Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 06:10
Static task
static1
General
-
Target
57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe
-
Size
1.2MB
-
MD5
6673912a8b2b743dfb88598c95b5884e
-
SHA1
4b01743a5230b7418a786d7564e9130f66c51a6f
-
SHA256
57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4
-
SHA512
02275d950d64370a6010c047e5ebe69d25719d55df2bdd98ec2564af848b3997c88e2cbd115975769cda22d45a3b0207e78b4c02a03f1e5e6d365a6ee2cc7035
-
SSDEEP
24576:GyQWd/J+zPoo28hGnMyo/HyQVtyCWVNUbLaVC1uVIbcVQAT93Y:VQWFyPPMMyo6jkaI2IbcV7R3
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr480242.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr480242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr480242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr480242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr480242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr480242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr480242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu529144.exesi688873.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation qu529144.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si688873.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un815360.exeun948586.exepr480242.exequ529144.exe1.exerk035529.exesi688873.exeoneetx.exeoneetx.exepid process 3396 un815360.exe 1548 un948586.exe 1668 pr480242.exe 2456 qu529144.exe 1360 1.exe 3640 rk035529.exe 2272 si688873.exe 328 oneetx.exe 2456 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3596 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr480242.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr480242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr480242.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exeun815360.exeun948586.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un815360.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un815360.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un948586.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un948586.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1372 1668 WerFault.exe pr480242.exe 1720 2456 WerFault.exe qu529144.exe 5024 2272 WerFault.exe si688873.exe 5096 2272 WerFault.exe si688873.exe 2536 2272 WerFault.exe si688873.exe 1632 2272 WerFault.exe si688873.exe 4896 2272 WerFault.exe si688873.exe 5036 2272 WerFault.exe si688873.exe 1576 2272 WerFault.exe si688873.exe 900 2272 WerFault.exe si688873.exe 892 2272 WerFault.exe si688873.exe 3280 2272 WerFault.exe si688873.exe 3936 2272 WerFault.exe si688873.exe 1568 328 WerFault.exe oneetx.exe 3356 328 WerFault.exe oneetx.exe 4728 328 WerFault.exe oneetx.exe 3908 328 WerFault.exe oneetx.exe 4312 328 WerFault.exe oneetx.exe 4492 328 WerFault.exe oneetx.exe 668 328 WerFault.exe oneetx.exe 2600 328 WerFault.exe oneetx.exe 4856 328 WerFault.exe oneetx.exe 3740 328 WerFault.exe oneetx.exe 4800 328 WerFault.exe oneetx.exe 4208 328 WerFault.exe oneetx.exe 464 2456 WerFault.exe oneetx.exe 4080 2456 WerFault.exe oneetx.exe 4448 2456 WerFault.exe oneetx.exe 3396 328 WerFault.exe oneetx.exe 3572 328 WerFault.exe oneetx.exe 1536 328 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr480242.exerk035529.exe1.exepid process 1668 pr480242.exe 1668 pr480242.exe 3640 rk035529.exe 3640 rk035529.exe 1360 1.exe 1360 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr480242.exequ529144.exerk035529.exe1.exedescription pid process Token: SeDebugPrivilege 1668 pr480242.exe Token: SeDebugPrivilege 2456 qu529144.exe Token: SeDebugPrivilege 3640 rk035529.exe Token: SeDebugPrivilege 1360 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si688873.exepid process 2272 si688873.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exeun815360.exeun948586.exequ529144.exesi688873.exeoneetx.exedescription pid process target process PID 2288 wrote to memory of 3396 2288 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe un815360.exe PID 2288 wrote to memory of 3396 2288 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe un815360.exe PID 2288 wrote to memory of 3396 2288 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe un815360.exe PID 3396 wrote to memory of 1548 3396 un815360.exe un948586.exe PID 3396 wrote to memory of 1548 3396 un815360.exe un948586.exe PID 3396 wrote to memory of 1548 3396 un815360.exe un948586.exe PID 1548 wrote to memory of 1668 1548 un948586.exe pr480242.exe PID 1548 wrote to memory of 1668 1548 un948586.exe pr480242.exe PID 1548 wrote to memory of 1668 1548 un948586.exe pr480242.exe PID 1548 wrote to memory of 2456 1548 un948586.exe qu529144.exe PID 1548 wrote to memory of 2456 1548 un948586.exe qu529144.exe PID 1548 wrote to memory of 2456 1548 un948586.exe qu529144.exe PID 2456 wrote to memory of 1360 2456 qu529144.exe 1.exe PID 2456 wrote to memory of 1360 2456 qu529144.exe 1.exe PID 2456 wrote to memory of 1360 2456 qu529144.exe 1.exe PID 3396 wrote to memory of 3640 3396 un815360.exe rk035529.exe PID 3396 wrote to memory of 3640 3396 un815360.exe rk035529.exe PID 3396 wrote to memory of 3640 3396 un815360.exe rk035529.exe PID 2288 wrote to memory of 2272 2288 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe si688873.exe PID 2288 wrote to memory of 2272 2288 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe si688873.exe PID 2288 wrote to memory of 2272 2288 57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe si688873.exe PID 2272 wrote to memory of 328 2272 si688873.exe oneetx.exe PID 2272 wrote to memory of 328 2272 si688873.exe oneetx.exe PID 2272 wrote to memory of 328 2272 si688873.exe oneetx.exe PID 328 wrote to memory of 4476 328 oneetx.exe schtasks.exe PID 328 wrote to memory of 4476 328 oneetx.exe schtasks.exe PID 328 wrote to memory of 4476 328 oneetx.exe schtasks.exe PID 328 wrote to memory of 3596 328 oneetx.exe rundll32.exe PID 328 wrote to memory of 3596 328 oneetx.exe rundll32.exe PID 328 wrote to memory of 3596 328 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe"C:\Users\Admin\AppData\Local\Temp\57270b07ddb671e761849c4be055a59669e5f4e6c6f9060ccf2679046ae7f4b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un815360.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un815360.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un948586.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un948586.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr480242.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr480242.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10485⤵
- Program crash
PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu529144.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu529144.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 14405⤵
- Program crash
PID:1720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk035529.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk035529.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si688873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si688873.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 7003⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 7843⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 8003⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 9723⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 9723⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 10003⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 12203⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 12203⤵
- Program crash
PID:900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 13163⤵
- Program crash
PID:892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 13243⤵
- Program crash
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 6964⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 8404⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 9084⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 9044⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 10564⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 11004⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 10564⤵
- Program crash
PID:668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 10924⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 9964⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 13044⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 13204⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 13284⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 11004⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 16044⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 11004⤵
- Program crash
PID:1536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 12803⤵
- Program crash
PID:3936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1668 -ip 16681⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2456 -ip 24561⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2272 -ip 22721⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2272 -ip 22721⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2272 -ip 22721⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2272 -ip 22721⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2272 -ip 22721⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2272 -ip 22721⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2272 -ip 22721⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2272 -ip 22721⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2272 -ip 22721⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2272 -ip 22721⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2272 -ip 22721⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 328 -ip 3281⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 328 -ip 3281⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 328 -ip 3281⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 328 -ip 3281⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 328 -ip 3281⤵PID:508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 328 -ip 3281⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 328 -ip 3281⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 328 -ip 3281⤵PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 328 -ip 3281⤵PID:572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 328 -ip 3281⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 328 -ip 3281⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 328 -ip 3281⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 3962⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 4402⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 4402⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2456 -ip 24561⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2456 -ip 24561⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2456 -ip 24561⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 328 -ip 3281⤵PID:4900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 328 -ip 3281⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 328 -ip 3281⤵PID:1808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
861KB
MD55d98cc3846edf3aaf203acee3d05abe2
SHA1e541457979ee05b4c0d0fe8b66bc20f3081a8633
SHA256e82ba5f2c85087c032e136e7ae656704e45982013f6465f4239f11b738e80c39
SHA51286825afaf4ddbd7a8d872f3f9669df6ba60f96e457b06dd97f4e6aae56e5bc3c66958cacd0bbdd00f362b32dd831d2cca45b363715707bff6b4c6c206a3fc74e
-
Filesize
861KB
MD55d98cc3846edf3aaf203acee3d05abe2
SHA1e541457979ee05b4c0d0fe8b66bc20f3081a8633
SHA256e82ba5f2c85087c032e136e7ae656704e45982013f6465f4239f11b738e80c39
SHA51286825afaf4ddbd7a8d872f3f9669df6ba60f96e457b06dd97f4e6aae56e5bc3c66958cacd0bbdd00f362b32dd831d2cca45b363715707bff6b4c6c206a3fc74e
-
Filesize
169KB
MD53383538b957a237db940de35dc5243f2
SHA174681ad3a88536dabccd11aec988f4a7ff053eb5
SHA2560c4a96758b01112624086877c14e466e5f011572bbd9f84878c6805985e65114
SHA51241f5b7c6ad547288c9320e7fd268dd9cb098297f96000d3ab6390587178ab9fbf3dcf060b299a2bc147f58bdeecfb4be8196f3e13cce61b62f09853b380b9370
-
Filesize
169KB
MD53383538b957a237db940de35dc5243f2
SHA174681ad3a88536dabccd11aec988f4a7ff053eb5
SHA2560c4a96758b01112624086877c14e466e5f011572bbd9f84878c6805985e65114
SHA51241f5b7c6ad547288c9320e7fd268dd9cb098297f96000d3ab6390587178ab9fbf3dcf060b299a2bc147f58bdeecfb4be8196f3e13cce61b62f09853b380b9370
-
Filesize
707KB
MD57da1355fc385cb4edcf0260817f1e81f
SHA1bdd652c6d00084e2f71481a10794bb405de5308c
SHA256b46895a0a7e369b1e396234fd296e996b99e00c3769f4493aa25b0dfb024465d
SHA5122c7d22d84020e9ee277a4092d489ca125e6a50b3e0d26d6094c75e59ef9dd646abbb5a7d406b8b9790b3dd29dc99b92893d4684b3f5d413deaffa1611b03952a
-
Filesize
707KB
MD57da1355fc385cb4edcf0260817f1e81f
SHA1bdd652c6d00084e2f71481a10794bb405de5308c
SHA256b46895a0a7e369b1e396234fd296e996b99e00c3769f4493aa25b0dfb024465d
SHA5122c7d22d84020e9ee277a4092d489ca125e6a50b3e0d26d6094c75e59ef9dd646abbb5a7d406b8b9790b3dd29dc99b92893d4684b3f5d413deaffa1611b03952a
-
Filesize
404KB
MD56be60568f15507faf72d7abea19aadde
SHA1e18ba9d554ed1ba7ea3c42dbeedbce8648c9fb86
SHA2564bad4e8bf42d6a4864724205fc3be2ae060975904dfd15d7ba1f7f4e3b35228b
SHA5129a1617da9f657f5367db07c6259254e9e62603b7fd5285387a4109988eaf0403ee16a91a1d4d5f49108e964d40448b5f0b58c590cb012a2c7ba5ef80f8f91309
-
Filesize
404KB
MD56be60568f15507faf72d7abea19aadde
SHA1e18ba9d554ed1ba7ea3c42dbeedbce8648c9fb86
SHA2564bad4e8bf42d6a4864724205fc3be2ae060975904dfd15d7ba1f7f4e3b35228b
SHA5129a1617da9f657f5367db07c6259254e9e62603b7fd5285387a4109988eaf0403ee16a91a1d4d5f49108e964d40448b5f0b58c590cb012a2c7ba5ef80f8f91309
-
Filesize
587KB
MD5a77c7693df3614f2a147a0397bfc24de
SHA1ce0db1ac2d77699f8e6af4fb4a047658afa55196
SHA25612f4286852be54f1b5ed8fe48a973b5bc61a38001fc3d94ff1bde113fc56972d
SHA512f2fcd51672a401f04d3829104d090f59b850aa39a9f516e26b4142f2df540ed4ba30fcdf1f5cd3fee7c36431a83590ee9b5c8e9fda2a0957926a4f8e8541a966
-
Filesize
587KB
MD5a77c7693df3614f2a147a0397bfc24de
SHA1ce0db1ac2d77699f8e6af4fb4a047658afa55196
SHA25612f4286852be54f1b5ed8fe48a973b5bc61a38001fc3d94ff1bde113fc56972d
SHA512f2fcd51672a401f04d3829104d090f59b850aa39a9f516e26b4142f2df540ed4ba30fcdf1f5cd3fee7c36431a83590ee9b5c8e9fda2a0957926a4f8e8541a966
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1