Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:16
Static task
static1
General
-
Target
b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe
-
Size
1.2MB
-
MD5
17030ad258cafe752f32d27286b84d65
-
SHA1
c8be001cddea3b97c53c9c4d68b9a3a5e80362e0
-
SHA256
b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c
-
SHA512
fdbfd2daff604e070e39e0db34abfb77702106e9387d24a529a130351d3ff151e27461b0a63ed63ea9ee2aac4fd9b3250d88063f00fe19e0d73d2a1cea6139da
-
SSDEEP
24576:DykuKmjSMwSQnSxPmoYVPLwQUvRNUN01d9N0niGgGBO0DgzFLF3EhGnv:Wj73QnS4nWvRNUN01byiGgW/6zn
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr259395.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr259395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr259395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr259395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr259395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr259395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr259395.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu497039.exesi952365.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation qu497039.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation si952365.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un854759.exeun859578.exepr259395.exequ497039.exe1.exerk685316.exesi952365.exeoneetx.exeoneetx.exeoneetx.exepid process 2812 un854759.exe 2232 un859578.exe 4324 pr259395.exe 3960 qu497039.exe 1320 1.exe 4340 rk685316.exe 4336 si952365.exe 2548 oneetx.exe 2960 oneetx.exe 64 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3356 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr259395.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr259395.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr259395.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exeun854759.exeun859578.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un854759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un854759.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un859578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un859578.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4908 4336 WerFault.exe si952365.exe 736 4336 WerFault.exe si952365.exe 2196 4336 WerFault.exe si952365.exe 4428 4336 WerFault.exe si952365.exe 4728 4336 WerFault.exe si952365.exe 2004 4336 WerFault.exe si952365.exe 2192 4336 WerFault.exe si952365.exe 1096 4336 WerFault.exe si952365.exe 3196 4336 WerFault.exe si952365.exe 3632 4336 WerFault.exe si952365.exe 5020 2548 WerFault.exe oneetx.exe 2768 2548 WerFault.exe oneetx.exe 2756 2548 WerFault.exe oneetx.exe 1296 2548 WerFault.exe oneetx.exe 2216 2548 WerFault.exe oneetx.exe 3840 2548 WerFault.exe oneetx.exe 3812 2548 WerFault.exe oneetx.exe 2064 2548 WerFault.exe oneetx.exe 1304 2548 WerFault.exe oneetx.exe 1032 2548 WerFault.exe oneetx.exe 2000 2548 WerFault.exe oneetx.exe 3848 2548 WerFault.exe oneetx.exe 4384 2960 WerFault.exe oneetx.exe 4604 2548 WerFault.exe oneetx.exe 4632 2548 WerFault.exe oneetx.exe 340 2548 WerFault.exe oneetx.exe 672 64 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr259395.exe1.exerk685316.exepid process 4324 pr259395.exe 4324 pr259395.exe 1320 1.exe 1320 1.exe 4340 rk685316.exe 4340 rk685316.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr259395.exequ497039.exe1.exerk685316.exedescription pid process Token: SeDebugPrivilege 4324 pr259395.exe Token: SeDebugPrivilege 3960 qu497039.exe Token: SeDebugPrivilege 1320 1.exe Token: SeDebugPrivilege 4340 rk685316.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si952365.exepid process 4336 si952365.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exeun854759.exeun859578.exequ497039.exesi952365.exeoneetx.exedescription pid process target process PID 540 wrote to memory of 2812 540 b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe un854759.exe PID 540 wrote to memory of 2812 540 b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe un854759.exe PID 540 wrote to memory of 2812 540 b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe un854759.exe PID 2812 wrote to memory of 2232 2812 un854759.exe un859578.exe PID 2812 wrote to memory of 2232 2812 un854759.exe un859578.exe PID 2812 wrote to memory of 2232 2812 un854759.exe un859578.exe PID 2232 wrote to memory of 4324 2232 un859578.exe pr259395.exe PID 2232 wrote to memory of 4324 2232 un859578.exe pr259395.exe PID 2232 wrote to memory of 4324 2232 un859578.exe pr259395.exe PID 2232 wrote to memory of 3960 2232 un859578.exe qu497039.exe PID 2232 wrote to memory of 3960 2232 un859578.exe qu497039.exe PID 2232 wrote to memory of 3960 2232 un859578.exe qu497039.exe PID 3960 wrote to memory of 1320 3960 qu497039.exe 1.exe PID 3960 wrote to memory of 1320 3960 qu497039.exe 1.exe PID 3960 wrote to memory of 1320 3960 qu497039.exe 1.exe PID 2812 wrote to memory of 4340 2812 un854759.exe rk685316.exe PID 2812 wrote to memory of 4340 2812 un854759.exe rk685316.exe PID 2812 wrote to memory of 4340 2812 un854759.exe rk685316.exe PID 540 wrote to memory of 4336 540 b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe si952365.exe PID 540 wrote to memory of 4336 540 b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe si952365.exe PID 540 wrote to memory of 4336 540 b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe si952365.exe PID 4336 wrote to memory of 2548 4336 si952365.exe oneetx.exe PID 4336 wrote to memory of 2548 4336 si952365.exe oneetx.exe PID 4336 wrote to memory of 2548 4336 si952365.exe oneetx.exe PID 2548 wrote to memory of 1592 2548 oneetx.exe schtasks.exe PID 2548 wrote to memory of 1592 2548 oneetx.exe schtasks.exe PID 2548 wrote to memory of 1592 2548 oneetx.exe schtasks.exe PID 2548 wrote to memory of 3356 2548 oneetx.exe rundll32.exe PID 2548 wrote to memory of 3356 2548 oneetx.exe rundll32.exe PID 2548 wrote to memory of 3356 2548 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe"C:\Users\Admin\AppData\Local\Temp\b7144c0b2e49c87b7d320184d69b248cdeb2f2356baf682f2b093974334a2e2c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un854759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un854759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un859578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un859578.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr259395.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr259395.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu497039.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu497039.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk685316.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk685316.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952365.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952365.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 7003⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 7763⤵
- Program crash
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 8643⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 9563⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 9883⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 8683⤵
- Program crash
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 12243⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 12723⤵
- Program crash
PID:1096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 12763⤵
- Program crash
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 6964⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8404⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 9404⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10564⤵
- Program crash
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10764⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10684⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10884⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10004⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 13044⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 13204⤵
- Program crash
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 7804⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10924⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 16044⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 15364⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 16204⤵
- Program crash
PID:340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 8723⤵
- Program crash
PID:3632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4336 -ip 43361⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4336 -ip 43361⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4336 -ip 43361⤵PID:340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4336 -ip 43361⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4336 -ip 43361⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4336 -ip 43361⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4336 -ip 43361⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4336 -ip 43361⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4336 -ip 43361⤵PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4336 -ip 43361⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2548 -ip 25481⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2548 -ip 25481⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2548 -ip 25481⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2548 -ip 25481⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2548 -ip 25481⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2548 -ip 25481⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2548 -ip 25481⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2548 -ip 25481⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2548 -ip 25481⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2548 -ip 25481⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2548 -ip 25481⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2548 -ip 25481⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 3202⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2960 -ip 29601⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2548 -ip 25481⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2548 -ip 25481⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2548 -ip 25481⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 3202⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 64 -ip 641⤵PID:4076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
863KB
MD5ea77459ff7c42dff6112591c84603db6
SHA1bf6566bb09a07fbff56ccc20cd8fcb4966addf85
SHA256266d78a43ec2742bfae8b9d09baacb74954a9f1b5bffd96ebd13e8686d692308
SHA5121e00995abd88de9fcfad7fd1df248f921232e0bca85b8542e6b6bb786e30c8df5a6ee130d7d2924ee5ed5110a99337cdbbd0d5af535ea765170e2c6579c33f2b
-
Filesize
863KB
MD5ea77459ff7c42dff6112591c84603db6
SHA1bf6566bb09a07fbff56ccc20cd8fcb4966addf85
SHA256266d78a43ec2742bfae8b9d09baacb74954a9f1b5bffd96ebd13e8686d692308
SHA5121e00995abd88de9fcfad7fd1df248f921232e0bca85b8542e6b6bb786e30c8df5a6ee130d7d2924ee5ed5110a99337cdbbd0d5af535ea765170e2c6579c33f2b
-
Filesize
169KB
MD5cc55f77abe839bb7947b61d887c350c8
SHA1ea631fb3d866bdef1babd1e065502ebc09405137
SHA2560d4e6c2da76c1de8e9de7cd3d424ba60c6d62c8ac081b9474b6b058e61503cb6
SHA512397542510989a25b8bf1ae6ba2be906bcc1b538a58eb91e503068b5c04784cdf6898c1b3f6abc5b419d59f1b8e7ac701ec46dc3b8bd7e8241b6eb93348588edf
-
Filesize
169KB
MD5cc55f77abe839bb7947b61d887c350c8
SHA1ea631fb3d866bdef1babd1e065502ebc09405137
SHA2560d4e6c2da76c1de8e9de7cd3d424ba60c6d62c8ac081b9474b6b058e61503cb6
SHA512397542510989a25b8bf1ae6ba2be906bcc1b538a58eb91e503068b5c04784cdf6898c1b3f6abc5b419d59f1b8e7ac701ec46dc3b8bd7e8241b6eb93348588edf
-
Filesize
709KB
MD58e52e4ee67bd9fc434c76f2e319a69c8
SHA1ddfd14685b00a6d1df3c02d130d59b536370dddb
SHA256971be1ab9ff0f09457e95b7180198d90e630e0444c2c31f7aa1714937863bdba
SHA512233631503efe46fa25759ee48c2b9d5d1ed4c01989c6d70d5f60bb5b0b37e47744cba5dc9198dc23ab3750cdb2dd9a8758f6ce9448710e8597d23770ae477620
-
Filesize
709KB
MD58e52e4ee67bd9fc434c76f2e319a69c8
SHA1ddfd14685b00a6d1df3c02d130d59b536370dddb
SHA256971be1ab9ff0f09457e95b7180198d90e630e0444c2c31f7aa1714937863bdba
SHA512233631503efe46fa25759ee48c2b9d5d1ed4c01989c6d70d5f60bb5b0b37e47744cba5dc9198dc23ab3750cdb2dd9a8758f6ce9448710e8597d23770ae477620
-
Filesize
404KB
MD56a6598bb65c4aac1881a30cd49a8088f
SHA1e279e09c32ac1e362bbbfde240178b711d35d645
SHA256823fb458a3bc765ba7da72204022e02c3d434ddcc5b0deb4b2ef3ddf174cda24
SHA5124226e7f9dd37c735a2b1e84df1777a5f07e805bdc257a849f73e897ebd39d45b6b65f3885db304ca3911f325c8d333ed10adcf0cb6bc377b0589fc5fc3e6e943
-
Filesize
404KB
MD56a6598bb65c4aac1881a30cd49a8088f
SHA1e279e09c32ac1e362bbbfde240178b711d35d645
SHA256823fb458a3bc765ba7da72204022e02c3d434ddcc5b0deb4b2ef3ddf174cda24
SHA5124226e7f9dd37c735a2b1e84df1777a5f07e805bdc257a849f73e897ebd39d45b6b65f3885db304ca3911f325c8d333ed10adcf0cb6bc377b0589fc5fc3e6e943
-
Filesize
588KB
MD5f1044c75773701ead41ba58f2554007d
SHA11c6f0b74790a504fa27f341e5cc197f21feb1320
SHA256c210dd83b88bc7cf851f8b371eacfa318e47cd7f800ad984c328de42bf4585d6
SHA5129bf5473a5ac508bcb6cebdfeef730299750cf6e8be878b2f6c14edc516b640fffee504c174cba4832fb8f452c73d6c99e7c3e7aecc0c108a06f01ee7d7634f49
-
Filesize
588KB
MD5f1044c75773701ead41ba58f2554007d
SHA11c6f0b74790a504fa27f341e5cc197f21feb1320
SHA256c210dd83b88bc7cf851f8b371eacfa318e47cd7f800ad984c328de42bf4585d6
SHA5129bf5473a5ac508bcb6cebdfeef730299750cf6e8be878b2f6c14edc516b640fffee504c174cba4832fb8f452c73d6c99e7c3e7aecc0c108a06f01ee7d7634f49
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1