Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 06:53
Static task
static1
General
-
Target
5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe
-
Size
1.2MB
-
MD5
ecbcfb1fa52528ba6d47b120c7e77143
-
SHA1
af56cc06683dae166ba226680c580468395edcdd
-
SHA256
5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8
-
SHA512
a8c3c383e64c6a235b7b43b3f2fc2421239b145c556bfffb93e10f2ec7000bcb006bbefa2e24a08fc440bdb3158df43957e53d78afed8000d6572d47cf10d191
-
SSDEEP
24576:ryKsU6QhRjGq2YeTfJFpvVXuKLafcUaXm0sMCFSSZlk:eKf6QhH23TRHvha0Rmdv
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr797989.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr797989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr797989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr797989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr797989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr797989.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr797989.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu651947.exesi968026.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qu651947.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si968026.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
un422817.exeun220535.exepr797989.exequ651947.exe1.exerk196214.exesi968026.exeoneetx.exeoneetx.exepid process 648 un422817.exe 2112 un220535.exe 220 pr797989.exe 4828 qu651947.exe 3196 1.exe 1616 rk196214.exe 4404 si968026.exe 1232 oneetx.exe 4420 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 640 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr797989.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr797989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr797989.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un422817.exeun220535.exe5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un422817.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un220535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un220535.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un422817.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3564 220 WerFault.exe pr797989.exe 1892 4828 WerFault.exe qu651947.exe 3644 4404 WerFault.exe si968026.exe 3016 4404 WerFault.exe si968026.exe 3624 4404 WerFault.exe si968026.exe 2776 4404 WerFault.exe si968026.exe 1544 4404 WerFault.exe si968026.exe 404 4404 WerFault.exe si968026.exe 692 4404 WerFault.exe si968026.exe 3600 4404 WerFault.exe si968026.exe 2356 4404 WerFault.exe si968026.exe 2656 4404 WerFault.exe si968026.exe 936 1232 WerFault.exe oneetx.exe 1516 1232 WerFault.exe oneetx.exe 5072 1232 WerFault.exe oneetx.exe 4952 1232 WerFault.exe oneetx.exe 1008 1232 WerFault.exe oneetx.exe 1348 1232 WerFault.exe oneetx.exe 4832 1232 WerFault.exe oneetx.exe 4136 1232 WerFault.exe oneetx.exe 3768 1232 WerFault.exe oneetx.exe 4272 1232 WerFault.exe oneetx.exe 3780 1232 WerFault.exe oneetx.exe 812 1232 WerFault.exe oneetx.exe 4928 1232 WerFault.exe oneetx.exe 348 1232 WerFault.exe oneetx.exe 4360 1232 WerFault.exe oneetx.exe 2272 4420 WerFault.exe oneetx.exe 2260 4420 WerFault.exe oneetx.exe 1664 4420 WerFault.exe oneetx.exe 4560 1232 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr797989.exerk196214.exe1.exepid process 220 pr797989.exe 220 pr797989.exe 1616 rk196214.exe 3196 1.exe 1616 rk196214.exe 3196 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr797989.exequ651947.exerk196214.exe1.exedescription pid process Token: SeDebugPrivilege 220 pr797989.exe Token: SeDebugPrivilege 4828 qu651947.exe Token: SeDebugPrivilege 1616 rk196214.exe Token: SeDebugPrivilege 3196 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si968026.exepid process 4404 si968026.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exeun422817.exeun220535.exequ651947.exesi968026.exeoneetx.exedescription pid process target process PID 1500 wrote to memory of 648 1500 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe un422817.exe PID 1500 wrote to memory of 648 1500 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe un422817.exe PID 1500 wrote to memory of 648 1500 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe un422817.exe PID 648 wrote to memory of 2112 648 un422817.exe un220535.exe PID 648 wrote to memory of 2112 648 un422817.exe un220535.exe PID 648 wrote to memory of 2112 648 un422817.exe un220535.exe PID 2112 wrote to memory of 220 2112 un220535.exe pr797989.exe PID 2112 wrote to memory of 220 2112 un220535.exe pr797989.exe PID 2112 wrote to memory of 220 2112 un220535.exe pr797989.exe PID 2112 wrote to memory of 4828 2112 un220535.exe qu651947.exe PID 2112 wrote to memory of 4828 2112 un220535.exe qu651947.exe PID 2112 wrote to memory of 4828 2112 un220535.exe qu651947.exe PID 4828 wrote to memory of 3196 4828 qu651947.exe 1.exe PID 4828 wrote to memory of 3196 4828 qu651947.exe 1.exe PID 4828 wrote to memory of 3196 4828 qu651947.exe 1.exe PID 648 wrote to memory of 1616 648 un422817.exe rk196214.exe PID 648 wrote to memory of 1616 648 un422817.exe rk196214.exe PID 648 wrote to memory of 1616 648 un422817.exe rk196214.exe PID 1500 wrote to memory of 4404 1500 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe si968026.exe PID 1500 wrote to memory of 4404 1500 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe si968026.exe PID 1500 wrote to memory of 4404 1500 5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe si968026.exe PID 4404 wrote to memory of 1232 4404 si968026.exe oneetx.exe PID 4404 wrote to memory of 1232 4404 si968026.exe oneetx.exe PID 4404 wrote to memory of 1232 4404 si968026.exe oneetx.exe PID 1232 wrote to memory of 1756 1232 oneetx.exe schtasks.exe PID 1232 wrote to memory of 1756 1232 oneetx.exe schtasks.exe PID 1232 wrote to memory of 1756 1232 oneetx.exe schtasks.exe PID 1232 wrote to memory of 640 1232 oneetx.exe rundll32.exe PID 1232 wrote to memory of 640 1232 oneetx.exe rundll32.exe PID 1232 wrote to memory of 640 1232 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe"C:\Users\Admin\AppData\Local\Temp\5218c9356323094a6c1a225a2026cc56051aa288d9e372e1d6f8d6fc977446f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422817.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un220535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un220535.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr797989.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr797989.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 10845⤵
- Program crash
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu651947.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu651947.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 13845⤵
- Program crash
PID:1892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk196214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk196214.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si968026.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si968026.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 7003⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 7843⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8603⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 9563⤵
- Program crash
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8643⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 9723⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 12243⤵
- Program crash
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 12723⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 13203⤵
- Program crash
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 6964⤵
- Program crash
PID:936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 8484⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 9404⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 10644⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 10724⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 10724⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 10964⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 8484⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 7804⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 6964⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 9404⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 14924⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 11164⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 13724⤵
- Program crash
PID:348
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 15964⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 16364⤵
- Program crash
PID:4560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 13643⤵
- Program crash
PID:2656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 220 -ip 2201⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4828 -ip 48281⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4404 -ip 44041⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4404 -ip 44041⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4404 -ip 44041⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4404 -ip 44041⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4404 -ip 44041⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4404 -ip 44041⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4404 -ip 44041⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4404 -ip 44041⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4404 -ip 44041⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4404 -ip 44041⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1232 -ip 12321⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1232 -ip 12321⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1232 -ip 12321⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1232 -ip 12321⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1232 -ip 12321⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1232 -ip 12321⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1232 -ip 12321⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1232 -ip 12321⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1232 -ip 12321⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1232 -ip 12321⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1232 -ip 12321⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1232 -ip 12321⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1232 -ip 12321⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1232 -ip 12321⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1232 -ip 12321⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 3962⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 4402⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 4402⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4420 -ip 44201⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4420 -ip 44201⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4420 -ip 44201⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1232 -ip 12321⤵PID:3292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
861KB
MD59e3f84f156578319dc9ee62be749415e
SHA1d0eb72a808094bc123e5dd18415e4c65415ce92a
SHA25607364ebc2e83c4524593f9543726488b93d36acc35613d28e52fb553f32df814
SHA512ff63ffb45275387e69a0c9a53acfd51e67ef3c906aed0575cda4a8ccf92371e5ad879bcecef704d9a074c61ccb27f09e3697a98a948ca71a424046f6f3dadfcc
-
Filesize
861KB
MD59e3f84f156578319dc9ee62be749415e
SHA1d0eb72a808094bc123e5dd18415e4c65415ce92a
SHA25607364ebc2e83c4524593f9543726488b93d36acc35613d28e52fb553f32df814
SHA512ff63ffb45275387e69a0c9a53acfd51e67ef3c906aed0575cda4a8ccf92371e5ad879bcecef704d9a074c61ccb27f09e3697a98a948ca71a424046f6f3dadfcc
-
Filesize
169KB
MD5187d941028e0eb8e6ba05ddff5e44756
SHA123525266103ce7b9692c8c64da3574576879413f
SHA25634382d3df1500e28041d32ce368ef153cf1bfca7fe431d2e826669e065b1a9a4
SHA512bc33c66f132659d91258a4e81224997d70d6bd7a9efecb3ac34ea04b32243dfb1bdc16ff104b46cdfe6542a5b3b72b8823ab2b5a284ef5da1b08900b8dae1db2
-
Filesize
169KB
MD5187d941028e0eb8e6ba05ddff5e44756
SHA123525266103ce7b9692c8c64da3574576879413f
SHA25634382d3df1500e28041d32ce368ef153cf1bfca7fe431d2e826669e065b1a9a4
SHA512bc33c66f132659d91258a4e81224997d70d6bd7a9efecb3ac34ea04b32243dfb1bdc16ff104b46cdfe6542a5b3b72b8823ab2b5a284ef5da1b08900b8dae1db2
-
Filesize
708KB
MD5aa40b0992e0b14d539ff38571d7e91d3
SHA13c11606beeab6d01ff9315043e84ca2a7ccba090
SHA2561d0ef3bd012e2837193a37397a23a5aee0032281bdb783b429e0d5a50555c3cc
SHA5122640d84e479512d162039cbe9eaf0bf2307859a0870a679a7d75ef0761177deb76c78f83106cb4d23d6bec2630adb5f878bd059f0e9d860d929b8f51a6e16a4a
-
Filesize
708KB
MD5aa40b0992e0b14d539ff38571d7e91d3
SHA13c11606beeab6d01ff9315043e84ca2a7ccba090
SHA2561d0ef3bd012e2837193a37397a23a5aee0032281bdb783b429e0d5a50555c3cc
SHA5122640d84e479512d162039cbe9eaf0bf2307859a0870a679a7d75ef0761177deb76c78f83106cb4d23d6bec2630adb5f878bd059f0e9d860d929b8f51a6e16a4a
-
Filesize
404KB
MD5c7246f0c2bb0e9badf8fa7f06eac6dc3
SHA16e140d96b5bc1e57cf0362dfcd84ab27d35e09ad
SHA2563bda458d2479a1d6733659f3fe7328c7964e2af070ff1b40c485b72eae9cee3b
SHA5123462e8c816f3052bdc02babdc82b5b9b43337149fe57e2cbada3bcc0ea7827b2d87c708091f54c17687e37a94583d48df3640ecc4984bc22f00ca7e822c194ee
-
Filesize
404KB
MD5c7246f0c2bb0e9badf8fa7f06eac6dc3
SHA16e140d96b5bc1e57cf0362dfcd84ab27d35e09ad
SHA2563bda458d2479a1d6733659f3fe7328c7964e2af070ff1b40c485b72eae9cee3b
SHA5123462e8c816f3052bdc02babdc82b5b9b43337149fe57e2cbada3bcc0ea7827b2d87c708091f54c17687e37a94583d48df3640ecc4984bc22f00ca7e822c194ee
-
Filesize
587KB
MD57f25a0341a57a10dbba0e800003a5d9b
SHA126ad4ca49779883be1b3602d9430c8beccbddf8f
SHA2565e9435a66581809759bd5a336c857035751ea1e87c978ee0b54ffbe7ba08420b
SHA512d32427208860362f74d312372589aaa16620f6cfb5da928abd3a99496fc5e83945f7bf880fc32216f91633a896e091f4a4d399634911c78fd501c185eaa42c5c
-
Filesize
587KB
MD57f25a0341a57a10dbba0e800003a5d9b
SHA126ad4ca49779883be1b3602d9430c8beccbddf8f
SHA2565e9435a66581809759bd5a336c857035751ea1e87c978ee0b54ffbe7ba08420b
SHA512d32427208860362f74d312372589aaa16620f6cfb5da928abd3a99496fc5e83945f7bf880fc32216f91633a896e091f4a4d399634911c78fd501c185eaa42c5c
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1