Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:17
Static task
static1
General
-
Target
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe
-
Size
1.0MB
-
MD5
c2c5ac07c8afec4e2a3dccd31038ce92
-
SHA1
04019bba4b6a4a02308664c131a4e4eae6bfd587
-
SHA256
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e
-
SHA512
dc70f36fc4e643c25995173f0ff05b74cdd2ee98cdd53e770dfe330361253c1e1b7035a6e60c3dfa831beb5076a8908eb4ac503674ef6764c85ca37281545abe
-
SSDEEP
24576:7y02x2N4tM7aBtl21k92UtKI83FaQyOJ2dqgo:ui7wl21g5YI+Fab3dq
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it124009.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it124009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it124009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it124009.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it124009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it124009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it124009.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exejr155806.exelr683330.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation jr155806.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation lr683330.exe -
Executes dropped EXE 10 IoCs
Processes:
ziAF1139.exezivp2753.exeit124009.exejr155806.exe1.exekp426714.exelr683330.exeoneetx.exeoneetx.exeoneetx.exepid process 4264 ziAF1139.exe 2020 zivp2753.exe 4432 it124009.exe 4132 jr155806.exe 4628 1.exe 1472 kp426714.exe 3632 lr683330.exe 4100 oneetx.exe 4068 oneetx.exe 1924 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1484 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it124009.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it124009.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zivp2753.exed55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exeziAF1139.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zivp2753.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAF1139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAF1139.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivp2753.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2952 3632 WerFault.exe lr683330.exe 2792 3632 WerFault.exe lr683330.exe 4636 3632 WerFault.exe lr683330.exe 2164 3632 WerFault.exe lr683330.exe 1204 3632 WerFault.exe lr683330.exe 1640 3632 WerFault.exe lr683330.exe 2916 3632 WerFault.exe lr683330.exe 4584 3632 WerFault.exe lr683330.exe 4316 3632 WerFault.exe lr683330.exe 4220 3632 WerFault.exe lr683330.exe 4172 4100 WerFault.exe oneetx.exe 5068 4100 WerFault.exe oneetx.exe 4348 4100 WerFault.exe oneetx.exe 3356 4100 WerFault.exe oneetx.exe 2984 4100 WerFault.exe oneetx.exe 2444 4100 WerFault.exe oneetx.exe 4460 4100 WerFault.exe oneetx.exe 1612 4100 WerFault.exe oneetx.exe 540 4100 WerFault.exe oneetx.exe 3852 4100 WerFault.exe oneetx.exe 3148 4100 WerFault.exe oneetx.exe 4132 4068 WerFault.exe oneetx.exe 1864 4100 WerFault.exe oneetx.exe 2816 4100 WerFault.exe oneetx.exe 2132 4100 WerFault.exe oneetx.exe 1572 1924 WerFault.exe oneetx.exe 2664 4100 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it124009.exekp426714.exe1.exepid process 4432 it124009.exe 4432 it124009.exe 1472 kp426714.exe 1472 kp426714.exe 4628 1.exe 4628 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it124009.exejr155806.exekp426714.exe1.exedescription pid process Token: SeDebugPrivilege 4432 it124009.exe Token: SeDebugPrivilege 4132 jr155806.exe Token: SeDebugPrivilege 1472 kp426714.exe Token: SeDebugPrivilege 4628 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr683330.exepid process 3632 lr683330.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exeziAF1139.exezivp2753.exejr155806.exelr683330.exeoneetx.exedescription pid process target process PID 1316 wrote to memory of 4264 1316 d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe ziAF1139.exe PID 1316 wrote to memory of 4264 1316 d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe ziAF1139.exe PID 1316 wrote to memory of 4264 1316 d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe ziAF1139.exe PID 4264 wrote to memory of 2020 4264 ziAF1139.exe zivp2753.exe PID 4264 wrote to memory of 2020 4264 ziAF1139.exe zivp2753.exe PID 4264 wrote to memory of 2020 4264 ziAF1139.exe zivp2753.exe PID 2020 wrote to memory of 4432 2020 zivp2753.exe it124009.exe PID 2020 wrote to memory of 4432 2020 zivp2753.exe it124009.exe PID 2020 wrote to memory of 4132 2020 zivp2753.exe jr155806.exe PID 2020 wrote to memory of 4132 2020 zivp2753.exe jr155806.exe PID 2020 wrote to memory of 4132 2020 zivp2753.exe jr155806.exe PID 4132 wrote to memory of 4628 4132 jr155806.exe 1.exe PID 4132 wrote to memory of 4628 4132 jr155806.exe 1.exe PID 4132 wrote to memory of 4628 4132 jr155806.exe 1.exe PID 4264 wrote to memory of 1472 4264 ziAF1139.exe kp426714.exe PID 4264 wrote to memory of 1472 4264 ziAF1139.exe kp426714.exe PID 4264 wrote to memory of 1472 4264 ziAF1139.exe kp426714.exe PID 1316 wrote to memory of 3632 1316 d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe lr683330.exe PID 1316 wrote to memory of 3632 1316 d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe lr683330.exe PID 1316 wrote to memory of 3632 1316 d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe lr683330.exe PID 3632 wrote to memory of 4100 3632 lr683330.exe oneetx.exe PID 3632 wrote to memory of 4100 3632 lr683330.exe oneetx.exe PID 3632 wrote to memory of 4100 3632 lr683330.exe oneetx.exe PID 4100 wrote to memory of 224 4100 oneetx.exe schtasks.exe PID 4100 wrote to memory of 224 4100 oneetx.exe schtasks.exe PID 4100 wrote to memory of 224 4100 oneetx.exe schtasks.exe PID 4100 wrote to memory of 1484 4100 oneetx.exe rundll32.exe PID 4100 wrote to memory of 1484 4100 oneetx.exe rundll32.exe PID 4100 wrote to memory of 1484 4100 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe"C:\Users\Admin\AppData\Local\Temp\d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAF1139.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAF1139.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivp2753.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivp2753.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it124009.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it124009.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr155806.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr155806.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp426714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp426714.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr683330.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr683330.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7003⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7683⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8603⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9563⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9603⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9603⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 12243⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 12163⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 13243⤵
- Program crash
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 6964⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 8724⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 8924⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 10564⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 11004⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 11204⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 10564⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 9964⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 7324⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 7844⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 7604⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 11524⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 15964⤵
- Program crash
PID:2816
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 15724⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 16284⤵
- Program crash
PID:2664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 14323⤵
- Program crash
PID:4220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3632 -ip 36321⤵PID:716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3632 -ip 36321⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3632 -ip 36321⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3632 -ip 36321⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3632 -ip 36321⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3632 -ip 36321⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3632 -ip 36321⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3632 -ip 36321⤵PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3632 -ip 36321⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3632 -ip 36321⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4100 -ip 41001⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4100 -ip 41001⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4100 -ip 41001⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4100 -ip 41001⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4100 -ip 41001⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4100 -ip 41001⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4100 -ip 41001⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4100 -ip 41001⤵PID:112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4100 -ip 41001⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4100 -ip 41001⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4100 -ip 41001⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 3242⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4068 -ip 40681⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4100 -ip 41001⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4100 -ip 41001⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4100 -ip 41001⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 3202⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1924 -ip 19241⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4100 -ip 41001⤵PID:3420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
724KB
MD5c85c9a7af24d5a229322a8068a5e707b
SHA165e82c4120849e9ef624e35e8e2a7446bb860afb
SHA256153dbca9ff7d1110d71555c08a0ecadf6231656ae08bb4cd81d2bc98d2dbcc7e
SHA512ad99184baa96a1c0f4b3b17e3c9299bcf9890e11d802ed53238f03abd5d0917b8591f85bb7fc9ed3fb23c9c7eaa9ec95151125af10cffe7a1ea655951bd6871c
-
Filesize
724KB
MD5c85c9a7af24d5a229322a8068a5e707b
SHA165e82c4120849e9ef624e35e8e2a7446bb860afb
SHA256153dbca9ff7d1110d71555c08a0ecadf6231656ae08bb4cd81d2bc98d2dbcc7e
SHA512ad99184baa96a1c0f4b3b17e3c9299bcf9890e11d802ed53238f03abd5d0917b8591f85bb7fc9ed3fb23c9c7eaa9ec95151125af10cffe7a1ea655951bd6871c
-
Filesize
169KB
MD5e213e51b548ed3ca213df46fc9473be0
SHA124eebfa3e723d2f9200caa2c9f3060f4e0627592
SHA256f44b55f8ac2d4d63ae38d7e114d6179b65593839ab4c76d5d0b1a180a38e429e
SHA512ecb27217a96ca3bf4c9bd36ba8af921141d95fbe2389bd98e7e7dd454215c26f3cc4443b9755bf6fd4d970036fb134148b6fab04e5ca87bf21eb3c65841045a8
-
Filesize
169KB
MD5e213e51b548ed3ca213df46fc9473be0
SHA124eebfa3e723d2f9200caa2c9f3060f4e0627592
SHA256f44b55f8ac2d4d63ae38d7e114d6179b65593839ab4c76d5d0b1a180a38e429e
SHA512ecb27217a96ca3bf4c9bd36ba8af921141d95fbe2389bd98e7e7dd454215c26f3cc4443b9755bf6fd4d970036fb134148b6fab04e5ca87bf21eb3c65841045a8
-
Filesize
569KB
MD575a07bbb55d53f5afbe27bcfa7f60545
SHA119fb8e0048a32ac7f3c3359336f8019653d9a8ee
SHA25610846f1249143ec6354b959b601fdec3ada0121c078ccc38fa07478c8a765c86
SHA51212a9fa41e00ce47968b9252db9666d492fc545d84bf20ae37c12b37b71b5d11c53696121abb91808e39bf3f20ea4f7438510d7d4e7f733b12f54b1aead3f365b
-
Filesize
569KB
MD575a07bbb55d53f5afbe27bcfa7f60545
SHA119fb8e0048a32ac7f3c3359336f8019653d9a8ee
SHA25610846f1249143ec6354b959b601fdec3ada0121c078ccc38fa07478c8a765c86
SHA51212a9fa41e00ce47968b9252db9666d492fc545d84bf20ae37c12b37b71b5d11c53696121abb91808e39bf3f20ea4f7438510d7d4e7f733b12f54b1aead3f365b
-
Filesize
11KB
MD569ad867775a6a8ab7e6d8f23a9272752
SHA1fcbf04c68d445e51b3e4b4dc1e9ac941c405f0c4
SHA256618a768268787cd4acd54ed9047d14f042ca66d1ee6b631fecd3776560d51aa0
SHA512d39b0b56faf4dbdfe5082f91818aae45cabef3c774f334823099cd31fca00a3a2c0d9d4f853dce7af7d723046f88d049041a720eb4f7f4b039a8d2b2c370e6c5
-
Filesize
11KB
MD569ad867775a6a8ab7e6d8f23a9272752
SHA1fcbf04c68d445e51b3e4b4dc1e9ac941c405f0c4
SHA256618a768268787cd4acd54ed9047d14f042ca66d1ee6b631fecd3776560d51aa0
SHA512d39b0b56faf4dbdfe5082f91818aae45cabef3c774f334823099cd31fca00a3a2c0d9d4f853dce7af7d723046f88d049041a720eb4f7f4b039a8d2b2c370e6c5
-
Filesize
588KB
MD51ff2d5444524c7789c0a53ed2319b4cd
SHA1778cb0b323eac14d07ede4cb5e06b313beae0104
SHA256464550ba73e987a5ab861c539610f5b83327771918e3f407eca0481c072b046f
SHA512dfb2611001ecb8e3ce6a387b8e0e05bf7771b4fac49b606643f3573ab9908b15485538e45f8c764ff4564e2a7197b904d5af7fc2c3579caf1fcb521ec6d06717
-
Filesize
588KB
MD51ff2d5444524c7789c0a53ed2319b4cd
SHA1778cb0b323eac14d07ede4cb5e06b313beae0104
SHA256464550ba73e987a5ab861c539610f5b83327771918e3f407eca0481c072b046f
SHA512dfb2611001ecb8e3ce6a387b8e0e05bf7771b4fac49b606643f3573ab9908b15485538e45f8c764ff4564e2a7197b904d5af7fc2c3579caf1fcb521ec6d06717
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1