Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 07:55
Static task
static1
General
-
Target
1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe
-
Size
1.0MB
-
MD5
61f41e455af331ac2c4f07b5d8238607
-
SHA1
55f94d1522ef44c9bff1e5b132879f492b7c3a1b
-
SHA256
1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383
-
SHA512
4c27902e86f1df2e4045c896f8579a24dc355c52c683059f015648ccb0509fe1cd7adcdad2ba0dc7667c6974bd292597da804e9073fb6530b4d9172096f1df19
-
SSDEEP
24576:6yYkdhCJASRx+qxRY3qADbIz119F4Q89eF8E71rK:BYoTSRsqPYnIz1zy1UF9
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it721560.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it721560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it721560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it721560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it721560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it721560.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it721560.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr955441.exelr090693.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr955441.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr090693.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziWW4368.exeziPR8689.exeit721560.exejr955441.exe1.exekp662206.exelr090693.exeoneetx.exeoneetx.exeoneetx.exepid process 2324 ziWW4368.exe 3656 ziPR8689.exe 3696 it721560.exe 3832 jr955441.exe 3904 1.exe 4028 kp662206.exe 1964 lr090693.exe 2104 oneetx.exe 2168 oneetx.exe 1980 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2996 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it721560.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it721560.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziWW4368.exeziPR8689.exe1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWW4368.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPR8689.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziPR8689.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWW4368.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4156 1964 WerFault.exe lr090693.exe 3812 1964 WerFault.exe lr090693.exe 2976 1964 WerFault.exe lr090693.exe 3460 1964 WerFault.exe lr090693.exe 428 1964 WerFault.exe lr090693.exe 3584 1964 WerFault.exe lr090693.exe 2548 1964 WerFault.exe lr090693.exe 1960 1964 WerFault.exe lr090693.exe 1980 1964 WerFault.exe lr090693.exe 3432 1964 WerFault.exe lr090693.exe 3692 2104 WerFault.exe oneetx.exe 4484 2104 WerFault.exe oneetx.exe 1544 2104 WerFault.exe oneetx.exe 4784 2104 WerFault.exe oneetx.exe 1456 2104 WerFault.exe oneetx.exe 4624 2104 WerFault.exe oneetx.exe 740 2104 WerFault.exe oneetx.exe 2084 2104 WerFault.exe oneetx.exe 4672 2104 WerFault.exe oneetx.exe 4300 2104 WerFault.exe oneetx.exe 4660 2104 WerFault.exe oneetx.exe 948 2104 WerFault.exe oneetx.exe 2044 2104 WerFault.exe oneetx.exe 3812 2168 WerFault.exe oneetx.exe 2136 2104 WerFault.exe oneetx.exe 4908 2104 WerFault.exe oneetx.exe 2240 2104 WerFault.exe oneetx.exe 4588 1980 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it721560.exekp662206.exe1.exepid process 3696 it721560.exe 3696 it721560.exe 4028 kp662206.exe 3904 1.exe 3904 1.exe 4028 kp662206.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it721560.exejr955441.exekp662206.exe1.exedescription pid process Token: SeDebugPrivilege 3696 it721560.exe Token: SeDebugPrivilege 3832 jr955441.exe Token: SeDebugPrivilege 4028 kp662206.exe Token: SeDebugPrivilege 3904 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr090693.exepid process 1964 lr090693.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exeziWW4368.exeziPR8689.exejr955441.exelr090693.exeoneetx.exedescription pid process target process PID 4424 wrote to memory of 2324 4424 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe ziWW4368.exe PID 4424 wrote to memory of 2324 4424 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe ziWW4368.exe PID 4424 wrote to memory of 2324 4424 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe ziWW4368.exe PID 2324 wrote to memory of 3656 2324 ziWW4368.exe ziPR8689.exe PID 2324 wrote to memory of 3656 2324 ziWW4368.exe ziPR8689.exe PID 2324 wrote to memory of 3656 2324 ziWW4368.exe ziPR8689.exe PID 3656 wrote to memory of 3696 3656 ziPR8689.exe it721560.exe PID 3656 wrote to memory of 3696 3656 ziPR8689.exe it721560.exe PID 3656 wrote to memory of 3832 3656 ziPR8689.exe jr955441.exe PID 3656 wrote to memory of 3832 3656 ziPR8689.exe jr955441.exe PID 3656 wrote to memory of 3832 3656 ziPR8689.exe jr955441.exe PID 3832 wrote to memory of 3904 3832 jr955441.exe 1.exe PID 3832 wrote to memory of 3904 3832 jr955441.exe 1.exe PID 3832 wrote to memory of 3904 3832 jr955441.exe 1.exe PID 2324 wrote to memory of 4028 2324 ziWW4368.exe kp662206.exe PID 2324 wrote to memory of 4028 2324 ziWW4368.exe kp662206.exe PID 2324 wrote to memory of 4028 2324 ziWW4368.exe kp662206.exe PID 4424 wrote to memory of 1964 4424 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe lr090693.exe PID 4424 wrote to memory of 1964 4424 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe lr090693.exe PID 4424 wrote to memory of 1964 4424 1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe lr090693.exe PID 1964 wrote to memory of 2104 1964 lr090693.exe oneetx.exe PID 1964 wrote to memory of 2104 1964 lr090693.exe oneetx.exe PID 1964 wrote to memory of 2104 1964 lr090693.exe oneetx.exe PID 2104 wrote to memory of 1228 2104 oneetx.exe schtasks.exe PID 2104 wrote to memory of 1228 2104 oneetx.exe schtasks.exe PID 2104 wrote to memory of 1228 2104 oneetx.exe schtasks.exe PID 2104 wrote to memory of 2996 2104 oneetx.exe rundll32.exe PID 2104 wrote to memory of 2996 2104 oneetx.exe rundll32.exe PID 2104 wrote to memory of 2996 2104 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe"C:\Users\Admin\AppData\Local\Temp\1e1d30943f7feec9033c18c4e7b7c80fb3b9701e0fb0200ef3785da35f2f0383.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW4368.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW4368.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPR8689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPR8689.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it721560.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it721560.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr955441.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr955441.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp662206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp662206.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr090693.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 7003⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 7523⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8163⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8723⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8683⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 8683⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 12203⤵
- Program crash
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 12323⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 13203⤵
- Program crash
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 6964⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 7924⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 8964⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 10564⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 10564⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 10884⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 10964⤵
- Program crash
PID:740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 9964⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 12924⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 6964⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 13164⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 14324⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 11164⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 16284⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 11164⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 16444⤵
- Program crash
PID:2240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9563⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1964 -ip 19641⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1964 -ip 19641⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1964 -ip 19641⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1964 -ip 19641⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1964 -ip 19641⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1964 -ip 19641⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1964 -ip 19641⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1964 -ip 19641⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1964 -ip 19641⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1964 -ip 19641⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2104 -ip 21041⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2104 -ip 21041⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2104 -ip 21041⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2104 -ip 21041⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2104 -ip 21041⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2104 -ip 21041⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2104 -ip 21041⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2104 -ip 21041⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2104 -ip 21041⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2104 -ip 21041⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2104 -ip 21041⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2104 -ip 21041⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2104 -ip 21041⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 3202⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2168 -ip 21681⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2104 -ip 21041⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2104 -ip 21041⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2104 -ip 21041⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 3202⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1980 -ip 19801⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD5a8a03cfe6e5bb448c86c51ede410ebcb
SHA1554384fe9cd9242f825fe7e9abef711bc3ae1b06
SHA2566cb79d3efe52e9d12ab837c0fb582af05050db3508931e8e77c6e0403701dfce
SHA51244069ee5be77bb954e6d7a4662bd8ee5b6b98339a04666f0a0548cfb1aee1ad3d6c76067a23df2fe366bdb8e8287842cda80a8cad85a57ff7798639efaecd140
-
Filesize
723KB
MD5a8a03cfe6e5bb448c86c51ede410ebcb
SHA1554384fe9cd9242f825fe7e9abef711bc3ae1b06
SHA2566cb79d3efe52e9d12ab837c0fb582af05050db3508931e8e77c6e0403701dfce
SHA51244069ee5be77bb954e6d7a4662bd8ee5b6b98339a04666f0a0548cfb1aee1ad3d6c76067a23df2fe366bdb8e8287842cda80a8cad85a57ff7798639efaecd140
-
Filesize
169KB
MD570a8ced89609849039731d050850a98a
SHA1235925459707764f8843068bdffca318de1a944b
SHA2561c8d2471a91721380460320fd053796bf44a131e9f63591f170f014b28eb8b6f
SHA5126e9b89c99a04398dda651c5a504bd8a1077aad40e95795463488d59b71eb371e736cd055ffd00cbcda81349d691047fde4b5b463d105579166bce4973029d2a1
-
Filesize
169KB
MD570a8ced89609849039731d050850a98a
SHA1235925459707764f8843068bdffca318de1a944b
SHA2561c8d2471a91721380460320fd053796bf44a131e9f63591f170f014b28eb8b6f
SHA5126e9b89c99a04398dda651c5a504bd8a1077aad40e95795463488d59b71eb371e736cd055ffd00cbcda81349d691047fde4b5b463d105579166bce4973029d2a1
-
Filesize
569KB
MD56c291eeef5889c27af9cad2c1688cdc5
SHA18a7e47d38967870e0968b773e4b99878e4fb5569
SHA256ea61c7c42adf8d9d029634ebfc51dcede246ccd13c4759b2ddc61ec1e5d9cad7
SHA5128f67a29ef75db40a58fde3eeb4d9b0a7891f499dd453f9f24128295fd5f74f58dd86370e9db75ce6ed4c4d0db6c53d077877c9b056823c0e9c99663065431c29
-
Filesize
569KB
MD56c291eeef5889c27af9cad2c1688cdc5
SHA18a7e47d38967870e0968b773e4b99878e4fb5569
SHA256ea61c7c42adf8d9d029634ebfc51dcede246ccd13c4759b2ddc61ec1e5d9cad7
SHA5128f67a29ef75db40a58fde3eeb4d9b0a7891f499dd453f9f24128295fd5f74f58dd86370e9db75ce6ed4c4d0db6c53d077877c9b056823c0e9c99663065431c29
-
Filesize
11KB
MD595adaa75d1f251936ef35c401701d559
SHA18b0dc7ca1519fed449e31a232c526c0a16d4a28b
SHA25685b68d17305f0b85c547597acaefe5be746ac4be199c9c0ef74bb2ed16aaf9b5
SHA512dfbda53315891e655b6f9ee107055f06e33fdab03a613514f3f68726a33a77633554c9f280f4c1a0e6aafbf238968c5550f70cfd436dcc3501844a17ae94cc84
-
Filesize
11KB
MD595adaa75d1f251936ef35c401701d559
SHA18b0dc7ca1519fed449e31a232c526c0a16d4a28b
SHA25685b68d17305f0b85c547597acaefe5be746ac4be199c9c0ef74bb2ed16aaf9b5
SHA512dfbda53315891e655b6f9ee107055f06e33fdab03a613514f3f68726a33a77633554c9f280f4c1a0e6aafbf238968c5550f70cfd436dcc3501844a17ae94cc84
-
Filesize
588KB
MD53d4cf23055d7b49e32269fd417994c3b
SHA1305cb5bb62473d94edbcd2e06af528f8dad4199b
SHA2567ae7822592238869ec5cec8bba608352790caa82447f5dbef86f4198e882210c
SHA512a26b03556038d6f90870a59432c17a5896465a1845b85455cd3cd46979c7ae55f75bd87177f67a6005a51596b0bcc4744c504461f7ee214adb3f557238f4833a
-
Filesize
588KB
MD53d4cf23055d7b49e32269fd417994c3b
SHA1305cb5bb62473d94edbcd2e06af528f8dad4199b
SHA2567ae7822592238869ec5cec8bba608352790caa82447f5dbef86f4198e882210c
SHA512a26b03556038d6f90870a59432c17a5896465a1845b85455cd3cd46979c7ae55f75bd87177f67a6005a51596b0bcc4744c504461f7ee214adb3f557238f4833a
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1