150ce30a5e2bd1a3bac4dbb76fdfd34078653317c
SHA256bc47d34e42548ab098644c7ab07817319de8bcb24666590547e87034cce143c2
SHA512486a0ca8867c9a41f67be02a25874cd950873c066bfc4b11bdd965186ed1b704ba025e45127ae8d3359eecb10559a3b7e6dbb183471e3dcaeb3c187e757e83d7
-
Filesize
707KB
MD5e9013c9062c2a8fadf022abff46a8de9
SHA11dc86e4cafb04cc6e0452a07d746d9f7236a1302
SHA2564e2816e295ddf14e46c105c1de6a988ad7c477f889bd7181e81088c4d9272b9a
SHA512b286b39419033f8c398a8132ba026c9abb11975bf497a80dcf0cabb2428a7898030d5fd4b0018e7253f0e0c50860c86b9dcbfca3f8d3a5aaad613ba1bf88030f
-
Filesize
707KB
MD5e9013c9062c2a8fadf022abff46a8de9
SHA11dc86e4cafb04cc6e0452a07d746d9f7236a1302
SHA2564e2816e295ddf14e46c105c1de6a988ad7c477f889bd7181e81088c4d9272b9a
SHA512b286b39419033f8c398a8132ba026c9abb11975bf497a80dcf0cabb2428a7898030d5fd4b0018e7253f0e0c50860c86b9dcbfca3f8d3a5aaad613ba1bf88030f
-
Filesize
404KB
MD5f62113e949003385349c99003add786b
SHA12e3dc34b86bdfbc3053cc9764d4bd4c27883cd55
SHA2568f1f306b793b18c01c6981a88a8769d7d3caa14a29086628c409a4c8560899c8
SHA512683a34009edbdc83b3332d5c4d1244450065fc33903529e1f8547e3c587bc000e057723f7a648128e7f280f5bae6ee0f665a0e41b693f558795c9943519f63e0
-
Filesize
404KB
MD5f62113e949003385349c99003add786b
SHA12e3dc34b86bdfbc3053cc9764d4bd4c27883cd55
SHA2568f1f306b793b18c01c6981a88a8769d7d3caa14a29086628c409a4c8560899c8
SHA512683a34009edbdc83b3332d5c4d1244450065fc33903529e1f8547e3c587bc000e057723f7a648128e7f280f5bae6ee0f665a0e41b693f558795c9943519f63e0
-
Filesize
587KB
MD51ffbdb0590557f713080d5b23bf7a200
SHA13c8b37e9ae8679627119d492856ed1cd9e9030f4
SHA256675391bf5998340a879df671d36cead71717eee52e29953457e99b31d2b8d43d
SHA512c46575118a2ecb50d922ec122a4b9ea384bf6e35acf19b87c775a9c84a168a8f448b30bb843f42884359ae8f3b17258627b6b08a2bf9eda14e5b63c6d74507ad
-
Filesize
587KB
MD51ffbdb0590557f713080d5b23bf7a200
SHA13c8b37e9ae8679627119d492856ed1cd9e9030f4
SHA256675391bf5998340a879df671d36cead71717eee52e29953457e99b31d2b8d43d
SHA512c46575118a2ecb50d922ec122a4b9ea384bf6e35acf19b87c775a9c84a168a8f448b30bb843f42884359ae8f3b17258627b6b08a2bf9eda14e5b63c6d74507ad
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1