Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:11
Static task
static1
General
-
Target
922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe
-
Size
1.0MB
-
MD5
65a074cf39c03207dc2a35ffa245a58c
-
SHA1
df2299e0939beb3b5e3b650b7dbccf6dce87dd90
-
SHA256
922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34
-
SHA512
017faa89586d1ead7618dccda92e884273ee77fce5354e51dab0ae0e3d295b6254b62c6b83532e83938ad4900fba248600ebcd414a3785a35af2a78315c75b25
-
SSDEEP
24576:XyIKKLlGkPDmITVx7+Lr+blkMqhnZ4/oCmdz:iIhDm6yrqlktO/z+
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it291374.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it291374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it291374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it291374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it291374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it291374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it291374.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr403007.exelr064260.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr403007.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr064260.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziOH8136.exezifm4742.exeit291374.exejr403007.exe1.exekp878805.exelr064260.exeoneetx.exeoneetx.exeoneetx.exepid process 2608 ziOH8136.exe 860 zifm4742.exe 4632 it291374.exe 2144 jr403007.exe 4232 1.exe 3296 kp878805.exe 1440 lr064260.exe 4000 oneetx.exe 2408 oneetx.exe 3052 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4784 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it291374.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it291374.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exeziOH8136.exezifm4742.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOH8136.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOH8136.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zifm4742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zifm4742.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1136 2144 WerFault.exe jr403007.exe 2912 1440 WerFault.exe lr064260.exe 4948 1440 WerFault.exe lr064260.exe 448 1440 WerFault.exe lr064260.exe 4420 1440 WerFault.exe lr064260.exe 4012 1440 WerFault.exe lr064260.exe 4296 1440 WerFault.exe lr064260.exe 1732 1440 WerFault.exe lr064260.exe 4612 1440 WerFault.exe lr064260.exe 372 1440 WerFault.exe lr064260.exe 4812 1440 WerFault.exe lr064260.exe 3336 4000 WerFault.exe oneetx.exe 4892 4000 WerFault.exe oneetx.exe 2788 4000 WerFault.exe oneetx.exe 3888 4000 WerFault.exe oneetx.exe 3368 4000 WerFault.exe oneetx.exe 1224 4000 WerFault.exe oneetx.exe 632 4000 WerFault.exe oneetx.exe 1976 4000 WerFault.exe oneetx.exe 560 4000 WerFault.exe oneetx.exe 3392 4000 WerFault.exe oneetx.exe 4676 4000 WerFault.exe oneetx.exe 2376 2408 WerFault.exe oneetx.exe 4708 2408 WerFault.exe oneetx.exe 2340 2408 WerFault.exe oneetx.exe 1640 4000 WerFault.exe oneetx.exe 456 4000 WerFault.exe oneetx.exe 4736 4000 WerFault.exe oneetx.exe 4052 3052 WerFault.exe oneetx.exe 1508 3052 WerFault.exe oneetx.exe 1896 3052 WerFault.exe oneetx.exe 1748 4000 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it291374.exekp878805.exe1.exepid process 4632 it291374.exe 4632 it291374.exe 3296 kp878805.exe 4232 1.exe 3296 kp878805.exe 4232 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it291374.exejr403007.exekp878805.exe1.exedescription pid process Token: SeDebugPrivilege 4632 it291374.exe Token: SeDebugPrivilege 2144 jr403007.exe Token: SeDebugPrivilege 3296 kp878805.exe Token: SeDebugPrivilege 4232 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr064260.exepid process 1440 lr064260.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exeziOH8136.exezifm4742.exejr403007.exelr064260.exeoneetx.exedescription pid process target process PID 5012 wrote to memory of 2608 5012 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe ziOH8136.exe PID 5012 wrote to memory of 2608 5012 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe ziOH8136.exe PID 5012 wrote to memory of 2608 5012 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe ziOH8136.exe PID 2608 wrote to memory of 860 2608 ziOH8136.exe zifm4742.exe PID 2608 wrote to memory of 860 2608 ziOH8136.exe zifm4742.exe PID 2608 wrote to memory of 860 2608 ziOH8136.exe zifm4742.exe PID 860 wrote to memory of 4632 860 zifm4742.exe it291374.exe PID 860 wrote to memory of 4632 860 zifm4742.exe it291374.exe PID 860 wrote to memory of 2144 860 zifm4742.exe jr403007.exe PID 860 wrote to memory of 2144 860 zifm4742.exe jr403007.exe PID 860 wrote to memory of 2144 860 zifm4742.exe jr403007.exe PID 2144 wrote to memory of 4232 2144 jr403007.exe 1.exe PID 2144 wrote to memory of 4232 2144 jr403007.exe 1.exe PID 2144 wrote to memory of 4232 2144 jr403007.exe 1.exe PID 2608 wrote to memory of 3296 2608 ziOH8136.exe kp878805.exe PID 2608 wrote to memory of 3296 2608 ziOH8136.exe kp878805.exe PID 2608 wrote to memory of 3296 2608 ziOH8136.exe kp878805.exe PID 5012 wrote to memory of 1440 5012 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe lr064260.exe PID 5012 wrote to memory of 1440 5012 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe lr064260.exe PID 5012 wrote to memory of 1440 5012 922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe lr064260.exe PID 1440 wrote to memory of 4000 1440 lr064260.exe oneetx.exe PID 1440 wrote to memory of 4000 1440 lr064260.exe oneetx.exe PID 1440 wrote to memory of 4000 1440 lr064260.exe oneetx.exe PID 4000 wrote to memory of 4512 4000 oneetx.exe schtasks.exe PID 4000 wrote to memory of 4512 4000 oneetx.exe schtasks.exe PID 4000 wrote to memory of 4512 4000 oneetx.exe schtasks.exe PID 4000 wrote to memory of 4784 4000 oneetx.exe rundll32.exe PID 4000 wrote to memory of 4784 4000 oneetx.exe rundll32.exe PID 4000 wrote to memory of 4784 4000 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe"C:\Users\Admin\AppData\Local\Temp\922fb2ad642b22a112257e58367ccdd5fd57fbd3368f5bcda534ca71dece9d34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOH8136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOH8136.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zifm4742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zifm4742.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it291374.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it291374.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr403007.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr403007.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 13885⤵
- Program crash
PID:1136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp878805.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp878805.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr064260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr064260.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 7003⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 7323⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 8603⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 9803⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 9963⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 8643⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 12203⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 12323⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 13163⤵
- Program crash
PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 6964⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 8524⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 9004⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10564⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10644⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10964⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 11044⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 9964⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 7804⤵
- Program crash
PID:560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 12604⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 8964⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 11364⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 16044⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 16284⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 16204⤵
- Program crash
PID:1748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 14363⤵
- Program crash
PID:4812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2144 -ip 21441⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1440 -ip 14401⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1440 -ip 14401⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1440 -ip 14401⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1440 -ip 14401⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1440 -ip 14401⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1440 -ip 14401⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1440 -ip 14401⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1440 -ip 14401⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1440 -ip 14401⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1440 -ip 14401⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4000 -ip 40001⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4000 -ip 40001⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4000 -ip 40001⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4000 -ip 40001⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4000 -ip 40001⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4000 -ip 40001⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4000 -ip 40001⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4000 -ip 40001⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4000 -ip 40001⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4000 -ip 40001⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4000 -ip 40001⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 3962⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 4402⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 4402⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2408 -ip 24081⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2408 -ip 24081⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2408 -ip 24081⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4000 -ip 40001⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4000 -ip 40001⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4000 -ip 40001⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 3962⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 4402⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 4402⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3052 -ip 30521⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3052 -ip 30521⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3052 -ip 30521⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4000 -ip 40001⤵PID:5016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
724KB
MD5f396b83aa0f0629cb98932214b0fdf58
SHA1738e3d492042425a5154a5618d6ea8e6a4f49ba4
SHA25624a873eea61d47a33e645f5c94f4fe772c69ab252fb77f0fcb5ef7008fa1eb7d
SHA5123c78fa84cd4cafe99480b7680fa997a0484f68fdac4222cf7d33968c1e35cb286491a046855c7b8a1c76d0a6f6cf7d888bf1c1e8da5dbc98523fa4ea5d5155e6
-
Filesize
724KB
MD5f396b83aa0f0629cb98932214b0fdf58
SHA1738e3d492042425a5154a5618d6ea8e6a4f49ba4
SHA25624a873eea61d47a33e645f5c94f4fe772c69ab252fb77f0fcb5ef7008fa1eb7d
SHA5123c78fa84cd4cafe99480b7680fa997a0484f68fdac4222cf7d33968c1e35cb286491a046855c7b8a1c76d0a6f6cf7d888bf1c1e8da5dbc98523fa4ea5d5155e6
-
Filesize
169KB
MD5d0572a08d33016ad0f978997cd1fa794
SHA18789d6ec56d3d2b698248cbd134e52d256811ddd
SHA256437f8ff6b80b2cc15b877d6c0c7c51806af3c361bb23417c986019e58bc8d2d9
SHA5126fa20d558cc1497da359623ecd730b6329be7bbd323a575cb4330ced8d429a2f1e93684870b7678e55cc675f020c50f9d5306203b6f9a19456a49ae369f2d42e
-
Filesize
169KB
MD5d0572a08d33016ad0f978997cd1fa794
SHA18789d6ec56d3d2b698248cbd134e52d256811ddd
SHA256437f8ff6b80b2cc15b877d6c0c7c51806af3c361bb23417c986019e58bc8d2d9
SHA5126fa20d558cc1497da359623ecd730b6329be7bbd323a575cb4330ced8d429a2f1e93684870b7678e55cc675f020c50f9d5306203b6f9a19456a49ae369f2d42e
-
Filesize
570KB
MD5435fd2f1206515ccca520d3e0c164d9c
SHA1a59ec93c9ee2e7342c14ff76a38b35c5addec01c
SHA256c52f158fe5ef9e7c23bdc109befadff0c3d08f01930880c35c8e321d834a9bda
SHA5128d67052da578b4a57dedd12536d8b8d155d557d45aa5c9cba47627e75398b703e92db2ce06844b063f876c2a2b30da0b5ff51edc7461a4fb785b0f469e706922
-
Filesize
570KB
MD5435fd2f1206515ccca520d3e0c164d9c
SHA1a59ec93c9ee2e7342c14ff76a38b35c5addec01c
SHA256c52f158fe5ef9e7c23bdc109befadff0c3d08f01930880c35c8e321d834a9bda
SHA5128d67052da578b4a57dedd12536d8b8d155d557d45aa5c9cba47627e75398b703e92db2ce06844b063f876c2a2b30da0b5ff51edc7461a4fb785b0f469e706922
-
Filesize
11KB
MD561b99ad96e943ccb4429281d694a988a
SHA1791b39e3ffcc45d8843c022f048fb08ee6cada66
SHA2569816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd
SHA512c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78
-
Filesize
11KB
MD561b99ad96e943ccb4429281d694a988a
SHA1791b39e3ffcc45d8843c022f048fb08ee6cada66
SHA2569816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd
SHA512c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78
-
Filesize
587KB
MD5824f255080836a77bccfa0349c0dcbce
SHA19518d312faa906f390dac7712698a5deb2b7bfcf
SHA256759cdf84f4b639749711cd4b1a46a487057fb93eda4fe6c822184dfe6cb3458a
SHA512f4fa933ae351b5530e288c3f96b689db66a08a32e56e431e1b9795b6549fa00ff82a4a4b002e5ae3818d622e838bf07b0a18941b6b7c4f18fdbcd0d9066d7341
-
Filesize
587KB
MD5824f255080836a77bccfa0349c0dcbce
SHA19518d312faa906f390dac7712698a5deb2b7bfcf
SHA256759cdf84f4b639749711cd4b1a46a487057fb93eda4fe6c822184dfe6cb3458a
SHA512f4fa933ae351b5530e288c3f96b689db66a08a32e56e431e1b9795b6549fa00ff82a4a4b002e5ae3818d622e838bf07b0a18941b6b7c4f18fdbcd0d9066d7341
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1