Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:42
Static task
static1
General
-
Target
edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe
-
Size
1.2MB
-
MD5
e768f9e4ea3ff297976e7f14b4047be0
-
SHA1
edc5386c8c11b6acc4d3b8d6c2a133f79cf716bf
-
SHA256
edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246
-
SHA512
dd4a0f394e8ec7a1179954c59bbbba4171da44bcff2540e6eabf52bcf1d0ff8caed337a0c1b3d696817648fdab98dd95ff0e0485ad39097337632969e912473f
-
SSDEEP
24576:dyGpfDt3nLEbfdiQyfwg1c9NVHfi2bcRpppMXz:4aB3LExyfwg14PHpc7z6
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr601966.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr601966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr601966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr601966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr601966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr601966.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr601966.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exequ958694.exesi841369.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation qu958694.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation si841369.exe -
Executes dropped EXE 10 IoCs
Processes:
un161068.exeun037518.exepr601966.exequ958694.exe1.exerk366664.exesi841369.exeoneetx.exeoneetx.exeoneetx.exepid process 4572 un161068.exe 920 un037518.exe 1636 pr601966.exe 4996 qu958694.exe 2360 1.exe 2604 rk366664.exe 4664 si841369.exe 4188 oneetx.exe 4456 oneetx.exe 1808 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2140 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr601966.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr601966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr601966.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exeun161068.exeun037518.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un161068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un161068.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un037518.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un037518.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4600 4664 WerFault.exe si841369.exe 4812 4664 WerFault.exe si841369.exe 5108 4664 WerFault.exe si841369.exe 4568 4664 WerFault.exe si841369.exe 4220 4664 WerFault.exe si841369.exe 4712 4664 WerFault.exe si841369.exe 1808 4664 WerFault.exe si841369.exe 2364 4664 WerFault.exe si841369.exe 2892 4664 WerFault.exe si841369.exe 2800 4664 WerFault.exe si841369.exe 1656 4188 WerFault.exe oneetx.exe 2252 4188 WerFault.exe oneetx.exe 1636 4188 WerFault.exe oneetx.exe 2376 4188 WerFault.exe oneetx.exe 2668 4188 WerFault.exe oneetx.exe 1760 4188 WerFault.exe oneetx.exe 4968 4188 WerFault.exe oneetx.exe 5044 4188 WerFault.exe oneetx.exe 1100 4188 WerFault.exe oneetx.exe 1724 4188 WerFault.exe oneetx.exe 1300 4188 WerFault.exe oneetx.exe 4204 4188 WerFault.exe oneetx.exe 1080 4456 WerFault.exe oneetx.exe 4480 4188 WerFault.exe oneetx.exe 4232 4188 WerFault.exe oneetx.exe 716 4188 WerFault.exe oneetx.exe 2364 1808 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr601966.exe1.exerk366664.exepid process 1636 pr601966.exe 1636 pr601966.exe 2360 1.exe 2604 rk366664.exe 2604 rk366664.exe 2360 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr601966.exequ958694.exe1.exerk366664.exedescription pid process Token: SeDebugPrivilege 1636 pr601966.exe Token: SeDebugPrivilege 4996 qu958694.exe Token: SeDebugPrivilege 2360 1.exe Token: SeDebugPrivilege 2604 rk366664.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si841369.exepid process 4664 si841369.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exeun161068.exeun037518.exequ958694.exesi841369.exeoneetx.exedescription pid process target process PID 4344 wrote to memory of 4572 4344 edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe un161068.exe PID 4344 wrote to memory of 4572 4344 edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe un161068.exe PID 4344 wrote to memory of 4572 4344 edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe un161068.exe PID 4572 wrote to memory of 920 4572 un161068.exe un037518.exe PID 4572 wrote to memory of 920 4572 un161068.exe un037518.exe PID 4572 wrote to memory of 920 4572 un161068.exe un037518.exe PID 920 wrote to memory of 1636 920 un037518.exe pr601966.exe PID 920 wrote to memory of 1636 920 un037518.exe pr601966.exe PID 920 wrote to memory of 1636 920 un037518.exe pr601966.exe PID 920 wrote to memory of 4996 920 un037518.exe qu958694.exe PID 920 wrote to memory of 4996 920 un037518.exe qu958694.exe PID 920 wrote to memory of 4996 920 un037518.exe qu958694.exe PID 4996 wrote to memory of 2360 4996 qu958694.exe 1.exe PID 4996 wrote to memory of 2360 4996 qu958694.exe 1.exe PID 4996 wrote to memory of 2360 4996 qu958694.exe 1.exe PID 4572 wrote to memory of 2604 4572 un161068.exe rk366664.exe PID 4572 wrote to memory of 2604 4572 un161068.exe rk366664.exe PID 4572 wrote to memory of 2604 4572 un161068.exe rk366664.exe PID 4344 wrote to memory of 4664 4344 edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe si841369.exe PID 4344 wrote to memory of 4664 4344 edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe si841369.exe PID 4344 wrote to memory of 4664 4344 edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe si841369.exe PID 4664 wrote to memory of 4188 4664 si841369.exe oneetx.exe PID 4664 wrote to memory of 4188 4664 si841369.exe oneetx.exe PID 4664 wrote to memory of 4188 4664 si841369.exe oneetx.exe PID 4188 wrote to memory of 1084 4188 oneetx.exe schtasks.exe PID 4188 wrote to memory of 1084 4188 oneetx.exe schtasks.exe PID 4188 wrote to memory of 1084 4188 oneetx.exe schtasks.exe PID 4188 wrote to memory of 2140 4188 oneetx.exe rundll32.exe PID 4188 wrote to memory of 2140 4188 oneetx.exe rundll32.exe PID 4188 wrote to memory of 2140 4188 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe"C:\Users\Admin\AppData\Local\Temp\edae76c071c3380d74cae582f61705aee658ead88f3c54990c57409b65625246.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un161068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un161068.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un037518.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un037518.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr601966.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr601966.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu958694.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu958694.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk366664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk366664.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841369.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841369.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 7003⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 7843⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 7963⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 9723⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 9723⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 9963⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 12203⤵
- Program crash
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 12723⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 13283⤵
- Program crash
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 6964⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 8804⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 9724⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 11164⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 9804⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 11364⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 11284⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 10284⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7004⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7564⤵
- Program crash
PID:1724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7604⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 11524⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 16244⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 16444⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 16324⤵
- Program crash
PID:716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 14403⤵
- Program crash
PID:2800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4664 -ip 46641⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4664 -ip 46641⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4664 -ip 46641⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4664 -ip 46641⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4664 -ip 46641⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4664 -ip 46641⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4664 -ip 46641⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4664 -ip 46641⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4664 -ip 46641⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4664 -ip 46641⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4188 -ip 41881⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4188 -ip 41881⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4188 -ip 41881⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4188 -ip 41881⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4188 -ip 41881⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4188 -ip 41881⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4188 -ip 41881⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4188 -ip 41881⤵PID:1036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4188 -ip 41881⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4188 -ip 41881⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4188 -ip 41881⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4188 -ip 41881⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 3242⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4456 -ip 44561⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4188 -ip 41881⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4188 -ip 41881⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4188 -ip 41881⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 3202⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1808 -ip 18081⤵PID:2460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
865KB
MD5248f93bef9dc008373b55fc381c65845
SHA13484875bbbdd4e85dcd32adb5bd14940dc4dbe48
SHA2560aef64cface62e2b643413d84d0ade4c7abf750044db4f13b01f4b04b8f4871f
SHA512a5398148f82c2fdb9e907215debcfd0aa089efc4b8655c462b6a096567a8c881d8865697eeb7cf8ed13cd534c15d7c0ea4da8081e7ed0025c677702a020294fc
-
Filesize
865KB
MD5248f93bef9dc008373b55fc381c65845
SHA13484875bbbdd4e85dcd32adb5bd14940dc4dbe48
SHA2560aef64cface62e2b643413d84d0ade4c7abf750044db4f13b01f4b04b8f4871f
SHA512a5398148f82c2fdb9e907215debcfd0aa089efc4b8655c462b6a096567a8c881d8865697eeb7cf8ed13cd534c15d7c0ea4da8081e7ed0025c677702a020294fc
-
Filesize
169KB
MD5f8c8ff8b49694526684a76a91ee62d68
SHA1aff75f4734062095788dc1e7eb93f0487ed2933e
SHA256610445d556375f26d77aa36805c52373d94c2d99efa71153c9122a066dbbcac0
SHA5128810fc580549f869a9d15e8be377e41737c39bc25bad631b5b90f7cded522875ee894572936338a216c44789b0d51ae642148e948680846d34ce8dfc929eb944
-
Filesize
169KB
MD5f8c8ff8b49694526684a76a91ee62d68
SHA1aff75f4734062095788dc1e7eb93f0487ed2933e
SHA256610445d556375f26d77aa36805c52373d94c2d99efa71153c9122a066dbbcac0
SHA5128810fc580549f869a9d15e8be377e41737c39bc25bad631b5b90f7cded522875ee894572936338a216c44789b0d51ae642148e948680846d34ce8dfc929eb944
-
Filesize
711KB
MD5ebf0a9a18c0c2c3cc5701ff399515ec4
SHA1ad8da931c0370468e7c9ed8897bc0a9b871e911a
SHA256be02d0f17a8f30c3fd16f4d9338a228a5c66e0cbd960049a81a4095efa23ed3a
SHA51211ceb7933cf961df0c49fa99ea05fd5b8d62a3fadb960d26887818c2a5409a34c30f5a093ff7b84064d6f494012171f330e3acd75c7ee1ce743dc3e701da91d2
-
Filesize
711KB
MD5ebf0a9a18c0c2c3cc5701ff399515ec4
SHA1ad8da931c0370468e7c9ed8897bc0a9b871e911a
SHA256be02d0f17a8f30c3fd16f4d9338a228a5c66e0cbd960049a81a4095efa23ed3a
SHA51211ceb7933cf961df0c49fa99ea05fd5b8d62a3fadb960d26887818c2a5409a34c30f5a093ff7b84064d6f494012171f330e3acd75c7ee1ce743dc3e701da91d2
-
Filesize
404KB
MD528123bae8fb2800529c32e7942519e92
SHA1183d6d2ded38523bbc0f0d03ae9aa5952e411d2d
SHA25670d90ebcf2fccf6eb984195f9cbb21581a4034fbf67a938a9d0f336d8c35a476
SHA512d15099c041967a81552e35fd7815147638d4f3de92b19b8ed2a7c62cb3dacbc64c7a3b56f3da9feff43c38bfe6e60a6b69931f094903ce3e9fe27a44377db29e
-
Filesize
404KB
MD528123bae8fb2800529c32e7942519e92
SHA1183d6d2ded38523bbc0f0d03ae9aa5952e411d2d
SHA25670d90ebcf2fccf6eb984195f9cbb21581a4034fbf67a938a9d0f336d8c35a476
SHA512d15099c041967a81552e35fd7815147638d4f3de92b19b8ed2a7c62cb3dacbc64c7a3b56f3da9feff43c38bfe6e60a6b69931f094903ce3e9fe27a44377db29e
-
Filesize
588KB
MD5b41c4fa3f89575d14bbf2123b8c53d69
SHA1b681f1fed6a3b314915408d5427fbd724c6c8b27
SHA256d25fb87e3a996c250b23cc5af10e451cea0ac347679fdee54e59d3620332c701
SHA512778689da732f283e2db98d126b1120765e8d87e6ba85611d45163429cfc7e2191e831a3c52bbdc14287337931e04a2cd6c5eba22aff7779809045dab88f34301
-
Filesize
588KB
MD5b41c4fa3f89575d14bbf2123b8c53d69
SHA1b681f1fed6a3b314915408d5427fbd724c6c8b27
SHA256d25fb87e3a996c250b23cc5af10e451cea0ac347679fdee54e59d3620332c701
SHA512778689da732f283e2db98d126b1120765e8d87e6ba85611d45163429cfc7e2191e831a3c52bbdc14287337931e04a2cd6c5eba22aff7779809045dab88f34301
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1