Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 06:58
Static task
static1
General
-
Target
401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe
-
Size
1.0MB
-
MD5
f5725ba6476f252e21e5deebf4a77dcb
-
SHA1
7958db0b1ea3bbfc188020540e8a1ef99f3591fb
-
SHA256
401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a
-
SHA512
f54827898c8a67bf8f968131b89c3f75601b2474be19fbd84e59fa817aa6059c59842be84ad4c2f36dd18ecf52fc869608fb5962e840944b757f0bd0bf5240f6
-
SSDEEP
24576:9ypDAKk+sal5hSQhRWV8lMLfSGBj0Nwla72eO2ppHy/GUGi:Y5Av3s5hiLfhBj0NwDj2XH6G
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it441838.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it441838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it441838.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it441838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it441838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it441838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it441838.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr209223.exeoneetx.exejr839250.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr209223.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr839250.exe -
Executes dropped EXE 9 IoCs
Processes:
ziJZ4453.exezicM5643.exeit441838.exejr839250.exe1.exekp236379.exelr209223.exeoneetx.exeoneetx.exepid process 2800 ziJZ4453.exe 1532 zicM5643.exe 4988 it441838.exe 3876 jr839250.exe 2948 1.exe 3176 kp236379.exe 1600 lr209223.exe 1256 oneetx.exe 4984 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5064 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it441838.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it441838.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exeziJZ4453.exezicM5643.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJZ4453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJZ4453.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zicM5643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zicM5643.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1868 3876 WerFault.exe jr839250.exe 1440 1600 WerFault.exe lr209223.exe 2376 1600 WerFault.exe lr209223.exe 2328 1600 WerFault.exe lr209223.exe 4964 1600 WerFault.exe lr209223.exe 5028 1600 WerFault.exe lr209223.exe 4668 1600 WerFault.exe lr209223.exe 4052 1600 WerFault.exe lr209223.exe 4796 1600 WerFault.exe lr209223.exe 2532 1600 WerFault.exe lr209223.exe 2192 1600 WerFault.exe lr209223.exe 3684 1256 WerFault.exe oneetx.exe 1428 1256 WerFault.exe oneetx.exe 1496 1256 WerFault.exe oneetx.exe 4028 1256 WerFault.exe oneetx.exe 4580 1256 WerFault.exe oneetx.exe 5104 1256 WerFault.exe oneetx.exe 3712 1256 WerFault.exe oneetx.exe 1284 1256 WerFault.exe oneetx.exe 4792 1256 WerFault.exe oneetx.exe 4268 1256 WerFault.exe oneetx.exe 3768 1256 WerFault.exe oneetx.exe 3340 1256 WerFault.exe oneetx.exe 992 1256 WerFault.exe oneetx.exe 628 1256 WerFault.exe oneetx.exe 2936 1256 WerFault.exe oneetx.exe 4156 4984 WerFault.exe oneetx.exe 740 4984 WerFault.exe oneetx.exe 5092 4984 WerFault.exe oneetx.exe 636 1256 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it441838.exe1.exekp236379.exepid process 4988 it441838.exe 4988 it441838.exe 2948 1.exe 3176 kp236379.exe 3176 kp236379.exe 2948 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it441838.exejr839250.exe1.exekp236379.exedescription pid process Token: SeDebugPrivilege 4988 it441838.exe Token: SeDebugPrivilege 3876 jr839250.exe Token: SeDebugPrivilege 2948 1.exe Token: SeDebugPrivilege 3176 kp236379.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr209223.exepid process 1600 lr209223.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exeziJZ4453.exezicM5643.exejr839250.exelr209223.exeoneetx.exedescription pid process target process PID 4876 wrote to memory of 2800 4876 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe ziJZ4453.exe PID 4876 wrote to memory of 2800 4876 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe ziJZ4453.exe PID 4876 wrote to memory of 2800 4876 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe ziJZ4453.exe PID 2800 wrote to memory of 1532 2800 ziJZ4453.exe zicM5643.exe PID 2800 wrote to memory of 1532 2800 ziJZ4453.exe zicM5643.exe PID 2800 wrote to memory of 1532 2800 ziJZ4453.exe zicM5643.exe PID 1532 wrote to memory of 4988 1532 zicM5643.exe it441838.exe PID 1532 wrote to memory of 4988 1532 zicM5643.exe it441838.exe PID 1532 wrote to memory of 3876 1532 zicM5643.exe jr839250.exe PID 1532 wrote to memory of 3876 1532 zicM5643.exe jr839250.exe PID 1532 wrote to memory of 3876 1532 zicM5643.exe jr839250.exe PID 3876 wrote to memory of 2948 3876 jr839250.exe 1.exe PID 3876 wrote to memory of 2948 3876 jr839250.exe 1.exe PID 3876 wrote to memory of 2948 3876 jr839250.exe 1.exe PID 2800 wrote to memory of 3176 2800 ziJZ4453.exe kp236379.exe PID 2800 wrote to memory of 3176 2800 ziJZ4453.exe kp236379.exe PID 2800 wrote to memory of 3176 2800 ziJZ4453.exe kp236379.exe PID 4876 wrote to memory of 1600 4876 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe lr209223.exe PID 4876 wrote to memory of 1600 4876 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe lr209223.exe PID 4876 wrote to memory of 1600 4876 401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe lr209223.exe PID 1600 wrote to memory of 1256 1600 lr209223.exe oneetx.exe PID 1600 wrote to memory of 1256 1600 lr209223.exe oneetx.exe PID 1600 wrote to memory of 1256 1600 lr209223.exe oneetx.exe PID 1256 wrote to memory of 3228 1256 oneetx.exe schtasks.exe PID 1256 wrote to memory of 3228 1256 oneetx.exe schtasks.exe PID 1256 wrote to memory of 3228 1256 oneetx.exe schtasks.exe PID 1256 wrote to memory of 5064 1256 oneetx.exe rundll32.exe PID 1256 wrote to memory of 5064 1256 oneetx.exe rundll32.exe PID 1256 wrote to memory of 5064 1256 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe"C:\Users\Admin\AppData\Local\Temp\401e2d9b72bdc3d5b2ba1493419cfab6f9ec5f1173f3e615874a4e8f7af01b6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJZ4453.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJZ4453.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicM5643.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicM5643.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it441838.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it441838.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr839250.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr839250.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 13805⤵
- Program crash
PID:1868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp236379.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp236379.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr209223.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr209223.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 7003⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 7523⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 8603⤵
- Program crash
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 9643⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 8603⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 8603⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 11923⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 12683⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 13163⤵
- Program crash
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 6964⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10084⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10764⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11084⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11444⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11204⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11364⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11004⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 9964⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7804⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 6964⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11004⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11684⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 16044⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10084⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 16204⤵
- Program crash
PID:636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 17563⤵
- Program crash
PID:2192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3876 -ip 38761⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1600 -ip 16001⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1600 -ip 16001⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1600 -ip 16001⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1600 -ip 16001⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1600 -ip 16001⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1600 -ip 16001⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1600 -ip 16001⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1600 -ip 16001⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1600 -ip 16001⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1600 -ip 16001⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1256 -ip 12561⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1256 -ip 12561⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1256 -ip 12561⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1256 -ip 12561⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1256 -ip 12561⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1256 -ip 12561⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1256 -ip 12561⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1256 -ip 12561⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1256 -ip 12561⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1256 -ip 12561⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1256 -ip 12561⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1256 -ip 12561⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1256 -ip 12561⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1256 -ip 12561⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1256 -ip 12561⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 3962⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 4402⤵
- Program crash
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 4402⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4984 -ip 49841⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4984 -ip 49841⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4984 -ip 49841⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1256 -ip 12561⤵PID:3652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD5db38d72fd27f0f9226abbb5b1aa8fd58
SHA104c0dc523b85f65132cdd31b76989ba9d94dfb55
SHA2565a0dbbdbb95a6e8c977dc5d3129cc0e0d0703f26526f2978922a5f9b6e2134d4
SHA512b7ccf76e98371e3e39b4c67ed17f97dddf8b9a6ef907f1c27ae4b1415786f7faf495fc8a0003147943f78db4b472ee1a0d2b75b6042b0d4f136381b325d29a9f
-
Filesize
723KB
MD5db38d72fd27f0f9226abbb5b1aa8fd58
SHA104c0dc523b85f65132cdd31b76989ba9d94dfb55
SHA2565a0dbbdbb95a6e8c977dc5d3129cc0e0d0703f26526f2978922a5f9b6e2134d4
SHA512b7ccf76e98371e3e39b4c67ed17f97dddf8b9a6ef907f1c27ae4b1415786f7faf495fc8a0003147943f78db4b472ee1a0d2b75b6042b0d4f136381b325d29a9f
-
Filesize
169KB
MD5e6be8b548476aa5ddfd31b9e29b9d953
SHA102baf999ceef9ac13e67348d64f7c3f8ffd13b5f
SHA2567d94675067d0a0415937466aabd0a7b5f9b8062fd071c82695e884739ed777f7
SHA512114fe6a1e699f3dc254b795e7f3a4a4533f464db3417eed7b5a08d913b9f9f4e6462e1268f0cbe647cfba03d8bc6714f4011c89fce30ef3a0d96e72c7101f905
-
Filesize
169KB
MD5e6be8b548476aa5ddfd31b9e29b9d953
SHA102baf999ceef9ac13e67348d64f7c3f8ffd13b5f
SHA2567d94675067d0a0415937466aabd0a7b5f9b8062fd071c82695e884739ed777f7
SHA512114fe6a1e699f3dc254b795e7f3a4a4533f464db3417eed7b5a08d913b9f9f4e6462e1268f0cbe647cfba03d8bc6714f4011c89fce30ef3a0d96e72c7101f905
-
Filesize
569KB
MD591bf53f9d4632fdc741987af422a8aeb
SHA17acbc2ec9ce82070a5b07c7f33abe2d701a39c08
SHA256acddabcd277138e5a7bbe1c151844b0c364cc834a8e379ba9762f6ca68e31a1f
SHA5127f8fe50c2df7bedd73b36cec230e30b63e2dca13313f530e1bb412c930a6759e273b4166c48dc00515fc3cc2c2457549363500f8ee3820f8fa458a9318790e2b
-
Filesize
569KB
MD591bf53f9d4632fdc741987af422a8aeb
SHA17acbc2ec9ce82070a5b07c7f33abe2d701a39c08
SHA256acddabcd277138e5a7bbe1c151844b0c364cc834a8e379ba9762f6ca68e31a1f
SHA5127f8fe50c2df7bedd73b36cec230e30b63e2dca13313f530e1bb412c930a6759e273b4166c48dc00515fc3cc2c2457549363500f8ee3820f8fa458a9318790e2b
-
Filesize
11KB
MD5c530db4ffccd5224e6a11c79e5d37349
SHA16467e0b132ea2358554c8c5b0b0f7f166e22e90c
SHA2560cd6524b376bf46d4296e0e431cd3ee5fc13465c4f2a0eac191e523f7d263412
SHA512fa738c9bba1d4a1c8131478145c6fc5a281930bed5db17418a35189c55644cf8476b23aeef412b754c5e2a394e06270bd7032daf0c2014546ba1ec4c805ac80d
-
Filesize
11KB
MD5c530db4ffccd5224e6a11c79e5d37349
SHA16467e0b132ea2358554c8c5b0b0f7f166e22e90c
SHA2560cd6524b376bf46d4296e0e431cd3ee5fc13465c4f2a0eac191e523f7d263412
SHA512fa738c9bba1d4a1c8131478145c6fc5a281930bed5db17418a35189c55644cf8476b23aeef412b754c5e2a394e06270bd7032daf0c2014546ba1ec4c805ac80d
-
Filesize
587KB
MD5e5bb930500d733a881d36a18d5cc6d14
SHA178902f5059f6968a1d4d0672d730979bafdf71f4
SHA256acc674baf6a18e8e0896c6d44a1ed95deacec8bfa018ecc813d504f5996b0783
SHA512ee2f38ba8dd05a08f8765d491a697b3eb38cc9909fb9ea5c860faf9d5b86085996e490029cc393be3a6a96530aa5aecc5081a5913edfc8df1fe444c709cd5e80
-
Filesize
587KB
MD5e5bb930500d733a881d36a18d5cc6d14
SHA178902f5059f6968a1d4d0672d730979bafdf71f4
SHA256acc674baf6a18e8e0896c6d44a1ed95deacec8bfa018ecc813d504f5996b0783
SHA512ee2f38ba8dd05a08f8765d491a697b3eb38cc9909fb9ea5c860faf9d5b86085996e490029cc393be3a6a96530aa5aecc5081a5913edfc8df1fe444c709cd5e80
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1