Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:48
Static task
static1
General
-
Target
951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe
-
Size
1.0MB
-
MD5
d9efda43b745339954f8e8066e8d20e4
-
SHA1
6ffc28ff4088dbf6bb74280ac24b7e82b970a69f
-
SHA256
951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0
-
SHA512
821a072189fdc854b2562fcee9fcd4758f1aa4bd527ce3b2754c4806b109333b48f24d85401a9d6362a2a95d2b5e9e4005fe6a2c24d6daefb35ac6679dc1f95a
-
SSDEEP
24576:RypdFSfRQfKINXY1n9/QSMi2vZuX/VSh32I/Gi2:Ep7SfRQfzNXY1949TZuXsh32YD
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it201551.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it201551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it201551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it201551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it201551.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it201551.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it201551.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lr694347.exeoneetx.exejr173754.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation lr694347.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation jr173754.exe -
Executes dropped EXE 10 IoCs
Processes:
zifY0781.exezioC3930.exeit201551.exejr173754.exe1.exekp991597.exelr694347.exeoneetx.exeoneetx.exeoneetx.exepid process 484 zifY0781.exe 4664 zioC3930.exe 2172 it201551.exe 3156 jr173754.exe 4072 1.exe 548 kp991597.exe 4084 lr694347.exe 4276 oneetx.exe 1964 oneetx.exe 4524 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2508 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it201551.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it201551.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zifY0781.exezioC3930.exe951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zifY0781.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zioC3930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zioC3930.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zifY0781.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4976 4084 WerFault.exe lr694347.exe 452 4084 WerFault.exe lr694347.exe 444 4084 WerFault.exe lr694347.exe 3232 4084 WerFault.exe lr694347.exe 1652 4084 WerFault.exe lr694347.exe 868 4084 WerFault.exe lr694347.exe 4532 4084 WerFault.exe lr694347.exe 432 4084 WerFault.exe lr694347.exe 1540 4084 WerFault.exe lr694347.exe 2940 4084 WerFault.exe lr694347.exe 4608 4276 WerFault.exe oneetx.exe 228 4276 WerFault.exe oneetx.exe 4136 4276 WerFault.exe oneetx.exe 760 4276 WerFault.exe oneetx.exe 2180 4276 WerFault.exe oneetx.exe 2876 4276 WerFault.exe oneetx.exe 2660 4276 WerFault.exe oneetx.exe 1460 4276 WerFault.exe oneetx.exe 1772 4276 WerFault.exe oneetx.exe 3988 4276 WerFault.exe oneetx.exe 4432 4276 WerFault.exe oneetx.exe 1376 4276 WerFault.exe oneetx.exe 1368 1964 WerFault.exe oneetx.exe 1184 4276 WerFault.exe oneetx.exe 4288 4276 WerFault.exe oneetx.exe 2624 4276 WerFault.exe oneetx.exe 2972 4524 WerFault.exe oneetx.exe 4956 4276 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it201551.exe1.exekp991597.exepid process 2172 it201551.exe 2172 it201551.exe 4072 1.exe 4072 1.exe 548 kp991597.exe 548 kp991597.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it201551.exejr173754.exe1.exekp991597.exedescription pid process Token: SeDebugPrivilege 2172 it201551.exe Token: SeDebugPrivilege 3156 jr173754.exe Token: SeDebugPrivilege 4072 1.exe Token: SeDebugPrivilege 548 kp991597.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr694347.exepid process 4084 lr694347.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exezifY0781.exezioC3930.exejr173754.exelr694347.exeoneetx.exedescription pid process target process PID 4412 wrote to memory of 484 4412 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe zifY0781.exe PID 4412 wrote to memory of 484 4412 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe zifY0781.exe PID 4412 wrote to memory of 484 4412 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe zifY0781.exe PID 484 wrote to memory of 4664 484 zifY0781.exe zioC3930.exe PID 484 wrote to memory of 4664 484 zifY0781.exe zioC3930.exe PID 484 wrote to memory of 4664 484 zifY0781.exe zioC3930.exe PID 4664 wrote to memory of 2172 4664 zioC3930.exe it201551.exe PID 4664 wrote to memory of 2172 4664 zioC3930.exe it201551.exe PID 4664 wrote to memory of 3156 4664 zioC3930.exe jr173754.exe PID 4664 wrote to memory of 3156 4664 zioC3930.exe jr173754.exe PID 4664 wrote to memory of 3156 4664 zioC3930.exe jr173754.exe PID 3156 wrote to memory of 4072 3156 jr173754.exe 1.exe PID 3156 wrote to memory of 4072 3156 jr173754.exe 1.exe PID 3156 wrote to memory of 4072 3156 jr173754.exe 1.exe PID 484 wrote to memory of 548 484 zifY0781.exe kp991597.exe PID 484 wrote to memory of 548 484 zifY0781.exe kp991597.exe PID 484 wrote to memory of 548 484 zifY0781.exe kp991597.exe PID 4412 wrote to memory of 4084 4412 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe lr694347.exe PID 4412 wrote to memory of 4084 4412 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe lr694347.exe PID 4412 wrote to memory of 4084 4412 951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe lr694347.exe PID 4084 wrote to memory of 4276 4084 lr694347.exe oneetx.exe PID 4084 wrote to memory of 4276 4084 lr694347.exe oneetx.exe PID 4084 wrote to memory of 4276 4084 lr694347.exe oneetx.exe PID 4276 wrote to memory of 812 4276 oneetx.exe schtasks.exe PID 4276 wrote to memory of 812 4276 oneetx.exe schtasks.exe PID 4276 wrote to memory of 812 4276 oneetx.exe schtasks.exe PID 4276 wrote to memory of 2508 4276 oneetx.exe rundll32.exe PID 4276 wrote to memory of 2508 4276 oneetx.exe rundll32.exe PID 4276 wrote to memory of 2508 4276 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe"C:\Users\Admin\AppData\Local\Temp\951c23bdc8163f306904c3dc8578773c66fdaa2304444de92ecff29f36bab8d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifY0781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifY0781.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioC3930.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioC3930.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it201551.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it201551.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr173754.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr173754.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp991597.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp991597.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr694347.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr694347.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7003⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7683⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7963⤵
- Program crash
PID:444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 9643⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7963⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7963⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 12243⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 12163⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 13203⤵
- Program crash
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6964⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 8244⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 8724⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10524⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10764⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10524⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10764⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9964⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 7604⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6964⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 12324⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 14284⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11164⤵
- Program crash
PID:1184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 15964⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 16244⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 15844⤵
- Program crash
PID:4956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 13643⤵
- Program crash
PID:2940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4084 -ip 40841⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4084 -ip 40841⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4084 -ip 40841⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4084 -ip 40841⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4084 -ip 40841⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4084 -ip 40841⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4084 -ip 40841⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4084 -ip 40841⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4084 -ip 40841⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4084 -ip 40841⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4276 -ip 42761⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4276 -ip 42761⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4276 -ip 42761⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4276 -ip 42761⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4276 -ip 42761⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4276 -ip 42761⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4276 -ip 42761⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4276 -ip 42761⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4276 -ip 42761⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4276 -ip 42761⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4276 -ip 42761⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4276 -ip 42761⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 3162⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1964 -ip 19641⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4276 -ip 42761⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4276 -ip 42761⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4276 -ip 42761⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 3162⤵
- Program crash
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4524 -ip 45241⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4276 -ip 42761⤵PID:5100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD5d053ecbbbea06c8ec509f9a7f68fe65d
SHA19f19581cd5c5e893b07ff73eff2957230161f2bc
SHA2564fd06aefefba653182d4a070d28aa30fce0f25e06117595f0875e56e437dce3b
SHA512b15d223d0b01ff6be7c80324f3efba3f3bdec5e4c5f52a176bbd526059d8fd22144e69f1a703be9d218f6da21da2e1a9abad3184f79294a333eac6b9ce7eb526
-
Filesize
723KB
MD5d053ecbbbea06c8ec509f9a7f68fe65d
SHA19f19581cd5c5e893b07ff73eff2957230161f2bc
SHA2564fd06aefefba653182d4a070d28aa30fce0f25e06117595f0875e56e437dce3b
SHA512b15d223d0b01ff6be7c80324f3efba3f3bdec5e4c5f52a176bbd526059d8fd22144e69f1a703be9d218f6da21da2e1a9abad3184f79294a333eac6b9ce7eb526
-
Filesize
169KB
MD537c991d398e936b6a3012e70f042dfe8
SHA17476983f6d4a2a92648d8c580918df165cdb1daa
SHA2564718d9af41d5975ffcaef7d598ea301171f4cf93b5459e5e46b9ea00ece69d38
SHA512f8ed2cf05b2be46adacf675082d1c60e2865535dba0dad67135d76ceeef309b31f4c762a929914c62644da1533552230bf8821ac852811a70dc6bb7c6e3e4f48
-
Filesize
169KB
MD537c991d398e936b6a3012e70f042dfe8
SHA17476983f6d4a2a92648d8c580918df165cdb1daa
SHA2564718d9af41d5975ffcaef7d598ea301171f4cf93b5459e5e46b9ea00ece69d38
SHA512f8ed2cf05b2be46adacf675082d1c60e2865535dba0dad67135d76ceeef309b31f4c762a929914c62644da1533552230bf8821ac852811a70dc6bb7c6e3e4f48
-
Filesize
569KB
MD57c6fcf45caf735849c2fcb9dfdc76ded
SHA1d522535c7965843fc33504c0d5c260c5bbb838fc
SHA256b2644ea8e7c9af69bf20bde84042c7a3b7796ee90e052c8d774d3de2cda4c27e
SHA512ba35d52b95ade34aeb683d26bf28b5dedb87ba63ec5672406930e1b22653244e182e4aca94b1ba42aed80daf098eff3a37b9cbeae2a6661b85f8c418750e80d7
-
Filesize
569KB
MD57c6fcf45caf735849c2fcb9dfdc76ded
SHA1d522535c7965843fc33504c0d5c260c5bbb838fc
SHA256b2644ea8e7c9af69bf20bde84042c7a3b7796ee90e052c8d774d3de2cda4c27e
SHA512ba35d52b95ade34aeb683d26bf28b5dedb87ba63ec5672406930e1b22653244e182e4aca94b1ba42aed80daf098eff3a37b9cbeae2a6661b85f8c418750e80d7
-
Filesize
11KB
MD561872a7c5cf534c03d05b0e096e5f9b2
SHA12501bcbe455f5bf150a95a14effeefc6066f90f7
SHA256b04bce68a0e953ece0c95ea3ac16e1327fb75c74b7bc644a43907ff4532356dd
SHA512a6a08932eb178ea495138be82bb757bbdf89fa13cc9c589b1893e9b69cf2afb0f7db0b88d071468344f6008365755a92a46fd13ffbca2dc8e1c06ce5aa20e784
-
Filesize
11KB
MD561872a7c5cf534c03d05b0e096e5f9b2
SHA12501bcbe455f5bf150a95a14effeefc6066f90f7
SHA256b04bce68a0e953ece0c95ea3ac16e1327fb75c74b7bc644a43907ff4532356dd
SHA512a6a08932eb178ea495138be82bb757bbdf89fa13cc9c589b1893e9b69cf2afb0f7db0b88d071468344f6008365755a92a46fd13ffbca2dc8e1c06ce5aa20e784
-
Filesize
588KB
MD52293cfd9602bc29c2918dbb4e463a35f
SHA12b41ba196d77571a6885e79d1fc08ac6074dc8e4
SHA256e44d93496a64c4a89e80465f1e7dabefcca4c34c03f687daf3d80ffbe8c80f12
SHA512414cc97954b855728afe592bd89c8db5a665e8e8676962f85a36a0c6bba63b57d9a7dba41f2b201af93d7d383f744a951f536ea5bd12b35f6276d66c69352773
-
Filesize
588KB
MD52293cfd9602bc29c2918dbb4e463a35f
SHA12b41ba196d77571a6885e79d1fc08ac6074dc8e4
SHA256e44d93496a64c4a89e80465f1e7dabefcca4c34c03f687daf3d80ffbe8c80f12
SHA512414cc97954b855728afe592bd89c8db5a665e8e8676962f85a36a0c6bba63b57d9a7dba41f2b201af93d7d383f744a951f536ea5bd12b35f6276d66c69352773
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1