Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:18
Static task
static1
General
-
Target
278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe
-
Size
1.0MB
-
MD5
1e235371cbb89ab17f8e91e6397b44aa
-
SHA1
00d9968b91bb1609f873c8ba3a20486bcf667727
-
SHA256
278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f
-
SHA512
e9d18fe070506197b6212c896c8f9ef22c4051d239b45a27244ebb5811e0b4b12b3dd14e82f99fc04f22610ecf783c59d0f5e833148f1e2f53b8ab2cb1387da2
-
SSDEEP
24576:My4D/I2rBoobiY5D2P9Vjf7LwBcxzs3UMmUKNRdMiBT:74D/vxbH5KRweqKmiB
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it583714.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it583714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it583714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it583714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it583714.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it583714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it583714.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr668735.exelr895378.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr668735.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr895378.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziRX0380.exeziNt1796.exeit583714.exejr668735.exe1.exekp439648.exelr895378.exeoneetx.exeoneetx.exeoneetx.exepid process 4508 ziRX0380.exe 4228 ziNt1796.exe 3588 it583714.exe 2112 jr668735.exe 1616 1.exe 2932 kp439648.exe 3896 lr895378.exe 1352 oneetx.exe 4216 oneetx.exe 784 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1976 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it583714.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it583714.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziRX0380.exeziNt1796.exe278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRX0380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRX0380.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNt1796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziNt1796.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4400 2112 WerFault.exe jr668735.exe 3208 3896 WerFault.exe lr895378.exe 4884 3896 WerFault.exe lr895378.exe 2052 3896 WerFault.exe lr895378.exe 3604 3896 WerFault.exe lr895378.exe 3356 3896 WerFault.exe lr895378.exe 2544 3896 WerFault.exe lr895378.exe 4516 3896 WerFault.exe lr895378.exe 3400 3896 WerFault.exe lr895378.exe 1164 3896 WerFault.exe lr895378.exe 3644 3896 WerFault.exe lr895378.exe 5024 1352 WerFault.exe oneetx.exe 3660 1352 WerFault.exe oneetx.exe 2108 1352 WerFault.exe oneetx.exe 3648 1352 WerFault.exe oneetx.exe 4144 1352 WerFault.exe oneetx.exe 4736 1352 WerFault.exe oneetx.exe 1584 1352 WerFault.exe oneetx.exe 4364 1352 WerFault.exe oneetx.exe 4212 1352 WerFault.exe oneetx.exe 620 1352 WerFault.exe oneetx.exe 3844 1352 WerFault.exe oneetx.exe 2932 1352 WerFault.exe oneetx.exe 4572 4216 WerFault.exe oneetx.exe 4324 4216 WerFault.exe oneetx.exe 1640 4216 WerFault.exe oneetx.exe 3672 1352 WerFault.exe oneetx.exe 1348 1352 WerFault.exe oneetx.exe 2184 1352 WerFault.exe oneetx.exe 2232 784 WerFault.exe oneetx.exe 2504 784 WerFault.exe oneetx.exe 3944 784 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it583714.exekp439648.exe1.exepid process 3588 it583714.exe 3588 it583714.exe 2932 kp439648.exe 1616 1.exe 1616 1.exe 2932 kp439648.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it583714.exejr668735.exekp439648.exe1.exedescription pid process Token: SeDebugPrivilege 3588 it583714.exe Token: SeDebugPrivilege 2112 jr668735.exe Token: SeDebugPrivilege 2932 kp439648.exe Token: SeDebugPrivilege 1616 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr895378.exepid process 3896 lr895378.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exeziRX0380.exeziNt1796.exejr668735.exelr895378.exeoneetx.exedescription pid process target process PID 2652 wrote to memory of 4508 2652 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe ziRX0380.exe PID 2652 wrote to memory of 4508 2652 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe ziRX0380.exe PID 2652 wrote to memory of 4508 2652 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe ziRX0380.exe PID 4508 wrote to memory of 4228 4508 ziRX0380.exe ziNt1796.exe PID 4508 wrote to memory of 4228 4508 ziRX0380.exe ziNt1796.exe PID 4508 wrote to memory of 4228 4508 ziRX0380.exe ziNt1796.exe PID 4228 wrote to memory of 3588 4228 ziNt1796.exe it583714.exe PID 4228 wrote to memory of 3588 4228 ziNt1796.exe it583714.exe PID 4228 wrote to memory of 2112 4228 ziNt1796.exe jr668735.exe PID 4228 wrote to memory of 2112 4228 ziNt1796.exe jr668735.exe PID 4228 wrote to memory of 2112 4228 ziNt1796.exe jr668735.exe PID 2112 wrote to memory of 1616 2112 jr668735.exe 1.exe PID 2112 wrote to memory of 1616 2112 jr668735.exe 1.exe PID 2112 wrote to memory of 1616 2112 jr668735.exe 1.exe PID 4508 wrote to memory of 2932 4508 ziRX0380.exe kp439648.exe PID 4508 wrote to memory of 2932 4508 ziRX0380.exe kp439648.exe PID 4508 wrote to memory of 2932 4508 ziRX0380.exe kp439648.exe PID 2652 wrote to memory of 3896 2652 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe lr895378.exe PID 2652 wrote to memory of 3896 2652 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe lr895378.exe PID 2652 wrote to memory of 3896 2652 278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe lr895378.exe PID 3896 wrote to memory of 1352 3896 lr895378.exe oneetx.exe PID 3896 wrote to memory of 1352 3896 lr895378.exe oneetx.exe PID 3896 wrote to memory of 1352 3896 lr895378.exe oneetx.exe PID 1352 wrote to memory of 4904 1352 oneetx.exe schtasks.exe PID 1352 wrote to memory of 4904 1352 oneetx.exe schtasks.exe PID 1352 wrote to memory of 4904 1352 oneetx.exe schtasks.exe PID 1352 wrote to memory of 1976 1352 oneetx.exe rundll32.exe PID 1352 wrote to memory of 1976 1352 oneetx.exe rundll32.exe PID 1352 wrote to memory of 1976 1352 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe"C:\Users\Admin\AppData\Local\Temp\278fb819bd2c78378655ddece1bbfb6fe44e304ae66244bfa584cd8060c3667f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRX0380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRX0380.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziNt1796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziNt1796.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it583714.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it583714.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr668735.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr668735.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 13805⤵
- Program crash
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp439648.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp439648.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr895378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr895378.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 7003⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 7843⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 8123⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 9563⤵
- Program crash
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 9643⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 9643⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 12203⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 12483⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 13203⤵
- Program crash
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 6964⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 8884⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 9204⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 10564⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 10964⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 10964⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 10564⤵
- Program crash
PID:1584
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 9364⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 7804⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 7204⤵
- Program crash
PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 12964⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 11164⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 9164⤵
- Program crash
PID:3672
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 10844⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 16484⤵
- Program crash
PID:2184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 13523⤵
- Program crash
PID:3644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2112 -ip 21121⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3896 -ip 38961⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3896 -ip 38961⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3896 -ip 38961⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3896 -ip 38961⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3896 -ip 38961⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3896 -ip 38961⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3896 -ip 38961⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3896 -ip 38961⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3896 -ip 38961⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3896 -ip 38961⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1352 -ip 13521⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1352 -ip 13521⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1352 -ip 13521⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1352 -ip 13521⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1352 -ip 13521⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1352 -ip 13521⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1352 -ip 13521⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1352 -ip 13521⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1352 -ip 13521⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1352 -ip 13521⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1352 -ip 13521⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1352 -ip 13521⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 3962⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 4402⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 4402⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4216 -ip 42161⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4216 -ip 42161⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4216 -ip 42161⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1352 -ip 13521⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1352 -ip 13521⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1352 -ip 13521⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 3962⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 4402⤵
- Program crash
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 5122⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 784 -ip 7841⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 784 -ip 7841⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 784 -ip 7841⤵PID:4648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD5b8f5aaa2d4dcc79059aabdbbe3194823
SHA197db32637248c97e0415e89940285a0297a7e779
SHA256f4e6c9a0bfcb7fa71fbb3b4a2707b138fb8a6f058e7b55ff34b56d6c54a16d41
SHA512e226907a354b485c6b9d06c5a113d1774c8959a37e99465a19336797a70ccf2c0d834b2a11aba23ad0af86259a632c4834aef367f7bd744520055e0ed59387ef
-
Filesize
723KB
MD5b8f5aaa2d4dcc79059aabdbbe3194823
SHA197db32637248c97e0415e89940285a0297a7e779
SHA256f4e6c9a0bfcb7fa71fbb3b4a2707b138fb8a6f058e7b55ff34b56d6c54a16d41
SHA512e226907a354b485c6b9d06c5a113d1774c8959a37e99465a19336797a70ccf2c0d834b2a11aba23ad0af86259a632c4834aef367f7bd744520055e0ed59387ef
-
Filesize
169KB
MD55fc5d6242cdf1695f918b0f4196964f6
SHA1c153fdc6a5f14d48cfeb39bd8ef6ef4781ab113e
SHA256c7b1417e3f351e5fe87ade83b59f98769e5d970ba1f9ca0c45ef4041cba00ebc
SHA512b251b22d6671d4604aa3dcfda61704201590c1dd7b6f2b4b1a1476811348315e03266fea8e12912f91d3dc79686d63850ed3d60eaf0ee5d5ba32c1815bce6cf0
-
Filesize
169KB
MD55fc5d6242cdf1695f918b0f4196964f6
SHA1c153fdc6a5f14d48cfeb39bd8ef6ef4781ab113e
SHA256c7b1417e3f351e5fe87ade83b59f98769e5d970ba1f9ca0c45ef4041cba00ebc
SHA512b251b22d6671d4604aa3dcfda61704201590c1dd7b6f2b4b1a1476811348315e03266fea8e12912f91d3dc79686d63850ed3d60eaf0ee5d5ba32c1815bce6cf0
-
Filesize
569KB
MD538919b5a5dc86109138e9b02352b054e
SHA154b25312b93a77537ab32927dddc59533cb5f1bb
SHA256a1900b8d0fabc25f7877c79a8268ccbf9e46b5983d5b867612cf5bf13eee9dd7
SHA51238bef196bb95cd90e2df4202f589aec235590e133be2a7a03343d4e33803c067f48939452fa17de40b3a2b58fc7095220b07824482989dc1989a9ddabf050fdb
-
Filesize
569KB
MD538919b5a5dc86109138e9b02352b054e
SHA154b25312b93a77537ab32927dddc59533cb5f1bb
SHA256a1900b8d0fabc25f7877c79a8268ccbf9e46b5983d5b867612cf5bf13eee9dd7
SHA51238bef196bb95cd90e2df4202f589aec235590e133be2a7a03343d4e33803c067f48939452fa17de40b3a2b58fc7095220b07824482989dc1989a9ddabf050fdb
-
Filesize
11KB
MD5ab3f48f7163b8941431446db7e470b8a
SHA16e106e645c82d32b4274ba01ccc4fa072bf185e6
SHA25687051a2486230e25fa74b63889b4694f301cbd8de03bc061d1c2d192f3acc9c1
SHA51250eb755811a753b51ed5cc55a1a1230bcb2ea9a84e4815a6e8041b17da959c62c7c8750ec636211122309c49092d1bbc5efd01ae8615c046fb639348b6716527
-
Filesize
11KB
MD5ab3f48f7163b8941431446db7e470b8a
SHA16e106e645c82d32b4274ba01ccc4fa072bf185e6
SHA25687051a2486230e25fa74b63889b4694f301cbd8de03bc061d1c2d192f3acc9c1
SHA51250eb755811a753b51ed5cc55a1a1230bcb2ea9a84e4815a6e8041b17da959c62c7c8750ec636211122309c49092d1bbc5efd01ae8615c046fb639348b6716527
-
Filesize
587KB
MD58905859aa34d75c86b34ba9838d2089f
SHA187cd08e8701f1a60706f7a282c8d75a601c1cad7
SHA25627b3a84d0bafd888485f1a273f5824b6222a00d205beaa884447496127ffa327
SHA512f0d8b6ca72048978ee81e002ee56807ea6971d2b3231f1feab5d31768a52940178b062e59cab1c99b9f34e7cad40723bba94282fb23566fd98256979037cb935
-
Filesize
587KB
MD58905859aa34d75c86b34ba9838d2089f
SHA187cd08e8701f1a60706f7a282c8d75a601c1cad7
SHA25627b3a84d0bafd888485f1a273f5824b6222a00d205beaa884447496127ffa327
SHA512f0d8b6ca72048978ee81e002ee56807ea6971d2b3231f1feab5d31768a52940178b062e59cab1c99b9f34e7cad40723bba94282fb23566fd98256979037cb935
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1