Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:19
Static task
static1
General
-
Target
354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe
-
Size
1.2MB
-
MD5
2253da8d3cb6d5845b8f5f61cb391c95
-
SHA1
6797675726e128c370860c21caa58543828cfc6c
-
SHA256
354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79
-
SHA512
ffb2ca00a0eef81615d82b512b2cae8d7ba1a868286c19fdeb30da41532ac3ecaea6292b59d0827095cc54afa7706abf43cd5cd275c9a543f2a27bea2a3f779e
-
SSDEEP
24576:GyV5i5YXyKuC84YUSCV0nKLWCSIHzBCNIpKRo0qVY7Zl:V/i546Cl+CXWDGpqo0r
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr903737.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr903737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr903737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr903737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr903737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr903737.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr903737.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu721565.exesi834051.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation qu721565.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si834051.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un211704.exeun416441.exepr903737.exequ721565.exe1.exerk628559.exesi834051.exeoneetx.exeoneetx.exeoneetx.exepid process 2808 un211704.exe 4716 un416441.exe 2000 pr903737.exe 4908 qu721565.exe 3096 1.exe 1656 rk628559.exe 1016 si834051.exe 2380 oneetx.exe 4792 oneetx.exe 4804 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2744 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr903737.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr903737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr903737.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un416441.exe354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exeun211704.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un416441.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un211704.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un211704.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un416441.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3132 2000 WerFault.exe pr903737.exe 4012 4908 WerFault.exe qu721565.exe 4688 1016 WerFault.exe si834051.exe 5100 1016 WerFault.exe si834051.exe 1612 1016 WerFault.exe si834051.exe 4756 1016 WerFault.exe si834051.exe 1712 1016 WerFault.exe si834051.exe 2848 1016 WerFault.exe si834051.exe 2016 1016 WerFault.exe si834051.exe 816 1016 WerFault.exe si834051.exe 932 1016 WerFault.exe si834051.exe 3112 1016 WerFault.exe si834051.exe 4616 2380 WerFault.exe oneetx.exe 1800 2380 WerFault.exe oneetx.exe 4188 2380 WerFault.exe oneetx.exe 4180 2380 WerFault.exe oneetx.exe 1696 2380 WerFault.exe oneetx.exe 3088 2380 WerFault.exe oneetx.exe 2576 2380 WerFault.exe oneetx.exe 424 2380 WerFault.exe oneetx.exe 4496 2380 WerFault.exe oneetx.exe 5096 2380 WerFault.exe oneetx.exe 3748 2380 WerFault.exe oneetx.exe 1656 2380 WerFault.exe oneetx.exe 4248 4792 WerFault.exe oneetx.exe 5020 4792 WerFault.exe oneetx.exe 5080 4792 WerFault.exe oneetx.exe 1204 2380 WerFault.exe oneetx.exe 3120 2380 WerFault.exe oneetx.exe 4108 2380 WerFault.exe oneetx.exe 1060 4804 WerFault.exe oneetx.exe 2588 4804 WerFault.exe oneetx.exe 1376 4804 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr903737.exe1.exerk628559.exepid process 2000 pr903737.exe 2000 pr903737.exe 3096 1.exe 1656 rk628559.exe 1656 rk628559.exe 3096 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr903737.exequ721565.exe1.exerk628559.exedescription pid process Token: SeDebugPrivilege 2000 pr903737.exe Token: SeDebugPrivilege 4908 qu721565.exe Token: SeDebugPrivilege 3096 1.exe Token: SeDebugPrivilege 1656 rk628559.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si834051.exepid process 1016 si834051.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exeun211704.exeun416441.exequ721565.exesi834051.exeoneetx.exedescription pid process target process PID 1836 wrote to memory of 2808 1836 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe un211704.exe PID 1836 wrote to memory of 2808 1836 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe un211704.exe PID 1836 wrote to memory of 2808 1836 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe un211704.exe PID 2808 wrote to memory of 4716 2808 un211704.exe un416441.exe PID 2808 wrote to memory of 4716 2808 un211704.exe un416441.exe PID 2808 wrote to memory of 4716 2808 un211704.exe un416441.exe PID 4716 wrote to memory of 2000 4716 un416441.exe pr903737.exe PID 4716 wrote to memory of 2000 4716 un416441.exe pr903737.exe PID 4716 wrote to memory of 2000 4716 un416441.exe pr903737.exe PID 4716 wrote to memory of 4908 4716 un416441.exe qu721565.exe PID 4716 wrote to memory of 4908 4716 un416441.exe qu721565.exe PID 4716 wrote to memory of 4908 4716 un416441.exe qu721565.exe PID 4908 wrote to memory of 3096 4908 qu721565.exe 1.exe PID 4908 wrote to memory of 3096 4908 qu721565.exe 1.exe PID 4908 wrote to memory of 3096 4908 qu721565.exe 1.exe PID 2808 wrote to memory of 1656 2808 un211704.exe rk628559.exe PID 2808 wrote to memory of 1656 2808 un211704.exe rk628559.exe PID 2808 wrote to memory of 1656 2808 un211704.exe rk628559.exe PID 1836 wrote to memory of 1016 1836 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe si834051.exe PID 1836 wrote to memory of 1016 1836 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe si834051.exe PID 1836 wrote to memory of 1016 1836 354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe si834051.exe PID 1016 wrote to memory of 2380 1016 si834051.exe oneetx.exe PID 1016 wrote to memory of 2380 1016 si834051.exe oneetx.exe PID 1016 wrote to memory of 2380 1016 si834051.exe oneetx.exe PID 2380 wrote to memory of 1896 2380 oneetx.exe schtasks.exe PID 2380 wrote to memory of 1896 2380 oneetx.exe schtasks.exe PID 2380 wrote to memory of 1896 2380 oneetx.exe schtasks.exe PID 2380 wrote to memory of 2744 2380 oneetx.exe rundll32.exe PID 2380 wrote to memory of 2744 2380 oneetx.exe rundll32.exe PID 2380 wrote to memory of 2744 2380 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe"C:\Users\Admin\AppData\Local\Temp\354355749a3c9fcba197441acb93614020bbad4ac3132166ad842ab18d9aca79.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un211704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un211704.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un416441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un416441.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr903737.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr903737.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 10885⤵
- Program crash
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu721565.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu721565.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 13765⤵
- Program crash
PID:4012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk628559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk628559.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834051.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7003⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7843⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 8603⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 8683⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 9963⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 9763⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 12283⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 12483⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 13243⤵
- Program crash
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 6964⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 8204⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 8964⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10564⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10764⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10764⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 11124⤵
- Program crash
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 9964⤵
- Program crash
PID:424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 7804⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 7604⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 8204⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 11404⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 16444⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 15724⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 16524⤵
- Program crash
PID:4108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 13403⤵
- Program crash
PID:3112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2000 -ip 20001⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4908 -ip 49081⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1016 -ip 10161⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1016 -ip 10161⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1016 -ip 10161⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1016 -ip 10161⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1016 -ip 10161⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1016 -ip 10161⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1016 -ip 10161⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1016 -ip 10161⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1016 -ip 10161⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1016 -ip 10161⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2380 -ip 23801⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2380 -ip 23801⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2380 -ip 23801⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2380 -ip 23801⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2380 -ip 23801⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2380 -ip 23801⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2380 -ip 23801⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2380 -ip 23801⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2380 -ip 23801⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2380 -ip 23801⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2380 -ip 23801⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2380 -ip 23801⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 3962⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 4402⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 4402⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4792 -ip 47921⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4792 -ip 47921⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4792 -ip 47921⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2380 -ip 23801⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2380 -ip 23801⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2380 -ip 23801⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 3962⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 4402⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 4402⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4804 -ip 48041⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4804 -ip 48041⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4804 -ip 48041⤵PID:4676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
861KB
MD541feec7161c9a282af644bdcdc71e3f7
SHA1b897afab7dcf1196c553d5921162432f27edffbe
SHA256ed2d3600aa758cbf67a7d9252e87d69f7463bbbb83b81c0cf32e8b891ded80ce
SHA5127d377e77b194a6d13ccc8b1c39087d4f96af3b804029ea5ac9cd4a1d1e2b28db2061e3d556bd987119f4a994fc855b7bab9472efe8d878abd5de7abd2b274fd9
-
Filesize
861KB
MD541feec7161c9a282af644bdcdc71e3f7
SHA1b897afab7dcf1196c553d5921162432f27edffbe
SHA256ed2d3600aa758cbf67a7d9252e87d69f7463bbbb83b81c0cf32e8b891ded80ce
SHA5127d377e77b194a6d13ccc8b1c39087d4f96af3b804029ea5ac9cd4a1d1e2b28db2061e3d556bd987119f4a994fc855b7bab9472efe8d878abd5de7abd2b274fd9
-
Filesize
169KB
MD544ee7f1366d47836b91cd141afbf1a5b
SHA1830830074de84f9093a51bf2e2825d6e44fc7e20
SHA256a35ad01e99128daf02f194591c3ecc81472815a3231f7dac5ce045139d74dbc9
SHA51299c8ab5434c8d27753b200c3ccf24d541a2a639e1c8d3b8f15a07762e6dd5ce44dcd51d2364bc5c3ecfdd54420f261b3a8456c777ee368942d30e2c54771655b
-
Filesize
169KB
MD544ee7f1366d47836b91cd141afbf1a5b
SHA1830830074de84f9093a51bf2e2825d6e44fc7e20
SHA256a35ad01e99128daf02f194591c3ecc81472815a3231f7dac5ce045139d74dbc9
SHA51299c8ab5434c8d27753b200c3ccf24d541a2a639e1c8d3b8f15a07762e6dd5ce44dcd51d2364bc5c3ecfdd54420f261b3a8456c777ee368942d30e2c54771655b
-
Filesize
707KB
MD52f6aaa1f54147bfd42905a7817784197
SHA1e43afc06076c840fd7a02b9139e1ce59c7612c9d
SHA2563d0ddc49542368c0a765a9965d577e9ddbcec8b4e828cce7387f03c69b05daad
SHA51260959aa6786589ccd3a08169c9e164a767d0306ac066d772372be3e5b7761b3ab8a407e30fa9810e9d3a65cbe679ee8dff318abe899b7e8b19bbe19a6f325316
-
Filesize
707KB
MD52f6aaa1f54147bfd42905a7817784197
SHA1e43afc06076c840fd7a02b9139e1ce59c7612c9d
SHA2563d0ddc49542368c0a765a9965d577e9ddbcec8b4e828cce7387f03c69b05daad
SHA51260959aa6786589ccd3a08169c9e164a767d0306ac066d772372be3e5b7761b3ab8a407e30fa9810e9d3a65cbe679ee8dff318abe899b7e8b19bbe19a6f325316
-
Filesize
404KB
MD51d95b9e4ccbe1c9e48a9703153753eff
SHA18b8bcf98225fcebbad92e5ca79fc2dedeca79cf8
SHA25635b224441491aa2dbc0795db44ded1f463ba92a444c4c570ca055d8d261f4214
SHA5123ff6c1957757a1c5ab18febed6b6b36cd55aabad315d6a34a2febd0d64069643538662612c1412e71e9fff4bf65471e0302707fa7d7cc12a84a65d5719112c74
-
Filesize
404KB
MD51d95b9e4ccbe1c9e48a9703153753eff
SHA18b8bcf98225fcebbad92e5ca79fc2dedeca79cf8
SHA25635b224441491aa2dbc0795db44ded1f463ba92a444c4c570ca055d8d261f4214
SHA5123ff6c1957757a1c5ab18febed6b6b36cd55aabad315d6a34a2febd0d64069643538662612c1412e71e9fff4bf65471e0302707fa7d7cc12a84a65d5719112c74
-
Filesize
587KB
MD5c7a29737264d25a45dd87e788a025a6e
SHA106f6b82cadc2493361748d93a34ba54c0e546a98
SHA2565060c9cdb3460cf07b5f528ad40de0cbd03983ea349fdd276e61d52726c5c3d2
SHA512c1273b1ff26d650a2874e280ffed8cdc6340a40c63d4a3db36493811fc03691f15425fa1f0c687be5074223454881e3387451b9548cb5c95597241f1ed87cd89
-
Filesize
587KB
MD5c7a29737264d25a45dd87e788a025a6e
SHA106f6b82cadc2493361748d93a34ba54c0e546a98
SHA2565060c9cdb3460cf07b5f528ad40de0cbd03983ea349fdd276e61d52726c5c3d2
SHA512c1273b1ff26d650a2874e280ffed8cdc6340a40c63d4a3db36493811fc03691f15425fa1f0c687be5074223454881e3387451b9548cb5c95597241f1ed87cd89
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1