Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 05:58
Static task
static1
General
-
Target
790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe
-
Size
1.0MB
-
MD5
4d0cee2e7c5f1b01880c5285a3b7f602
-
SHA1
d36c9f173f97088cca818c6299f694b7baa2ff8c
-
SHA256
790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74
-
SHA512
a0a9496701d273362b32f2f57c7a15f3d69f056456ca27ad2e76c3aef74359742a51a2979a44258b9e8d15b73dd1f14469ca7b05dffa0f82138964474344f101
-
SSDEEP
24576:Cy8GwpKlaff51eWTnHceyV8M4L//2fb5zxAOx5oOHDYQdxkQ2M:papKlaTHsq/ufbBbxZjxx
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it904627.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it904627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it904627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it904627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it904627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it904627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it904627.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr418889.exelr896310.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr418889.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr896310.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziLq7534.exeziEz7125.exeit904627.exejr418889.exe1.exekp977799.exelr896310.exeoneetx.exeoneetx.exeoneetx.exepid process 4936 ziLq7534.exe 1412 ziEz7125.exe 3300 it904627.exe 2484 jr418889.exe 2052 1.exe 4840 kp977799.exe 3924 lr896310.exe 1640 oneetx.exe 4468 oneetx.exe 1252 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1568 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it904627.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it904627.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziEz7125.exe790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exeziLq7534.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziEz7125.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLq7534.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLq7534.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEz7125.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3852 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3868 2484 WerFault.exe jr418889.exe 1692 3924 WerFault.exe lr896310.exe 1416 3924 WerFault.exe lr896310.exe 1552 3924 WerFault.exe lr896310.exe 824 3924 WerFault.exe lr896310.exe 3048 3924 WerFault.exe lr896310.exe 1616 3924 WerFault.exe lr896310.exe 3008 3924 WerFault.exe lr896310.exe 4960 3924 WerFault.exe lr896310.exe 1604 3924 WerFault.exe lr896310.exe 3300 3924 WerFault.exe lr896310.exe 3824 1640 WerFault.exe oneetx.exe 3396 1640 WerFault.exe oneetx.exe 2268 1640 WerFault.exe oneetx.exe 828 1640 WerFault.exe oneetx.exe 376 1640 WerFault.exe oneetx.exe 832 1640 WerFault.exe oneetx.exe 2192 1640 WerFault.exe oneetx.exe 4112 1640 WerFault.exe oneetx.exe 1600 1640 WerFault.exe oneetx.exe 3124 1640 WerFault.exe oneetx.exe 4448 1640 WerFault.exe oneetx.exe 4876 4468 WerFault.exe oneetx.exe 544 4468 WerFault.exe oneetx.exe 3976 4468 WerFault.exe oneetx.exe 2900 1640 WerFault.exe oneetx.exe 4136 1640 WerFault.exe oneetx.exe 3020 1640 WerFault.exe oneetx.exe 4304 1252 WerFault.exe oneetx.exe 1080 1252 WerFault.exe oneetx.exe 4200 1252 WerFault.exe oneetx.exe 532 1640 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it904627.exe1.exekp977799.exepid process 3300 it904627.exe 3300 it904627.exe 2052 1.exe 4840 kp977799.exe 2052 1.exe 4840 kp977799.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it904627.exejr418889.exe1.exekp977799.exedescription pid process Token: SeDebugPrivilege 3300 it904627.exe Token: SeDebugPrivilege 2484 jr418889.exe Token: SeDebugPrivilege 2052 1.exe Token: SeDebugPrivilege 4840 kp977799.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr896310.exepid process 3924 lr896310.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exeziLq7534.exeziEz7125.exejr418889.exelr896310.exeoneetx.exedescription pid process target process PID 4784 wrote to memory of 4936 4784 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe ziLq7534.exe PID 4784 wrote to memory of 4936 4784 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe ziLq7534.exe PID 4784 wrote to memory of 4936 4784 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe ziLq7534.exe PID 4936 wrote to memory of 1412 4936 ziLq7534.exe ziEz7125.exe PID 4936 wrote to memory of 1412 4936 ziLq7534.exe ziEz7125.exe PID 4936 wrote to memory of 1412 4936 ziLq7534.exe ziEz7125.exe PID 1412 wrote to memory of 3300 1412 ziEz7125.exe it904627.exe PID 1412 wrote to memory of 3300 1412 ziEz7125.exe it904627.exe PID 1412 wrote to memory of 2484 1412 ziEz7125.exe jr418889.exe PID 1412 wrote to memory of 2484 1412 ziEz7125.exe jr418889.exe PID 1412 wrote to memory of 2484 1412 ziEz7125.exe jr418889.exe PID 2484 wrote to memory of 2052 2484 jr418889.exe 1.exe PID 2484 wrote to memory of 2052 2484 jr418889.exe 1.exe PID 2484 wrote to memory of 2052 2484 jr418889.exe 1.exe PID 4936 wrote to memory of 4840 4936 ziLq7534.exe kp977799.exe PID 4936 wrote to memory of 4840 4936 ziLq7534.exe kp977799.exe PID 4936 wrote to memory of 4840 4936 ziLq7534.exe kp977799.exe PID 4784 wrote to memory of 3924 4784 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe lr896310.exe PID 4784 wrote to memory of 3924 4784 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe lr896310.exe PID 4784 wrote to memory of 3924 4784 790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe lr896310.exe PID 3924 wrote to memory of 1640 3924 lr896310.exe oneetx.exe PID 3924 wrote to memory of 1640 3924 lr896310.exe oneetx.exe PID 3924 wrote to memory of 1640 3924 lr896310.exe oneetx.exe PID 1640 wrote to memory of 4544 1640 oneetx.exe schtasks.exe PID 1640 wrote to memory of 4544 1640 oneetx.exe schtasks.exe PID 1640 wrote to memory of 4544 1640 oneetx.exe schtasks.exe PID 1640 wrote to memory of 1568 1640 oneetx.exe rundll32.exe PID 1640 wrote to memory of 1568 1640 oneetx.exe rundll32.exe PID 1640 wrote to memory of 1568 1640 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe"C:\Users\Admin\AppData\Local\Temp\790dd705910b2476df7c30af1bdade0b655aa67eb8fbdecfbe72247a2ccdea74.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLq7534.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLq7534.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEz7125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEz7125.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it904627.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it904627.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr418889.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr418889.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 13805⤵
- Program crash
PID:3868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp977799.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp977799.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr896310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr896310.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 7043⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 7683⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 8603⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 9563⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 9843⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 9803⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 12203⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 12723⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 13203⤵
- Program crash
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 6964⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 8684⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 8604⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10564⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10764⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10964⤵
- Program crash
PID:832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 11324⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10124⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 6884⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 12924⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 13364⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 11244⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10924⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 8524⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 16044⤵
- Program crash
PID:532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 13643⤵
- Program crash
PID:3300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2484 -ip 24841⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3924 -ip 39241⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3924 -ip 39241⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3924 -ip 39241⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3924 -ip 39241⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3924 -ip 39241⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3924 -ip 39241⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3924 -ip 39241⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3924 -ip 39241⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3924 -ip 39241⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 3924 -ip 39241⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1640 -ip 16401⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1640 -ip 16401⤵PID:672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1640 -ip 16401⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1640 -ip 16401⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 1640 -ip 16401⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1640 -ip 16401⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1640 -ip 16401⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1640 -ip 16401⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 1640 -ip 16401⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 1640 -ip 16401⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 1640 -ip 16401⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 3962⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 4402⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 4402⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 4468 -ip 44681⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4468 -ip 44681⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 4468 -ip 44681⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 1640 -ip 16401⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 1640 -ip 16401⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 1640 -ip 16401⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 3962⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 4402⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 4402⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 1252 -ip 12521⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 1252 -ip 12521⤵PID:688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 1252 -ip 12521⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 1640 -ip 16401⤵PID:4624
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD5a1e86661d9c8e610e350620548680261
SHA123217dfc39a8a5bbe478643a9ba3c6e2af5a321c
SHA256152a3e8ead60cf0bb38ccac364b98d4f06a748e2cb5b805edaf7500c6e0e4e19
SHA512d6a2e5ba80a3e622d26bdd4276b47681d0244c7cb81c1098c1207c9e289b9f8fd3c595c177a67a2521902975c95e9a341eecf98fc7b2f6d6671d2ab2028f9ce2
-
Filesize
723KB
MD5a1e86661d9c8e610e350620548680261
SHA123217dfc39a8a5bbe478643a9ba3c6e2af5a321c
SHA256152a3e8ead60cf0bb38ccac364b98d4f06a748e2cb5b805edaf7500c6e0e4e19
SHA512d6a2e5ba80a3e622d26bdd4276b47681d0244c7cb81c1098c1207c9e289b9f8fd3c595c177a67a2521902975c95e9a341eecf98fc7b2f6d6671d2ab2028f9ce2
-
Filesize
169KB
MD5c8d60226ad08d4f9f5ee6b89aada33f7
SHA1c3b77d6a9274995c19be9f40e1791ec841fa6bca
SHA2560406c2e32020d35173ab531b8ee57bf1db903211064e48166e09d352ee91d8df
SHA5124d91bf79ffde48c6b64e521eac4061a0d0860aa39579cea976834317c8820816f75ed89b7959a30f721ff30f17ec6f1945172ce840384861255c03961084101b
-
Filesize
169KB
MD5c8d60226ad08d4f9f5ee6b89aada33f7
SHA1c3b77d6a9274995c19be9f40e1791ec841fa6bca
SHA2560406c2e32020d35173ab531b8ee57bf1db903211064e48166e09d352ee91d8df
SHA5124d91bf79ffde48c6b64e521eac4061a0d0860aa39579cea976834317c8820816f75ed89b7959a30f721ff30f17ec6f1945172ce840384861255c03961084101b
-
Filesize
569KB
MD5537bf9f97b6eb6bfe92ecad33b5ed792
SHA1b2be72577e1d2ca2bcc0091385caa17ff464daa3
SHA256389c938c4411bc92f07622575bdc7fb971a12f45949db48e39be36ffda9f4cb4
SHA51261ab55ae8570304069ac5a52ce6a9e61759b9f0daf09953a1a0edcd71cefd4680236fcef017cf2e4b1ade8ed3e2f1f8194f0eef445d28b03e5f357a1eef34484
-
Filesize
569KB
MD5537bf9f97b6eb6bfe92ecad33b5ed792
SHA1b2be72577e1d2ca2bcc0091385caa17ff464daa3
SHA256389c938c4411bc92f07622575bdc7fb971a12f45949db48e39be36ffda9f4cb4
SHA51261ab55ae8570304069ac5a52ce6a9e61759b9f0daf09953a1a0edcd71cefd4680236fcef017cf2e4b1ade8ed3e2f1f8194f0eef445d28b03e5f357a1eef34484
-
Filesize
11KB
MD50446f99b584c6b532f259f86e7557f13
SHA1c266f5b0b124cd947268e036277ee346271181a6
SHA256309c626361ab25fee390fe49f10c01b64a9fa1d8d6433c1d6120d466a75d27c7
SHA512e241deb428450413a8af9deb66a0451961de727648726abd2f258516e12d60baf430303bb1662a60d3c1e9ac2df65cd4c85b6fb7e844756ac386511c016b876e
-
Filesize
11KB
MD50446f99b584c6b532f259f86e7557f13
SHA1c266f5b0b124cd947268e036277ee346271181a6
SHA256309c626361ab25fee390fe49f10c01b64a9fa1d8d6433c1d6120d466a75d27c7
SHA512e241deb428450413a8af9deb66a0451961de727648726abd2f258516e12d60baf430303bb1662a60d3c1e9ac2df65cd4c85b6fb7e844756ac386511c016b876e
-
Filesize
587KB
MD5232802768df01b70fcd222fe93897006
SHA13632b431498b1d64b38fd91916927cf4073f8dc5
SHA256d184083dd4d068023009876ee480b75932421e5af294e6dfcd0f54547e6fa2d9
SHA512cd6fe06634bcdfa67f2d0cd54ed2fb978745f9acd0dd558b3e7023f8a13605d74173293e2f5acfe9788f738c1db7a87fd949a26c1f8b93dd8d19819fc5387fd1
-
Filesize
587KB
MD5232802768df01b70fcd222fe93897006
SHA13632b431498b1d64b38fd91916927cf4073f8dc5
SHA256d184083dd4d068023009876ee480b75932421e5af294e6dfcd0f54547e6fa2d9
SHA512cd6fe06634bcdfa67f2d0cd54ed2fb978745f9acd0dd558b3e7023f8a13605d74173293e2f5acfe9788f738c1db7a87fd949a26c1f8b93dd8d19819fc5387fd1
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1