Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:45
Static task
static1
General
-
Target
5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe
-
Size
1.2MB
-
MD5
fa76487f9e0a991d67492ce368501388
-
SHA1
8cd6be8cc419f261ebc913df2b10bc9a60d26a35
-
SHA256
5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79
-
SHA512
6aed42cfe4f298ad5015bd74728ef42b06fce0c2800542786b467b026e7098be54301315b23758f2b7d1b9d1327443a9569c4d4a765f834ed08e15522467f60f
-
SSDEEP
24576:7yo8NZAdXzJjDIbQHupcqXJU8wtBb51gGyhQ1Q1K9N0EKNpyQRYpmoTe93BRgh/F:ujZoJjDIbBXYlTgGyhQ1Q1WK1pyQYpmy
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr752332.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr752332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr752332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr752332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr752332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr752332.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr752332.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu667964.exesi417348.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation qu667964.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation si417348.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un713645.exeun418003.exepr752332.exequ667964.exe1.exerk196633.exesi417348.exeoneetx.exeoneetx.exeoneetx.exepid process 3928 un713645.exe 3344 un418003.exe 2144 pr752332.exe 2824 qu667964.exe 4252 1.exe 4472 rk196633.exe 4376 si417348.exe 564 oneetx.exe 3756 oneetx.exe 1728 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3340 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr752332.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr752332.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr752332.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exeun713645.exeun418003.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un713645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un713645.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un418003.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un418003.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3988 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 852 4376 WerFault.exe si417348.exe 2308 4376 WerFault.exe si417348.exe 1496 4376 WerFault.exe si417348.exe 1644 4376 WerFault.exe si417348.exe 116 4376 WerFault.exe si417348.exe 2488 4376 WerFault.exe si417348.exe 3788 4376 WerFault.exe si417348.exe 1432 4376 WerFault.exe si417348.exe 3416 4376 WerFault.exe si417348.exe 3712 4376 WerFault.exe si417348.exe 1344 564 WerFault.exe oneetx.exe 5100 564 WerFault.exe oneetx.exe 3376 564 WerFault.exe oneetx.exe 3608 564 WerFault.exe oneetx.exe 2620 564 WerFault.exe oneetx.exe 4324 564 WerFault.exe oneetx.exe 1516 564 WerFault.exe oneetx.exe 1280 564 WerFault.exe oneetx.exe 2356 564 WerFault.exe oneetx.exe 2652 564 WerFault.exe oneetx.exe 4904 564 WerFault.exe oneetx.exe 4344 3756 WerFault.exe oneetx.exe 3928 564 WerFault.exe oneetx.exe 1620 564 WerFault.exe oneetx.exe 4512 564 WerFault.exe oneetx.exe 5116 564 WerFault.exe oneetx.exe 3208 1728 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr752332.exerk196633.exe1.exepid process 2144 pr752332.exe 2144 pr752332.exe 4472 rk196633.exe 4472 rk196633.exe 4252 1.exe 4252 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr752332.exequ667964.exerk196633.exe1.exedescription pid process Token: SeDebugPrivilege 2144 pr752332.exe Token: SeDebugPrivilege 2824 qu667964.exe Token: SeDebugPrivilege 4472 rk196633.exe Token: SeDebugPrivilege 4252 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si417348.exepid process 4376 si417348.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exeun713645.exeun418003.exequ667964.exesi417348.exeoneetx.exedescription pid process target process PID 2176 wrote to memory of 3928 2176 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe un713645.exe PID 2176 wrote to memory of 3928 2176 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe un713645.exe PID 2176 wrote to memory of 3928 2176 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe un713645.exe PID 3928 wrote to memory of 3344 3928 un713645.exe un418003.exe PID 3928 wrote to memory of 3344 3928 un713645.exe un418003.exe PID 3928 wrote to memory of 3344 3928 un713645.exe un418003.exe PID 3344 wrote to memory of 2144 3344 un418003.exe pr752332.exe PID 3344 wrote to memory of 2144 3344 un418003.exe pr752332.exe PID 3344 wrote to memory of 2144 3344 un418003.exe pr752332.exe PID 3344 wrote to memory of 2824 3344 un418003.exe qu667964.exe PID 3344 wrote to memory of 2824 3344 un418003.exe qu667964.exe PID 3344 wrote to memory of 2824 3344 un418003.exe qu667964.exe PID 2824 wrote to memory of 4252 2824 qu667964.exe 1.exe PID 2824 wrote to memory of 4252 2824 qu667964.exe 1.exe PID 2824 wrote to memory of 4252 2824 qu667964.exe 1.exe PID 3928 wrote to memory of 4472 3928 un713645.exe rk196633.exe PID 3928 wrote to memory of 4472 3928 un713645.exe rk196633.exe PID 3928 wrote to memory of 4472 3928 un713645.exe rk196633.exe PID 2176 wrote to memory of 4376 2176 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe si417348.exe PID 2176 wrote to memory of 4376 2176 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe si417348.exe PID 2176 wrote to memory of 4376 2176 5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe si417348.exe PID 4376 wrote to memory of 564 4376 si417348.exe oneetx.exe PID 4376 wrote to memory of 564 4376 si417348.exe oneetx.exe PID 4376 wrote to memory of 564 4376 si417348.exe oneetx.exe PID 564 wrote to memory of 4232 564 oneetx.exe schtasks.exe PID 564 wrote to memory of 4232 564 oneetx.exe schtasks.exe PID 564 wrote to memory of 4232 564 oneetx.exe schtasks.exe PID 564 wrote to memory of 3340 564 oneetx.exe rundll32.exe PID 564 wrote to memory of 3340 564 oneetx.exe rundll32.exe PID 564 wrote to memory of 3340 564 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe"C:\Users\Admin\AppData\Local\Temp\5fc23a6921a81a36a65f8c843e8cc9324a04c64ad485d3cc0b2c315bf4bd5c79.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un713645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un713645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un418003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un418003.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr752332.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr752332.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu667964.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu667964.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk196633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk196633.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si417348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si417348.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7003⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7843⤵
- Program crash
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 8603⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9603⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9803⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9803⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 12203⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 12523⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 13163⤵
- Program crash
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 6964⤵
- Program crash
PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 7964⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 9204⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 10564⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 10764⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 10764⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 11084⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 10004⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 8404⤵
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 12804⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 12524⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 11444⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 16284⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 11044⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 16364⤵
- Program crash
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 13363⤵
- Program crash
PID:3712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4376 -ip 43761⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4376 -ip 43761⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 43761⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4376 -ip 43761⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4376 -ip 43761⤵PID:236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4376 -ip 43761⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4376 -ip 43761⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 43761⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 43761⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4376 -ip 43761⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 564 -ip 5641⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 564 -ip 5641⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 564 -ip 5641⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 564 -ip 5641⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 564 -ip 5641⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 564 -ip 5641⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 564 -ip 5641⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 564 -ip 5641⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 564 -ip 5641⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 564 -ip 5641⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 564 -ip 5641⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 3202⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3756 -ip 37561⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 564 -ip 5641⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 564 -ip 5641⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 564 -ip 5641⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 564 -ip 5641⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 3202⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1728 -ip 17281⤵PID:1292
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
866KB
MD5501c1b34ccd25649e7e8674a7792ab48
SHA1b6381af66626cc4c30b7a2306fe92b099d76082f
SHA25629a60b87a2f72b2d5f715561453353c40e7cf50b0415786e43d19537fadc5b41
SHA512dff86c8392b8b282ef109d97282214729ca44c9d240cd13d6e7ecfbef5a17896214edbf1532c4323e03b63bd7e6b5476616b938d5e011614035660fe3dd92666
-
Filesize
866KB
MD5501c1b34ccd25649e7e8674a7792ab48
SHA1b6381af66626cc4c30b7a2306fe92b099d76082f
SHA25629a60b87a2f72b2d5f715561453353c40e7cf50b0415786e43d19537fadc5b41
SHA512dff86c8392b8b282ef109d97282214729ca44c9d240cd13d6e7ecfbef5a17896214edbf1532c4323e03b63bd7e6b5476616b938d5e011614035660fe3dd92666
-
Filesize
169KB
MD502e225f536c84f180cb34d9169bbe731
SHA10dbd18f42c44ab24dde63c1ccd055716c1f456fa
SHA25606702ebe59e834657c6505e42ad70dabdb92e96d26b8a67ecf6e4062d3db3194
SHA5127fb53dd5ba8f8614a1f2fe44bbe39a593d22309255d5abf86d5cb0cc9348ccc7a11e9c71dd4bda2f2ee0eae395865866dc469674b97d12ebe17ffa43291d68fa
-
Filesize
169KB
MD502e225f536c84f180cb34d9169bbe731
SHA10dbd18f42c44ab24dde63c1ccd055716c1f456fa
SHA25606702ebe59e834657c6505e42ad70dabdb92e96d26b8a67ecf6e4062d3db3194
SHA5127fb53dd5ba8f8614a1f2fe44bbe39a593d22309255d5abf86d5cb0cc9348ccc7a11e9c71dd4bda2f2ee0eae395865866dc469674b97d12ebe17ffa43291d68fa
-
Filesize
712KB
MD506efec3cd0a58e6f0259e1031b6deb91
SHA15f4dc81614695e78457c17cb91b87d21d38d6311
SHA256370997c6cbd3dbf130adc4ef37dc7a7fea544551984a69a4a1633c8d286d69e2
SHA5128746a3201bf6ad08b2cf66f281a58e1cb2635c6ae20a6d1c0850973e93f50a861592036e03c6a3c63b2cb3f9eee3fa01366b01fd44daed37598e01bf86c0594b
-
Filesize
712KB
MD506efec3cd0a58e6f0259e1031b6deb91
SHA15f4dc81614695e78457c17cb91b87d21d38d6311
SHA256370997c6cbd3dbf130adc4ef37dc7a7fea544551984a69a4a1633c8d286d69e2
SHA5128746a3201bf6ad08b2cf66f281a58e1cb2635c6ae20a6d1c0850973e93f50a861592036e03c6a3c63b2cb3f9eee3fa01366b01fd44daed37598e01bf86c0594b
-
Filesize
404KB
MD55101005e0df605dd797c92039dd948b2
SHA1cb175ef284d7e9442a4e2771ec851d23a7e711ae
SHA256a939c2ff2180985944b62ba988e2f2ce86f835b1c827cd56ce2f72f483413c02
SHA51258584ff7e44d8990757999f91cdbe260a9f863b889b6e94a0740c07fdddc65e68c7850167670d87a3d6e608ec328d725a556b9df045bbe4c8627c4bd2c110aa3
-
Filesize
404KB
MD55101005e0df605dd797c92039dd948b2
SHA1cb175ef284d7e9442a4e2771ec851d23a7e711ae
SHA256a939c2ff2180985944b62ba988e2f2ce86f835b1c827cd56ce2f72f483413c02
SHA51258584ff7e44d8990757999f91cdbe260a9f863b889b6e94a0740c07fdddc65e68c7850167670d87a3d6e608ec328d725a556b9df045bbe4c8627c4bd2c110aa3
-
Filesize
588KB
MD5a929a1b7836ad768c7ad04b77916cac4
SHA15c4c3307fff517be7af36a89d40caa72b1bf76d7
SHA256fe2fc81d7b832c97e6f6a17bc3f13795319024ed3fe13dc266775f834a139e4a
SHA5129c819f297a96db12f223e5a563a87163ec6d952abf0aedd5df406f3e4bb203dd9410a9e587a3f2803d4ba1dbf692986c1bd6b1244122e99c6b242601e443658c
-
Filesize
588KB
MD5a929a1b7836ad768c7ad04b77916cac4
SHA15c4c3307fff517be7af36a89d40caa72b1bf76d7
SHA256fe2fc81d7b832c97e6f6a17bc3f13795319024ed3fe13dc266775f834a139e4a
SHA5129c819f297a96db12f223e5a563a87163ec6d952abf0aedd5df406f3e4bb203dd9410a9e587a3f2803d4ba1dbf692986c1bd6b1244122e99c6b242601e443658c
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1