Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:38
Static task
static1
General
-
Target
26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe
-
Size
1.2MB
-
MD5
4d9ce73b9a54b3ae2e20705f8a109dbd
-
SHA1
1e6df4e80b1f8feb72267687cdc7d0555b635976
-
SHA256
26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4
-
SHA512
e1c232e15a0dd65ca6b7d07c00ef0686694b78496c215bf4d12bfbcb0a89566ea2c218182c391f6c889581ae55f9f50a943e22be204bd19ebe0dce7c2fb63395
-
SSDEEP
24576:oyEl6DGPi/D9eUMVv86E5ukh1r9N/RPvq5F3TAU20NWNO:vEhP+UUMVv8fkkh1JJgjDA2w
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr227231.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr227231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr227231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr227231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr227231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr227231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr227231.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu176840.exesi100936.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu176840.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si100936.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un321674.exeun530921.exepr227231.exequ176840.exe1.exerk386146.exesi100936.exeoneetx.exeoneetx.exeoneetx.exepid process 1452 un321674.exe 5100 un530921.exe 4444 pr227231.exe 4436 qu176840.exe 1580 1.exe 3244 rk386146.exe 3724 si100936.exe 4184 oneetx.exe 1736 oneetx.exe 3292 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2396 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr227231.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr227231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr227231.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un321674.exeun530921.exe26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un321674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un321674.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un530921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un530921.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2292 3724 WerFault.exe si100936.exe 3684 3724 WerFault.exe si100936.exe 100 3724 WerFault.exe si100936.exe 2396 3724 WerFault.exe si100936.exe 956 3724 WerFault.exe si100936.exe 4088 3724 WerFault.exe si100936.exe 2068 3724 WerFault.exe si100936.exe 4772 3724 WerFault.exe si100936.exe 4396 3724 WerFault.exe si100936.exe 3740 3724 WerFault.exe si100936.exe 624 4184 WerFault.exe oneetx.exe 2304 4184 WerFault.exe oneetx.exe 1928 4184 WerFault.exe oneetx.exe 3520 4184 WerFault.exe oneetx.exe 2192 4184 WerFault.exe oneetx.exe 2712 4184 WerFault.exe oneetx.exe 1188 4184 WerFault.exe oneetx.exe 4488 4184 WerFault.exe oneetx.exe 4540 4184 WerFault.exe oneetx.exe 632 4184 WerFault.exe oneetx.exe 2148 4184 WerFault.exe oneetx.exe 1280 1736 WerFault.exe oneetx.exe 2392 4184 WerFault.exe oneetx.exe 3672 4184 WerFault.exe oneetx.exe 4660 4184 WerFault.exe oneetx.exe 2244 4184 WerFault.exe oneetx.exe 2788 3292 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr227231.exe1.exerk386146.exepid process 4444 pr227231.exe 4444 pr227231.exe 1580 1.exe 3244 rk386146.exe 1580 1.exe 3244 rk386146.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr227231.exequ176840.exe1.exerk386146.exedescription pid process Token: SeDebugPrivilege 4444 pr227231.exe Token: SeDebugPrivilege 4436 qu176840.exe Token: SeDebugPrivilege 1580 1.exe Token: SeDebugPrivilege 3244 rk386146.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si100936.exepid process 3724 si100936.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exeun321674.exeun530921.exequ176840.exesi100936.exeoneetx.exedescription pid process target process PID 4240 wrote to memory of 1452 4240 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe un321674.exe PID 4240 wrote to memory of 1452 4240 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe un321674.exe PID 4240 wrote to memory of 1452 4240 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe un321674.exe PID 1452 wrote to memory of 5100 1452 un321674.exe un530921.exe PID 1452 wrote to memory of 5100 1452 un321674.exe un530921.exe PID 1452 wrote to memory of 5100 1452 un321674.exe un530921.exe PID 5100 wrote to memory of 4444 5100 un530921.exe pr227231.exe PID 5100 wrote to memory of 4444 5100 un530921.exe pr227231.exe PID 5100 wrote to memory of 4444 5100 un530921.exe pr227231.exe PID 5100 wrote to memory of 4436 5100 un530921.exe qu176840.exe PID 5100 wrote to memory of 4436 5100 un530921.exe qu176840.exe PID 5100 wrote to memory of 4436 5100 un530921.exe qu176840.exe PID 4436 wrote to memory of 1580 4436 qu176840.exe 1.exe PID 4436 wrote to memory of 1580 4436 qu176840.exe 1.exe PID 4436 wrote to memory of 1580 4436 qu176840.exe 1.exe PID 1452 wrote to memory of 3244 1452 un321674.exe rk386146.exe PID 1452 wrote to memory of 3244 1452 un321674.exe rk386146.exe PID 1452 wrote to memory of 3244 1452 un321674.exe rk386146.exe PID 4240 wrote to memory of 3724 4240 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe si100936.exe PID 4240 wrote to memory of 3724 4240 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe si100936.exe PID 4240 wrote to memory of 3724 4240 26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe si100936.exe PID 3724 wrote to memory of 4184 3724 si100936.exe oneetx.exe PID 3724 wrote to memory of 4184 3724 si100936.exe oneetx.exe PID 3724 wrote to memory of 4184 3724 si100936.exe oneetx.exe PID 4184 wrote to memory of 1680 4184 oneetx.exe schtasks.exe PID 4184 wrote to memory of 1680 4184 oneetx.exe schtasks.exe PID 4184 wrote to memory of 1680 4184 oneetx.exe schtasks.exe PID 4184 wrote to memory of 2396 4184 oneetx.exe rundll32.exe PID 4184 wrote to memory of 2396 4184 oneetx.exe rundll32.exe PID 4184 wrote to memory of 2396 4184 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe"C:\Users\Admin\AppData\Local\Temp\26a408f421ebbe3e48c5bddefe3176707d9be892314ed9b51dc36e63061b4fc4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un321674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un321674.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un530921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un530921.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr227231.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr227231.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu176840.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu176840.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk386146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk386146.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si100936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si100936.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 7003⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 7763⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 8083⤵
- Program crash
PID:100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 9763⤵
- Program crash
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 9723⤵
- Program crash
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 9763⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 12243⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 12723⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 12923⤵
- Program crash
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 6964⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 8684⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 9084⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 10564⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 10764⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 10684⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 11324⤵
- Program crash
PID:1188
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 9964⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 13044⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 13124⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 7204⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 11724⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 16284⤵
- Program crash
PID:3672
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 15684⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 16084⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 7523⤵
- Program crash
PID:3740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3724 -ip 37241⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3724 -ip 37241⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3724 -ip 37241⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3724 -ip 37241⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3724 -ip 37241⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3724 -ip 37241⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3724 -ip 37241⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3724 -ip 37241⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3724 -ip 37241⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3724 -ip 37241⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4184 -ip 41841⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4184 -ip 41841⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4184 -ip 41841⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4184 -ip 41841⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4184 -ip 41841⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4184 -ip 41841⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4184 -ip 41841⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4184 -ip 41841⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4184 -ip 41841⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4184 -ip 41841⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4184 -ip 41841⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 3202⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1736 -ip 17361⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4184 -ip 41841⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4184 -ip 41841⤵PID:1072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4184 -ip 41841⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4184 -ip 41841⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 3162⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3292 -ip 32921⤵PID:3884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
863KB
MD593cf038ee16b7c5c51b5289c7f7b7b84
SHA1e6f036c5079cddb66c8cefa77d7f08e8393dd822
SHA2569ac0936ffe601d7aefa24aa10ca0a9faaffdebf98b7cd254124943865b8a5a39
SHA512563371d5bfc9ae1e67ef0fdf9b39b99bfb32177bb424a64975d50863497be9be922cf1568c0c25362d0a4fd770da27acaeeff46a6c0c4e4880f8c83dca548737
-
Filesize
863KB
MD593cf038ee16b7c5c51b5289c7f7b7b84
SHA1e6f036c5079cddb66c8cefa77d7f08e8393dd822
SHA2569ac0936ffe601d7aefa24aa10ca0a9faaffdebf98b7cd254124943865b8a5a39
SHA512563371d5bfc9ae1e67ef0fdf9b39b99bfb32177bb424a64975d50863497be9be922cf1568c0c25362d0a4fd770da27acaeeff46a6c0c4e4880f8c83dca548737
-
Filesize
169KB
MD5276febf844fe98a7aca94e2f4a7c1caf
SHA12b490d6e24d3e531fe16158d0f0226f671f86310
SHA256a1a8231380a8119d968d73a82bb76a06d1101bf55d6822c1d70b7327b3c60c29
SHA512c7faa50fb3b61d404861bc09a1b6a9f4c5b9dc304c98327489a923a5b8ab512f784c0545373eac68c385c87d66e125b7c46528ae4c4e96014371aa66df279a56
-
Filesize
169KB
MD5276febf844fe98a7aca94e2f4a7c1caf
SHA12b490d6e24d3e531fe16158d0f0226f671f86310
SHA256a1a8231380a8119d968d73a82bb76a06d1101bf55d6822c1d70b7327b3c60c29
SHA512c7faa50fb3b61d404861bc09a1b6a9f4c5b9dc304c98327489a923a5b8ab512f784c0545373eac68c385c87d66e125b7c46528ae4c4e96014371aa66df279a56
-
Filesize
709KB
MD5054fae167457c70a3ce6b63f01c4cdc6
SHA14eea4dbb764960ab6ca05bee4ab7ad8ee1607094
SHA256e69c127927e0f5a291664fb9a8b6a26cff5f88aaf086158fd210a8165e09d299
SHA512e53f01ed78cfcf536437a698976281964872b123fadd257cd4a64f898e1c1f2acd7ab8a9c858feb2d5f9022b4247911a1daeb810783e951a247948cc0df7aeb3
-
Filesize
709KB
MD5054fae167457c70a3ce6b63f01c4cdc6
SHA14eea4dbb764960ab6ca05bee4ab7ad8ee1607094
SHA256e69c127927e0f5a291664fb9a8b6a26cff5f88aaf086158fd210a8165e09d299
SHA512e53f01ed78cfcf536437a698976281964872b123fadd257cd4a64f898e1c1f2acd7ab8a9c858feb2d5f9022b4247911a1daeb810783e951a247948cc0df7aeb3
-
Filesize
404KB
MD588da995c4045840f0924564b63a38f67
SHA1c55b0792554a9cd35961ba0b88dfad52571e6ea1
SHA256a08f68bc778bf276235eda9c7ae3d421c5e640d36dc3fdcda2b0bf8874f7576f
SHA51259ff74fc366b444b820f224452ed2ca0248b7cdbd13ad07cdf01cbed414bda97098a091f37854597d2348c5694ea48fb20d19a3b4bbea875408bbe989097ca07
-
Filesize
404KB
MD588da995c4045840f0924564b63a38f67
SHA1c55b0792554a9cd35961ba0b88dfad52571e6ea1
SHA256a08f68bc778bf276235eda9c7ae3d421c5e640d36dc3fdcda2b0bf8874f7576f
SHA51259ff74fc366b444b820f224452ed2ca0248b7cdbd13ad07cdf01cbed414bda97098a091f37854597d2348c5694ea48fb20d19a3b4bbea875408bbe989097ca07
-
Filesize
588KB
MD5ee366abd0edb104b779c9455558f5e07
SHA12e184a4b5b10dc2fda9d1be8e6f804235737eb82
SHA256873166ebb3271d0680ddb75365d8382f2ec2c7b7fd094786ccf3550d7fc64c7f
SHA512e30de7c1b743e5e277e4e61315fa2b9680b8a857915b743084b5be17df81f61020543667186f761e9a919a5dea5ed1cbeceaa371cba646cb78153005077b943a
-
Filesize
588KB
MD5ee366abd0edb104b779c9455558f5e07
SHA12e184a4b5b10dc2fda9d1be8e6f804235737eb82
SHA256873166ebb3271d0680ddb75365d8382f2ec2c7b7fd094786ccf3550d7fc64c7f
SHA512e30de7c1b743e5e277e4e61315fa2b9680b8a857915b743084b5be17df81f61020543667186f761e9a919a5dea5ed1cbeceaa371cba646cb78153005077b943a
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1