Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:08
Static task
static1
General
-
Target
08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe
-
Size
1.0MB
-
MD5
54e413345525fb507e245295c0e5ce21
-
SHA1
c62bba69646e5c6b139e8b62c3c93ddea80241ac
-
SHA256
08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7
-
SHA512
c7443949c73df7efaaf76993183b0184d14d36cef8e46e3fe0ab4821ff052cbb98471d36438877450dc6ce856a7f33ea5957547a468d9eb14bfe15db96555484
-
SSDEEP
24576:Gygs6qMkyZBgS6jf6V5YsLnu0GWjckhIN8v5WUwIofyL2U:VP1XC1n5GWjuO4Uwny
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it909643.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it909643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it909643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it909643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it909643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it909643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it909643.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr903939.exelr553732.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr903939.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr553732.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zilx8763.exeziLY3111.exeit909643.exejr903939.exe1.exekp975327.exelr553732.exeoneetx.exeoneetx.exeoneetx.exepid process 1468 zilx8763.exe 4520 ziLY3111.exe 4528 it909643.exe 1312 jr903939.exe 1828 1.exe 4644 kp975327.exe 2688 lr553732.exe 1668 oneetx.exe 4480 oneetx.exe 4964 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1140 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it909643.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it909643.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zilx8763.exeziLY3111.exe08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zilx8763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zilx8763.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLY3111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziLY3111.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 728 1312 WerFault.exe jr903939.exe 2768 2688 WerFault.exe lr553732.exe 3560 2688 WerFault.exe lr553732.exe 5032 2688 WerFault.exe lr553732.exe 3344 2688 WerFault.exe lr553732.exe 1140 2688 WerFault.exe lr553732.exe 4928 2688 WerFault.exe lr553732.exe 4132 2688 WerFault.exe lr553732.exe 1620 2688 WerFault.exe lr553732.exe 4004 2688 WerFault.exe lr553732.exe 636 2688 WerFault.exe lr553732.exe 4536 1668 WerFault.exe oneetx.exe 4236 1668 WerFault.exe oneetx.exe 5048 1668 WerFault.exe oneetx.exe 400 1668 WerFault.exe oneetx.exe 208 1668 WerFault.exe oneetx.exe 820 1668 WerFault.exe oneetx.exe 1472 1668 WerFault.exe oneetx.exe 2464 1668 WerFault.exe oneetx.exe 4488 1668 WerFault.exe oneetx.exe 2676 1668 WerFault.exe oneetx.exe 4904 1668 WerFault.exe oneetx.exe 1632 4480 WerFault.exe oneetx.exe 2640 4480 WerFault.exe oneetx.exe 3932 4480 WerFault.exe oneetx.exe 4828 1668 WerFault.exe oneetx.exe 3264 1668 WerFault.exe oneetx.exe 2660 1668 WerFault.exe oneetx.exe 4744 4964 WerFault.exe oneetx.exe 1240 4964 WerFault.exe oneetx.exe 2248 4964 WerFault.exe oneetx.exe 2528 1668 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it909643.exe1.exekp975327.exepid process 4528 it909643.exe 4528 it909643.exe 1828 1.exe 1828 1.exe 4644 kp975327.exe 4644 kp975327.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it909643.exejr903939.exe1.exekp975327.exedescription pid process Token: SeDebugPrivilege 4528 it909643.exe Token: SeDebugPrivilege 1312 jr903939.exe Token: SeDebugPrivilege 1828 1.exe Token: SeDebugPrivilege 4644 kp975327.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr553732.exepid process 2688 lr553732.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exezilx8763.exeziLY3111.exejr903939.exelr553732.exeoneetx.exedescription pid process target process PID 4244 wrote to memory of 1468 4244 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe zilx8763.exe PID 4244 wrote to memory of 1468 4244 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe zilx8763.exe PID 4244 wrote to memory of 1468 4244 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe zilx8763.exe PID 1468 wrote to memory of 4520 1468 zilx8763.exe ziLY3111.exe PID 1468 wrote to memory of 4520 1468 zilx8763.exe ziLY3111.exe PID 1468 wrote to memory of 4520 1468 zilx8763.exe ziLY3111.exe PID 4520 wrote to memory of 4528 4520 ziLY3111.exe it909643.exe PID 4520 wrote to memory of 4528 4520 ziLY3111.exe it909643.exe PID 4520 wrote to memory of 1312 4520 ziLY3111.exe jr903939.exe PID 4520 wrote to memory of 1312 4520 ziLY3111.exe jr903939.exe PID 4520 wrote to memory of 1312 4520 ziLY3111.exe jr903939.exe PID 1312 wrote to memory of 1828 1312 jr903939.exe 1.exe PID 1312 wrote to memory of 1828 1312 jr903939.exe 1.exe PID 1312 wrote to memory of 1828 1312 jr903939.exe 1.exe PID 1468 wrote to memory of 4644 1468 zilx8763.exe kp975327.exe PID 1468 wrote to memory of 4644 1468 zilx8763.exe kp975327.exe PID 1468 wrote to memory of 4644 1468 zilx8763.exe kp975327.exe PID 4244 wrote to memory of 2688 4244 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe lr553732.exe PID 4244 wrote to memory of 2688 4244 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe lr553732.exe PID 4244 wrote to memory of 2688 4244 08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe lr553732.exe PID 2688 wrote to memory of 1668 2688 lr553732.exe oneetx.exe PID 2688 wrote to memory of 1668 2688 lr553732.exe oneetx.exe PID 2688 wrote to memory of 1668 2688 lr553732.exe oneetx.exe PID 1668 wrote to memory of 3608 1668 oneetx.exe schtasks.exe PID 1668 wrote to memory of 3608 1668 oneetx.exe schtasks.exe PID 1668 wrote to memory of 3608 1668 oneetx.exe schtasks.exe PID 1668 wrote to memory of 1140 1668 oneetx.exe rundll32.exe PID 1668 wrote to memory of 1140 1668 oneetx.exe rundll32.exe PID 1668 wrote to memory of 1140 1668 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe"C:\Users\Admin\AppData\Local\Temp\08951df3bb5db4bb308d2cf5754e947742ffc05976461c9793d7b64c9b1f5ba7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilx8763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilx8763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLY3111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLY3111.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909643.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909643.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr903939.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr903939.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 13765⤵
- Program crash
PID:728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp975327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp975327.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553732.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 7003⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 7763⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8643⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 9723⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8643⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8643⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 12203⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 12683⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 12283⤵
- Program crash
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 6964⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 8244⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 8964⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10564⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10564⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10564⤵
- Program crash
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 11124⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 9964⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 7484⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 7604⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 12764⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 11604⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 16044⤵
- Program crash
PID:3264
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 13364⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 16204⤵
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 15683⤵
- Program crash
PID:636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1312 -ip 13121⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2688 -ip 26881⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2688 -ip 26881⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2688 -ip 26881⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2688 -ip 26881⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2688 -ip 26881⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2688 -ip 26881⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2688 -ip 26881⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2688 -ip 26881⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2688 -ip 26881⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2688 -ip 26881⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1668 -ip 16681⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1668 -ip 16681⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1668 -ip 16681⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1668 -ip 16681⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1668 -ip 16681⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1668 -ip 16681⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1668 -ip 16681⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1668 -ip 16681⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1668 -ip 16681⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1668 -ip 16681⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1668 -ip 16681⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 4002⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 4402⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 5122⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4480 -ip 44801⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4480 -ip 44801⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4480 -ip 44801⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1668 -ip 16681⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1668 -ip 16681⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1668 -ip 16681⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 3962⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 4402⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 4402⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4964 -ip 49641⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4964 -ip 49641⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4964 -ip 49641⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1668 -ip 16681⤵PID:380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD5b91647bfd39ab9a8c96d56fc0f9b9071
SHA14f36e73cb64825e3d0b7349f3043c6a57473ef0e
SHA256529791636366fceef0479182e88019eab1c4053e9ead7afa8ad9975bcf80d5e9
SHA512cd415a447df9306d88ea5a81712af5472ac652ddc149db3273388bbd2cfd915a3171c98df269f7bddb631344b559cc2903f5d5db47a2aa3660987a84562ec9c0
-
Filesize
723KB
MD5b91647bfd39ab9a8c96d56fc0f9b9071
SHA14f36e73cb64825e3d0b7349f3043c6a57473ef0e
SHA256529791636366fceef0479182e88019eab1c4053e9ead7afa8ad9975bcf80d5e9
SHA512cd415a447df9306d88ea5a81712af5472ac652ddc149db3273388bbd2cfd915a3171c98df269f7bddb631344b559cc2903f5d5db47a2aa3660987a84562ec9c0
-
Filesize
169KB
MD50ad3ef6c54fca5edb96f457343ccf65f
SHA145e7cf4bdc2af82083d7fd78df1247cd6fff6d5a
SHA25648320eda11cd6ea0f91d4fd71570dabebe965a7f60860ed25b651a61a577094f
SHA512ebbeef1decc6818344ac760d9d2b879a0934cafb30d28ee97677c2113c726d162833d5f62f0ec75be2021cb466bba3580be5e4af11f96b6ee0f49a3366e6b892
-
Filesize
169KB
MD50ad3ef6c54fca5edb96f457343ccf65f
SHA145e7cf4bdc2af82083d7fd78df1247cd6fff6d5a
SHA25648320eda11cd6ea0f91d4fd71570dabebe965a7f60860ed25b651a61a577094f
SHA512ebbeef1decc6818344ac760d9d2b879a0934cafb30d28ee97677c2113c726d162833d5f62f0ec75be2021cb466bba3580be5e4af11f96b6ee0f49a3366e6b892
-
Filesize
569KB
MD53ce2e784fc3e4885dfdc4eeacc6c40f0
SHA1777904bb5075db1a6dac5a906bb67c2209c8e4a7
SHA2565abf9fb4026f87a7a544a9a3c6b12b0d23179bf59fa32157c95290fb2abe62f9
SHA512fe38db24f155aa9efb27316cc14848cacd5adecb3ed06e8e8774a70236ca3186dc50b02f4a68aa35bc5a84e7e3dc67bcc25814cc3f09bd8c04a86ac07ece3184
-
Filesize
569KB
MD53ce2e784fc3e4885dfdc4eeacc6c40f0
SHA1777904bb5075db1a6dac5a906bb67c2209c8e4a7
SHA2565abf9fb4026f87a7a544a9a3c6b12b0d23179bf59fa32157c95290fb2abe62f9
SHA512fe38db24f155aa9efb27316cc14848cacd5adecb3ed06e8e8774a70236ca3186dc50b02f4a68aa35bc5a84e7e3dc67bcc25814cc3f09bd8c04a86ac07ece3184
-
Filesize
11KB
MD510b1d836c2aff2f058636c0902c924aa
SHA1cee6659e4f9f41f228f053905969e59a3db320cf
SHA2567bfdb27dc61d2da28e22213b80d4697a2deaa7a85632ff335fa7657bcaa696ed
SHA512513c9e1e513e72ce630d227d4425bb75fb63db77bc7f0b3e9db933d22aa12b257d060dba31900670f85339f855b34fe900e8a3f5055cc84d6e51322aa4423d41
-
Filesize
11KB
MD510b1d836c2aff2f058636c0902c924aa
SHA1cee6659e4f9f41f228f053905969e59a3db320cf
SHA2567bfdb27dc61d2da28e22213b80d4697a2deaa7a85632ff335fa7657bcaa696ed
SHA512513c9e1e513e72ce630d227d4425bb75fb63db77bc7f0b3e9db933d22aa12b257d060dba31900670f85339f855b34fe900e8a3f5055cc84d6e51322aa4423d41
-
Filesize
587KB
MD56a0f19791fc03897c57321617a8cb339
SHA13ee07c09a1afe45f96fbd9856466722362dce306
SHA256d6efee4bf94d80fa3ae084c812136332ed2896bbfc21fc727dce6d28c32daadb
SHA5128eccbdb859393021e8aec9435cf083f4854301e91435376aa7c9e4f7a7924c06a5c707732c9c667f5770ec74d16da261327452e45c3309fd29aa3d1edb28f634
-
Filesize
587KB
MD56a0f19791fc03897c57321617a8cb339
SHA13ee07c09a1afe45f96fbd9856466722362dce306
SHA256d6efee4bf94d80fa3ae084c812136332ed2896bbfc21fc727dce6d28c32daadb
SHA5128eccbdb859393021e8aec9435cf083f4854301e91435376aa7c9e4f7a7924c06a5c707732c9c667f5770ec74d16da261327452e45c3309fd29aa3d1edb28f634
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1