Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 06:33
Static task
static1
General
-
Target
eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe
-
Size
1.0MB
-
MD5
5554c4e6358de8a2739332161703a87f
-
SHA1
0db572da8a119c22db6fee296947b3295f029b37
-
SHA256
eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d
-
SHA512
d87f76c23df53d1d5b25d37443984ab4b41e2f60c53a57e851374b12f3c3d85bd9c8a97e96f414f92dbea4fc8e57d622c2b3b429c86db0dfb97b3955f8ebf57b
-
SSDEEP
24576:yyYS0gjDNhs7eGHlDGukv7VBlqLP7u01LbV3o0OkiwRUjh765/VvneB3dfPog:ZY/gnNhsfN8YPSkbV3JOpjUGBtX
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it545773.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it545773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it545773.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it545773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it545773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it545773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it545773.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr759587.exelr700191.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr759587.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr700191.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zipb1372.exeziUx2302.exeit545773.exejr759587.exe1.exekp126788.exelr700191.exeoneetx.exeoneetx.exeoneetx.exepid process 4728 zipb1372.exe 2576 ziUx2302.exe 2636 it545773.exe 4448 jr759587.exe 3148 1.exe 3996 kp126788.exe 3332 lr700191.exe 3936 oneetx.exe 2832 oneetx.exe 2324 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4736 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it545773.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it545773.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zipb1372.exeziUx2302.exeeea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipb1372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipb1372.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziUx2302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziUx2302.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1536 4448 WerFault.exe jr759587.exe 4220 3332 WerFault.exe lr700191.exe 228 3332 WerFault.exe lr700191.exe 2256 3332 WerFault.exe lr700191.exe 2912 3332 WerFault.exe lr700191.exe 1960 3332 WerFault.exe lr700191.exe 2152 3332 WerFault.exe lr700191.exe 728 3332 WerFault.exe lr700191.exe 4552 3332 WerFault.exe lr700191.exe 4840 3332 WerFault.exe lr700191.exe 3144 3332 WerFault.exe lr700191.exe 5108 3936 WerFault.exe oneetx.exe 3816 3936 WerFault.exe oneetx.exe 3632 3936 WerFault.exe oneetx.exe 4224 3936 WerFault.exe oneetx.exe 2416 3936 WerFault.exe oneetx.exe 1656 3936 WerFault.exe oneetx.exe 3380 3936 WerFault.exe oneetx.exe 1628 3936 WerFault.exe oneetx.exe 904 3936 WerFault.exe oneetx.exe 1424 3936 WerFault.exe oneetx.exe 3800 3936 WerFault.exe oneetx.exe 3148 3936 WerFault.exe oneetx.exe 1900 2832 WerFault.exe oneetx.exe 408 2832 WerFault.exe oneetx.exe 4696 2832 WerFault.exe oneetx.exe 2696 3936 WerFault.exe oneetx.exe 996 3936 WerFault.exe oneetx.exe 4812 3936 WerFault.exe oneetx.exe 4004 2324 WerFault.exe oneetx.exe 3172 2324 WerFault.exe oneetx.exe 3336 2324 WerFault.exe oneetx.exe 5112 3936 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it545773.exe1.exekp126788.exepid process 2636 it545773.exe 2636 it545773.exe 3148 1.exe 3996 kp126788.exe 3996 kp126788.exe 3148 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it545773.exejr759587.exe1.exekp126788.exedescription pid process Token: SeDebugPrivilege 2636 it545773.exe Token: SeDebugPrivilege 4448 jr759587.exe Token: SeDebugPrivilege 3148 1.exe Token: SeDebugPrivilege 3996 kp126788.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr700191.exepid process 3332 lr700191.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exezipb1372.exeziUx2302.exejr759587.exelr700191.exeoneetx.exedescription pid process target process PID 3340 wrote to memory of 4728 3340 eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe zipb1372.exe PID 3340 wrote to memory of 4728 3340 eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe zipb1372.exe PID 3340 wrote to memory of 4728 3340 eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe zipb1372.exe PID 4728 wrote to memory of 2576 4728 zipb1372.exe ziUx2302.exe PID 4728 wrote to memory of 2576 4728 zipb1372.exe ziUx2302.exe PID 4728 wrote to memory of 2576 4728 zipb1372.exe ziUx2302.exe PID 2576 wrote to memory of 2636 2576 ziUx2302.exe it545773.exe PID 2576 wrote to memory of 2636 2576 ziUx2302.exe it545773.exe PID 2576 wrote to memory of 4448 2576 ziUx2302.exe jr759587.exe PID 2576 wrote to memory of 4448 2576 ziUx2302.exe jr759587.exe PID 2576 wrote to memory of 4448 2576 ziUx2302.exe jr759587.exe PID 4448 wrote to memory of 3148 4448 jr759587.exe 1.exe PID 4448 wrote to memory of 3148 4448 jr759587.exe 1.exe PID 4448 wrote to memory of 3148 4448 jr759587.exe 1.exe PID 4728 wrote to memory of 3996 4728 zipb1372.exe kp126788.exe PID 4728 wrote to memory of 3996 4728 zipb1372.exe kp126788.exe PID 4728 wrote to memory of 3996 4728 zipb1372.exe kp126788.exe PID 3340 wrote to memory of 3332 3340 eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe lr700191.exe PID 3340 wrote to memory of 3332 3340 eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe lr700191.exe PID 3340 wrote to memory of 3332 3340 eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe lr700191.exe PID 3332 wrote to memory of 3936 3332 lr700191.exe oneetx.exe PID 3332 wrote to memory of 3936 3332 lr700191.exe oneetx.exe PID 3332 wrote to memory of 3936 3332 lr700191.exe oneetx.exe PID 3936 wrote to memory of 2192 3936 oneetx.exe schtasks.exe PID 3936 wrote to memory of 2192 3936 oneetx.exe schtasks.exe PID 3936 wrote to memory of 2192 3936 oneetx.exe schtasks.exe PID 3936 wrote to memory of 4736 3936 oneetx.exe rundll32.exe PID 3936 wrote to memory of 4736 3936 oneetx.exe rundll32.exe PID 3936 wrote to memory of 4736 3936 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe"C:\Users\Admin\AppData\Local\Temp\eea96aa3cdf2c451e3ecf9efd9714ef91e56b62cb4c17abc34db7eed1a35492d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipb1372.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipb1372.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUx2302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUx2302.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it545773.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it545773.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr759587.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr759587.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 13805⤵
- Program crash
PID:1536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp126788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp126788.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr700191.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr700191.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7003⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7843⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 8003⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 9723⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 9883⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 10163⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 12203⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 12123⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 13163⤵
- Program crash
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 6964⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 9364⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 10764⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 11004⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 9484⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 11284⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 11564⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 11644⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 10164⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 7804⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 8884⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 12844⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 11884⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 15804⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 15964⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 15884⤵
- Program crash
PID:5112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 13283⤵
- Program crash
PID:3144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4448 -ip 44481⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3332 -ip 33321⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3332 -ip 33321⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3332 -ip 33321⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3332 -ip 33321⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3332 -ip 33321⤵PID:3220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3332 -ip 33321⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3332 -ip 33321⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3332 -ip 33321⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3332 -ip 33321⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3332 -ip 33321⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3936 -ip 39361⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3936 -ip 39361⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3936 -ip 39361⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3936 -ip 39361⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3936 -ip 39361⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3936 -ip 39361⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3936 -ip 39361⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3936 -ip 39361⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3936 -ip 39361⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3936 -ip 39361⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3936 -ip 39361⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3936 -ip 39361⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 3962⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 4402⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 4402⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2832 -ip 28321⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2832 -ip 28321⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2832 -ip 28321⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3936 -ip 39361⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3936 -ip 39361⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3936 -ip 39361⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 3962⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 4642⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 4162⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2324 -ip 23241⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2324 -ip 23241⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 2324 -ip 23241⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 3936 -ip 39361⤵PID:2396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD532241d08cf35577c81fcc3b53a1f4cfc
SHA11e30849d84a2ba8c720454513e61c32cd1f10ef6
SHA256d9e528c48e8b2293550842b73679ff189805a5522089df2ac1f17bb193cb8a94
SHA512f7d804991a732dd7250c42f4ff88caade3669039f1a5c47067e0360b99d3785f32013a46c233da3d801de3ba2594d89eb55b86237aec79a0a1989b37adbad349
-
Filesize
723KB
MD532241d08cf35577c81fcc3b53a1f4cfc
SHA11e30849d84a2ba8c720454513e61c32cd1f10ef6
SHA256d9e528c48e8b2293550842b73679ff189805a5522089df2ac1f17bb193cb8a94
SHA512f7d804991a732dd7250c42f4ff88caade3669039f1a5c47067e0360b99d3785f32013a46c233da3d801de3ba2594d89eb55b86237aec79a0a1989b37adbad349
-
Filesize
169KB
MD583519d76eca35c875f21aedf071b79f8
SHA10990a9376a3c49df2af85e8261fabd8fee17348e
SHA25620dd8c0cb3a37c336836a4cd9c1395af83132919d8e188fff385eadf6778c489
SHA512387efdf66fccb38f6b6dfbbc97e2259dcb6108480ac00c6118ba51729d6ecf86b30ecea9b9910ce9a9497c687faac9fed00bd56eeaa78e2b9c113a90b2689ec8
-
Filesize
169KB
MD583519d76eca35c875f21aedf071b79f8
SHA10990a9376a3c49df2af85e8261fabd8fee17348e
SHA25620dd8c0cb3a37c336836a4cd9c1395af83132919d8e188fff385eadf6778c489
SHA512387efdf66fccb38f6b6dfbbc97e2259dcb6108480ac00c6118ba51729d6ecf86b30ecea9b9910ce9a9497c687faac9fed00bd56eeaa78e2b9c113a90b2689ec8
-
Filesize
569KB
MD5076fbf1baee40f5aaa8a14e5c7c2ef33
SHA19333059d8cfa8f5f8b0a4a1ed70feb22225aca72
SHA256f1e2f1afab2808d9ca61d176004c7c29516be671b4e783775d0d0fc82def8b42
SHA5128bbbcfd5b95fb7abb2e964283fbaf20e6f786a277ce2130c3153e0f7ae39e124f6b65ad1c0289ad46daa2e752b778b336957881ac74936a213477ff7d1162859
-
Filesize
569KB
MD5076fbf1baee40f5aaa8a14e5c7c2ef33
SHA19333059d8cfa8f5f8b0a4a1ed70feb22225aca72
SHA256f1e2f1afab2808d9ca61d176004c7c29516be671b4e783775d0d0fc82def8b42
SHA5128bbbcfd5b95fb7abb2e964283fbaf20e6f786a277ce2130c3153e0f7ae39e124f6b65ad1c0289ad46daa2e752b778b336957881ac74936a213477ff7d1162859
-
Filesize
11KB
MD5b4fad69b4c4ea06898ff4ebe62a47774
SHA11e9ff57670b3c273f4f9ea5724069f45d9076466
SHA25679e1e0f95060ab0ee3afb8d7b3b52a2ec7d4852e19f24aa4b62f136a612e8a00
SHA5125c20ad4f9ea3cea367f1028075f6479e048ea245e5641934187df9815b40dab677ed8d27d15d263aeb0cbd4350d9210f54857f7934fa504f312aef26ce671530
-
Filesize
11KB
MD5b4fad69b4c4ea06898ff4ebe62a47774
SHA11e9ff57670b3c273f4f9ea5724069f45d9076466
SHA25679e1e0f95060ab0ee3afb8d7b3b52a2ec7d4852e19f24aa4b62f136a612e8a00
SHA5125c20ad4f9ea3cea367f1028075f6479e048ea245e5641934187df9815b40dab677ed8d27d15d263aeb0cbd4350d9210f54857f7934fa504f312aef26ce671530
-
Filesize
587KB
MD597e9a25d3b1f5919115e531c66cc0149
SHA174884bb88293e05436b426bbcbcd99a0284b4637
SHA256140f63fd48649303d5bcb9ab374a465f9e7fd446eb9d96bc724cb8b75271ea56
SHA5122705706b25036de6fbb513da4666aa6ae2b790a207f014920364747899f2637b84db0686a66c0ce5537404555d402439e812628069b38b58c623619ad6fb5a37
-
Filesize
587KB
MD597e9a25d3b1f5919115e531c66cc0149
SHA174884bb88293e05436b426bbcbcd99a0284b4637
SHA256140f63fd48649303d5bcb9ab374a465f9e7fd446eb9d96bc724cb8b75271ea56
SHA5122705706b25036de6fbb513da4666aa6ae2b790a207f014920364747899f2637b84db0686a66c0ce5537404555d402439e812628069b38b58c623619ad6fb5a37
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1