Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 06:14
Static task
static1
General
-
Target
aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe
-
Size
1.2MB
-
MD5
4d06169edd48a8de609f0050ea498fec
-
SHA1
314681fd4b456cbfd742cbbe18160f87980c5122
-
SHA256
aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287
-
SHA512
23994e0497fc3f920facea2216d2f7a54f51cb15868e231608634652fc35f36a4144327953e1bd599e413414c3445d2309012727b0394957fad4a0c146f93f4a
-
SSDEEP
24576:NyxPFQQEmjkZKpcSonV7nV45aLaI/g6NbOuZhI75pFpLfFm:ox2Q7VoRnta0LbOu87XFdN
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr291396.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr291396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr291396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr291396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr291396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr291396.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr291396.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu208630.exesi132252.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu208630.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si132252.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un094290.exeun940882.exepr291396.exequ208630.exe1.exerk458545.exesi132252.exeoneetx.exeoneetx.exeoneetx.exepid process 388 un094290.exe 1036 un940882.exe 1168 pr291396.exe 4464 qu208630.exe 1960 1.exe 3456 rk458545.exe 900 si132252.exe 4720 oneetx.exe 3104 oneetx.exe 524 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2152 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr291396.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr291396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr291396.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un094290.exeun940882.exeaaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un094290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un940882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un940882.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un094290.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4116 1168 WerFault.exe pr291396.exe 4680 4464 WerFault.exe qu208630.exe 5016 900 WerFault.exe si132252.exe 4212 900 WerFault.exe si132252.exe 2476 900 WerFault.exe si132252.exe 2200 900 WerFault.exe si132252.exe 932 900 WerFault.exe si132252.exe 5036 900 WerFault.exe si132252.exe 1368 900 WerFault.exe si132252.exe 4256 900 WerFault.exe si132252.exe 2320 900 WerFault.exe si132252.exe 1496 900 WerFault.exe si132252.exe 1736 4720 WerFault.exe oneetx.exe 2616 4720 WerFault.exe oneetx.exe 2268 4720 WerFault.exe oneetx.exe 4416 4720 WerFault.exe oneetx.exe 3112 4720 WerFault.exe oneetx.exe 3892 4720 WerFault.exe oneetx.exe 4592 4720 WerFault.exe oneetx.exe 3008 4720 WerFault.exe oneetx.exe 1308 4720 WerFault.exe oneetx.exe 3588 4720 WerFault.exe oneetx.exe 3432 4720 WerFault.exe oneetx.exe 3784 3104 WerFault.exe oneetx.exe 4480 3104 WerFault.exe oneetx.exe 824 3104 WerFault.exe oneetx.exe 5048 4720 WerFault.exe oneetx.exe 1352 4720 WerFault.exe oneetx.exe 4620 4720 WerFault.exe oneetx.exe 3092 524 WerFault.exe oneetx.exe 532 524 WerFault.exe oneetx.exe 1456 524 WerFault.exe oneetx.exe 1696 4720 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr291396.exerk458545.exe1.exepid process 1168 pr291396.exe 1168 pr291396.exe 3456 rk458545.exe 3456 rk458545.exe 1960 1.exe 1960 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr291396.exequ208630.exerk458545.exe1.exedescription pid process Token: SeDebugPrivilege 1168 pr291396.exe Token: SeDebugPrivilege 4464 qu208630.exe Token: SeDebugPrivilege 3456 rk458545.exe Token: SeDebugPrivilege 1960 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si132252.exepid process 900 si132252.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exeun094290.exeun940882.exequ208630.exesi132252.exeoneetx.exedescription pid process target process PID 3528 wrote to memory of 388 3528 aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe un094290.exe PID 3528 wrote to memory of 388 3528 aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe un094290.exe PID 3528 wrote to memory of 388 3528 aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe un094290.exe PID 388 wrote to memory of 1036 388 un094290.exe un940882.exe PID 388 wrote to memory of 1036 388 un094290.exe un940882.exe PID 388 wrote to memory of 1036 388 un094290.exe un940882.exe PID 1036 wrote to memory of 1168 1036 un940882.exe pr291396.exe PID 1036 wrote to memory of 1168 1036 un940882.exe pr291396.exe PID 1036 wrote to memory of 1168 1036 un940882.exe pr291396.exe PID 1036 wrote to memory of 4464 1036 un940882.exe qu208630.exe PID 1036 wrote to memory of 4464 1036 un940882.exe qu208630.exe PID 1036 wrote to memory of 4464 1036 un940882.exe qu208630.exe PID 4464 wrote to memory of 1960 4464 qu208630.exe 1.exe PID 4464 wrote to memory of 1960 4464 qu208630.exe 1.exe PID 4464 wrote to memory of 1960 4464 qu208630.exe 1.exe PID 388 wrote to memory of 3456 388 un094290.exe rk458545.exe PID 388 wrote to memory of 3456 388 un094290.exe rk458545.exe PID 388 wrote to memory of 3456 388 un094290.exe rk458545.exe PID 3528 wrote to memory of 900 3528 aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe si132252.exe PID 3528 wrote to memory of 900 3528 aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe si132252.exe PID 3528 wrote to memory of 900 3528 aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe si132252.exe PID 900 wrote to memory of 4720 900 si132252.exe oneetx.exe PID 900 wrote to memory of 4720 900 si132252.exe oneetx.exe PID 900 wrote to memory of 4720 900 si132252.exe oneetx.exe PID 4720 wrote to memory of 4296 4720 oneetx.exe schtasks.exe PID 4720 wrote to memory of 4296 4720 oneetx.exe schtasks.exe PID 4720 wrote to memory of 4296 4720 oneetx.exe schtasks.exe PID 4720 wrote to memory of 2152 4720 oneetx.exe rundll32.exe PID 4720 wrote to memory of 2152 4720 oneetx.exe rundll32.exe PID 4720 wrote to memory of 2152 4720 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe"C:\Users\Admin\AppData\Local\Temp\aaa84b81b69d97cb4d61432076e70aa92340560250a93786dca485815f0a4287.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094290.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un094290.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un940882.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un940882.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr291396.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr291396.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 11045⤵
- Program crash
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu208630.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu208630.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 13805⤵
- Program crash
PID:4680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk458545.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk458545.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si132252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si132252.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 7003⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 7843⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 8603⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 9763⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 10163⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 9963⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 12243⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 12803⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 13203⤵
- Program crash
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 6964⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 7924⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 8924⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 10604⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 10844⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 11044⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 11284⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 9964⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 7804⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 13204⤵
- Program crash
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 13524⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 11524⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 15484⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 11124⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 15404⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 13883⤵
- Program crash
PID:1496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1168 -ip 11681⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4464 -ip 44641⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 900 -ip 9001⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 900 -ip 9001⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 900 -ip 9001⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 900 -ip 9001⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 900 -ip 9001⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 900 -ip 9001⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 900 -ip 9001⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 900 -ip 9001⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 900 -ip 9001⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 900 -ip 9001⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4720 -ip 47201⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4720 -ip 47201⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4720 -ip 47201⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4720 -ip 47201⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4720 -ip 47201⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4720 -ip 47201⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4720 -ip 47201⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4720 -ip 47201⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4720 -ip 47201⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4720 -ip 47201⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4720 -ip 47201⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 3962⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 4402⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 4402⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3104 -ip 31041⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3104 -ip 31041⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3104 -ip 31041⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4720 -ip 47201⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4720 -ip 47201⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4720 -ip 47201⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 3962⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 4642⤵
- Program crash
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 4162⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 524 -ip 5241⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 524 -ip 5241⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 524 -ip 5241⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4720 -ip 47201⤵PID:4288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
861KB
MD548f2d8e40fe0474fc4076aa2291cdf39
SHA1ff35791b3cf298a5baf5053ff3258268253c997c
SHA2564c60e00ec4a77360f7e88ef560b6d2b1a0dc0948d28deac27d3999625ba72c57
SHA51291627ba2a3984c484321bc1709fb0bd0111e0e6fe216b1431d7aa9ae6d2a6654fba7d5885d31ead4846406114ccbee4fa1279a591f91fbfb73d09245933504b3
-
Filesize
861KB
MD548f2d8e40fe0474fc4076aa2291cdf39
SHA1ff35791b3cf298a5baf5053ff3258268253c997c
SHA2564c60e00ec4a77360f7e88ef560b6d2b1a0dc0948d28deac27d3999625ba72c57
SHA51291627ba2a3984c484321bc1709fb0bd0111e0e6fe216b1431d7aa9ae6d2a6654fba7d5885d31ead4846406114ccbee4fa1279a591f91fbfb73d09245933504b3
-
Filesize
169KB
MD5dd5c1b1e4b7593f7a69baa73151c1d2b
SHA1e3438744f2272344dc96c657c7022c844419ec1d
SHA25666ad205274e7eec528cef6bd826424096e6f81f92635dbb8999a463d71b1d11f
SHA512ada9967be720ca30f7563c04cdd6ae76ef3749f9e522f316e9e3ebe226a5ea6db58cefdd1f5ccafc28752a45296e347d441eaec99a9f872c2caf0b8988416c9a
-
Filesize
169KB
MD5dd5c1b1e4b7593f7a69baa73151c1d2b
SHA1e3438744f2272344dc96c657c7022c844419ec1d
SHA25666ad205274e7eec528cef6bd826424096e6f81f92635dbb8999a463d71b1d11f
SHA512ada9967be720ca30f7563c04cdd6ae76ef3749f9e522f316e9e3ebe226a5ea6db58cefdd1f5ccafc28752a45296e347d441eaec99a9f872c2caf0b8988416c9a
-
Filesize
707KB
MD5c934c23eb6e7a5f2bc81f855bb855039
SHA115f232f1213fe26ef9605bfa696a6838e7144567
SHA256d2e4f326cc31c39bfb01c27242c27dbe3871b41b84184b6c0fbb8db08dc70a0f
SHA512cd217a2fdbf747e48a327d78e83359fc672834a060a3806c45362b9aba82db1854af35f9bd981929c2faf21f47af4a2d43eaede6d9885b420df6d13d473afb37
-
Filesize
707KB
MD5c934c23eb6e7a5f2bc81f855bb855039
SHA115f232f1213fe26ef9605bfa696a6838e7144567
SHA256d2e4f326cc31c39bfb01c27242c27dbe3871b41b84184b6c0fbb8db08dc70a0f
SHA512cd217a2fdbf747e48a327d78e83359fc672834a060a3806c45362b9aba82db1854af35f9bd981929c2faf21f47af4a2d43eaede6d9885b420df6d13d473afb37
-
Filesize
404KB
MD527bd784e111bfc0c4ab7c2c2ef2d6c53
SHA14feeba5e8c350d3483de5d62bcf80c47fabe0dc9
SHA256f62038d99640a67348763ec4e1270b61fadef5563d22681ed495d2f35e6dad09
SHA512a944be1946ef4fe9f36d6b33589ad780fda6347eb5fad889cdffb7409a8d3d180cc50a7c7a7b0f255ae62275f8da9feee8efbbfd191242765506c3bb479da016
-
Filesize
404KB
MD527bd784e111bfc0c4ab7c2c2ef2d6c53
SHA14feeba5e8c350d3483de5d62bcf80c47fabe0dc9
SHA256f62038d99640a67348763ec4e1270b61fadef5563d22681ed495d2f35e6dad09
SHA512a944be1946ef4fe9f36d6b33589ad780fda6347eb5fad889cdffb7409a8d3d180cc50a7c7a7b0f255ae62275f8da9feee8efbbfd191242765506c3bb479da016
-
Filesize
587KB
MD5097c8813000842c10470b6a5850ae7a9
SHA178b60ac960752a1353867d410e3d4197e3955939
SHA256674636685fae9c9d784ca3041b8c8cd33d36f19729f563fa8e0f1c6b59b1e796
SHA51232d128407c0080efc99f10ee47fd65f4f229ff5d9d56be69b10cb178ef961bf370b5e43b2b5c7712a12794000e3968d2b9c39c8ca3f2de357c9aa3522f71467b
-
Filesize
587KB
MD5097c8813000842c10470b6a5850ae7a9
SHA178b60ac960752a1353867d410e3d4197e3955939
SHA256674636685fae9c9d784ca3041b8c8cd33d36f19729f563fa8e0f1c6b59b1e796
SHA51232d128407c0080efc99f10ee47fd65f4f229ff5d9d56be69b10cb178ef961bf370b5e43b2b5c7712a12794000e3968d2b9c39c8ca3f2de357c9aa3522f71467b
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1