Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:31
Static task
static1
General
-
Target
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe
-
Size
1.2MB
-
MD5
5128aea99a02a35a64eb5422bbe170a0
-
SHA1
08cde72eea84bece9e6a152fe9dfd7b1908e5979
-
SHA256
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919
-
SHA512
27c2916c0e7a64219f1f74402122c3f04ee534b6d16a303d1bb2741c875480971b5ff363c4056809e0b70ed8b068212cbd600b80f2c3390be7f91e661481f24f
-
SSDEEP
24576:KyPNJbImKAE8cQipxCz61u9NsuWV5PYnOr:RlJbmRxCz61CyuWV5i
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr221225.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr221225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr221225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr221225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr221225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr221225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr221225.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu545388.exesi491627.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation qu545388.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation si491627.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un857737.exeun609559.exepr221225.exequ545388.exe1.exerk901690.exesi491627.exeoneetx.exeoneetx.exeoneetx.exepid process 1004 un857737.exe 2460 un609559.exe 1448 pr221225.exe 1136 qu545388.exe 1152 1.exe 4496 rk901690.exe 1936 si491627.exe 1516 oneetx.exe 3632 oneetx.exe 228 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2060 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr221225.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr221225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr221225.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un857737.exeun609559.exe4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un857737.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un609559.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un609559.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un857737.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4140 1448 WerFault.exe pr221225.exe 4336 1936 WerFault.exe si491627.exe 2148 1936 WerFault.exe si491627.exe 4572 1936 WerFault.exe si491627.exe 2188 1936 WerFault.exe si491627.exe 3260 1936 WerFault.exe si491627.exe 1952 1936 WerFault.exe si491627.exe 3896 1936 WerFault.exe si491627.exe 208 1936 WerFault.exe si491627.exe 448 1936 WerFault.exe si491627.exe 740 1936 WerFault.exe si491627.exe 3348 1516 WerFault.exe oneetx.exe 5060 1516 WerFault.exe oneetx.exe 1904 1516 WerFault.exe oneetx.exe 1820 1516 WerFault.exe oneetx.exe 2788 1516 WerFault.exe oneetx.exe 4708 1516 WerFault.exe oneetx.exe 4552 1516 WerFault.exe oneetx.exe 4036 1516 WerFault.exe oneetx.exe 3460 1516 WerFault.exe oneetx.exe 4060 1516 WerFault.exe oneetx.exe 3064 1516 WerFault.exe oneetx.exe 4512 1516 WerFault.exe oneetx.exe 1004 3632 WerFault.exe oneetx.exe 4380 3632 WerFault.exe oneetx.exe 4100 3632 WerFault.exe oneetx.exe 3540 1516 WerFault.exe oneetx.exe 1484 1516 WerFault.exe oneetx.exe 2552 1516 WerFault.exe oneetx.exe 748 228 WerFault.exe oneetx.exe 5044 228 WerFault.exe oneetx.exe 1740 228 WerFault.exe oneetx.exe 1796 1516 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr221225.exerk901690.exe1.exepid process 1448 pr221225.exe 1448 pr221225.exe 4496 rk901690.exe 1152 1.exe 4496 rk901690.exe 1152 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr221225.exequ545388.exerk901690.exe1.exedescription pid process Token: SeDebugPrivilege 1448 pr221225.exe Token: SeDebugPrivilege 1136 qu545388.exe Token: SeDebugPrivilege 4496 rk901690.exe Token: SeDebugPrivilege 1152 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si491627.exepid process 1936 si491627.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exeun857737.exeun609559.exequ545388.exesi491627.exeoneetx.exedescription pid process target process PID 628 wrote to memory of 1004 628 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe un857737.exe PID 628 wrote to memory of 1004 628 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe un857737.exe PID 628 wrote to memory of 1004 628 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe un857737.exe PID 1004 wrote to memory of 2460 1004 un857737.exe un609559.exe PID 1004 wrote to memory of 2460 1004 un857737.exe un609559.exe PID 1004 wrote to memory of 2460 1004 un857737.exe un609559.exe PID 2460 wrote to memory of 1448 2460 un609559.exe pr221225.exe PID 2460 wrote to memory of 1448 2460 un609559.exe pr221225.exe PID 2460 wrote to memory of 1448 2460 un609559.exe pr221225.exe PID 2460 wrote to memory of 1136 2460 un609559.exe qu545388.exe PID 2460 wrote to memory of 1136 2460 un609559.exe qu545388.exe PID 2460 wrote to memory of 1136 2460 un609559.exe qu545388.exe PID 1136 wrote to memory of 1152 1136 qu545388.exe 1.exe PID 1136 wrote to memory of 1152 1136 qu545388.exe 1.exe PID 1136 wrote to memory of 1152 1136 qu545388.exe 1.exe PID 1004 wrote to memory of 4496 1004 un857737.exe rk901690.exe PID 1004 wrote to memory of 4496 1004 un857737.exe rk901690.exe PID 1004 wrote to memory of 4496 1004 un857737.exe rk901690.exe PID 628 wrote to memory of 1936 628 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe si491627.exe PID 628 wrote to memory of 1936 628 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe si491627.exe PID 628 wrote to memory of 1936 628 4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe si491627.exe PID 1936 wrote to memory of 1516 1936 si491627.exe oneetx.exe PID 1936 wrote to memory of 1516 1936 si491627.exe oneetx.exe PID 1936 wrote to memory of 1516 1936 si491627.exe oneetx.exe PID 1516 wrote to memory of 452 1516 oneetx.exe schtasks.exe PID 1516 wrote to memory of 452 1516 oneetx.exe schtasks.exe PID 1516 wrote to memory of 452 1516 oneetx.exe schtasks.exe PID 1516 wrote to memory of 2060 1516 oneetx.exe rundll32.exe PID 1516 wrote to memory of 2060 1516 oneetx.exe rundll32.exe PID 1516 wrote to memory of 2060 1516 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe"C:\Users\Admin\AppData\Local\Temp\4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un857737.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un857737.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un609559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un609559.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr221225.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr221225.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 10885⤵
- Program crash
PID:4140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu545388.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu545388.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk901690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk901690.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491627.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491627.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 7003⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 7843⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 8603⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 8683⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 9883⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 9723⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 12243⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 12283⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 13323⤵
- Program crash
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 6964⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 9484⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 10764⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 10764⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 11124⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 11244⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 9484⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 11324⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 10164⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 7764⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 7004⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 9844⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 11484⤵
- Program crash
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 16124⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 11404⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 15924⤵
- Program crash
PID:1796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 7923⤵
- Program crash
PID:740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1448 -ip 14481⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1936 -ip 19361⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1936 -ip 19361⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1936 -ip 19361⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1936 -ip 19361⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1936 -ip 19361⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1936 -ip 19361⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1936 -ip 19361⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1936 -ip 19361⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1936 -ip 19361⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1936 -ip 19361⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1516 -ip 15161⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1516 -ip 15161⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1516 -ip 15161⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1516 -ip 15161⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1516 -ip 15161⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1516 -ip 15161⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1516 -ip 15161⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1516 -ip 15161⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1516 -ip 15161⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1516 -ip 15161⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1516 -ip 15161⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1516 -ip 15161⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 3962⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 4402⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 4402⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3632 -ip 36321⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3632 -ip 36321⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1516 -ip 15161⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1516 -ip 15161⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1516 -ip 15161⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 3962⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4402⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4682⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 228 -ip 2281⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 228 -ip 2281⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 228 -ip 2281⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1516 -ip 15161⤵PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
866KB
MD5191688090c908b83d027904b33f66dba
SHA140b402c36c934430613432ff34cb5a053f73c949
SHA2569454aefcf92a46a7fd53cc0b573478311e15b4c95d4ba335fe421dbf4949dc89
SHA5125cfc13b720b471bf493b4e86a6280ccde9ab375c06db75bfdf3bd204de0a36794124d1d8483636592ab7e83e1417bb8d168f622ec4a37d6f314b46b57175de35
-
Filesize
866KB
MD5191688090c908b83d027904b33f66dba
SHA140b402c36c934430613432ff34cb5a053f73c949
SHA2569454aefcf92a46a7fd53cc0b573478311e15b4c95d4ba335fe421dbf4949dc89
SHA5125cfc13b720b471bf493b4e86a6280ccde9ab375c06db75bfdf3bd204de0a36794124d1d8483636592ab7e83e1417bb8d168f622ec4a37d6f314b46b57175de35
-
Filesize
169KB
MD59873c188474966c474baa884955bfeb1
SHA142e3a57ac52099569c2d87bac591d17d6e6fc173
SHA2561a38dbbaf3d1d008da6c0dde47746780e37658ec088817b540463656a14010c2
SHA512dbe1b43b2bc519272111dca33e09d8204939fc615508ef6b9e53bf7497d23221b878ced0fa59f42048e63f45a189354335521dfa415566d44b9c87052520cc40
-
Filesize
169KB
MD59873c188474966c474baa884955bfeb1
SHA142e3a57ac52099569c2d87bac591d17d6e6fc173
SHA2561a38dbbaf3d1d008da6c0dde47746780e37658ec088817b540463656a14010c2
SHA512dbe1b43b2bc519272111dca33e09d8204939fc615508ef6b9e53bf7497d23221b878ced0fa59f42048e63f45a189354335521dfa415566d44b9c87052520cc40
-
Filesize
712KB
MD5d07eecf708dc5962daab8e54c67f0426
SHA1c0f5cffb66d7eb40f9818ee201a26e5f64d22a2c
SHA256c8aeec0d6e0c2616266166f153865696c429e633035612752b2c499b8f0c955e
SHA51260351663daf4dc022bcf3e528f50115493605da7d8aa86fcc3f4c81125d134803f269391886b747a7e4a5ae1bc9cef5d4e28564a52600bf1733456323547afee
-
Filesize
712KB
MD5d07eecf708dc5962daab8e54c67f0426
SHA1c0f5cffb66d7eb40f9818ee201a26e5f64d22a2c
SHA256c8aeec0d6e0c2616266166f153865696c429e633035612752b2c499b8f0c955e
SHA51260351663daf4dc022bcf3e528f50115493605da7d8aa86fcc3f4c81125d134803f269391886b747a7e4a5ae1bc9cef5d4e28564a52600bf1733456323547afee
-
Filesize
404KB
MD552d292b6319c9839a62eea55f40a89c3
SHA1a0c3b194cf80216d853f2aadb521d8a2a8ad824a
SHA2563e9fb925cb968ec4be8593aecfeb1b1758ad617b887da69475e07f5d2174a3f7
SHA51230586a609448f271324efc6f6cb6b5d2ac61f5107ff38343757b766c9b43dece3116757eb2aab5c286fab32681e9d7f07197e9793b94b7e12a391a8439b26cfb
-
Filesize
404KB
MD552d292b6319c9839a62eea55f40a89c3
SHA1a0c3b194cf80216d853f2aadb521d8a2a8ad824a
SHA2563e9fb925cb968ec4be8593aecfeb1b1758ad617b887da69475e07f5d2174a3f7
SHA51230586a609448f271324efc6f6cb6b5d2ac61f5107ff38343757b766c9b43dece3116757eb2aab5c286fab32681e9d7f07197e9793b94b7e12a391a8439b26cfb
-
Filesize
588KB
MD577659b5c9f8bb30040d17126befdbdc2
SHA10e40621d0f2a1920b314c2b022e239278578fdf6
SHA2568164ee93c58b97abd987df9fc310ae7ad386f45b6322f97b4c050c7a27df6f64
SHA512bd246c4535b7b3067c6ef19866ba97ba1ac0881d9f08544db1201a67b0c6f017f0c582c62fe5b72dddb986bc8a200f6993f60ee066659453a5278ad932496da3
-
Filesize
588KB
MD577659b5c9f8bb30040d17126befdbdc2
SHA10e40621d0f2a1920b314c2b022e239278578fdf6
SHA2568164ee93c58b97abd987df9fc310ae7ad386f45b6322f97b4c050c7a27df6f64
SHA512bd246c4535b7b3067c6ef19866ba97ba1ac0881d9f08544db1201a67b0c6f017f0c582c62fe5b72dddb986bc8a200f6993f60ee066659453a5278ad932496da3
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1