Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:03
Static task
static1
General
-
Target
9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe
-
Size
1.0MB
-
MD5
f431529805fa50f0c8b930408a8e0bb6
-
SHA1
d9e100db6852a77743241950ee9f1441bd52a5e1
-
SHA256
9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7
-
SHA512
c4fdf3d45e7050ead81cb808e61a577866c1a2f40919b358c16bd3e639ad9e183b53b606fa6f23cbee22e3bdd8208a9f9de78107e0e6e762de94fee1ebced1bb
-
SSDEEP
24576:FylbtL4elv6NpO5U88QC1n9VsAUfF35mfADG7l33eMiWC7jtsh8Umly:glb7v6TO5h8QC19ChftwADalekCtC8p
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it888976.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it888976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it888976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it888976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it888976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it888976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it888976.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr526561.exelr674212.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr526561.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr674212.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziWg8458.exezioh9752.exeit888976.exejr526561.exe1.exekp096180.exelr674212.exeoneetx.exeoneetx.exeoneetx.exepid process 748 ziWg8458.exe 4176 zioh9752.exe 368 it888976.exe 3624 jr526561.exe 5100 1.exe 2624 kp096180.exe 4136 lr674212.exe 1344 oneetx.exe 2292 oneetx.exe 4964 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2028 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it888976.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it888976.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zioh9752.exe9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exeziWg8458.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zioh9752.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWg8458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWg8458.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zioh9752.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1216 4136 WerFault.exe lr674212.exe 1208 4136 WerFault.exe lr674212.exe 1320 4136 WerFault.exe lr674212.exe 4380 4136 WerFault.exe lr674212.exe 4460 4136 WerFault.exe lr674212.exe 452 4136 WerFault.exe lr674212.exe 432 4136 WerFault.exe lr674212.exe 3920 4136 WerFault.exe lr674212.exe 1796 4136 WerFault.exe lr674212.exe 2184 4136 WerFault.exe lr674212.exe 2024 1344 WerFault.exe oneetx.exe 1916 1344 WerFault.exe oneetx.exe 3700 1344 WerFault.exe oneetx.exe 3816 1344 WerFault.exe oneetx.exe 3420 1344 WerFault.exe oneetx.exe 1376 1344 WerFault.exe oneetx.exe 1184 1344 WerFault.exe oneetx.exe 3360 1344 WerFault.exe oneetx.exe 3828 1344 WerFault.exe oneetx.exe 1480 1344 WerFault.exe oneetx.exe 3688 1344 WerFault.exe oneetx.exe 5004 2292 WerFault.exe oneetx.exe 3344 1344 WerFault.exe oneetx.exe 228 1344 WerFault.exe oneetx.exe 4660 1344 WerFault.exe oneetx.exe 3848 4964 WerFault.exe oneetx.exe 1440 1344 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it888976.exekp096180.exe1.exepid process 368 it888976.exe 368 it888976.exe 2624 kp096180.exe 5100 1.exe 2624 kp096180.exe 5100 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it888976.exejr526561.exekp096180.exe1.exedescription pid process Token: SeDebugPrivilege 368 it888976.exe Token: SeDebugPrivilege 3624 jr526561.exe Token: SeDebugPrivilege 2624 kp096180.exe Token: SeDebugPrivilege 5100 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr674212.exepid process 4136 lr674212.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exeziWg8458.exezioh9752.exejr526561.exelr674212.exeoneetx.exedescription pid process target process PID 4208 wrote to memory of 748 4208 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe ziWg8458.exe PID 4208 wrote to memory of 748 4208 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe ziWg8458.exe PID 4208 wrote to memory of 748 4208 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe ziWg8458.exe PID 748 wrote to memory of 4176 748 ziWg8458.exe zioh9752.exe PID 748 wrote to memory of 4176 748 ziWg8458.exe zioh9752.exe PID 748 wrote to memory of 4176 748 ziWg8458.exe zioh9752.exe PID 4176 wrote to memory of 368 4176 zioh9752.exe it888976.exe PID 4176 wrote to memory of 368 4176 zioh9752.exe it888976.exe PID 4176 wrote to memory of 3624 4176 zioh9752.exe jr526561.exe PID 4176 wrote to memory of 3624 4176 zioh9752.exe jr526561.exe PID 4176 wrote to memory of 3624 4176 zioh9752.exe jr526561.exe PID 3624 wrote to memory of 5100 3624 jr526561.exe 1.exe PID 3624 wrote to memory of 5100 3624 jr526561.exe 1.exe PID 3624 wrote to memory of 5100 3624 jr526561.exe 1.exe PID 748 wrote to memory of 2624 748 ziWg8458.exe kp096180.exe PID 748 wrote to memory of 2624 748 ziWg8458.exe kp096180.exe PID 748 wrote to memory of 2624 748 ziWg8458.exe kp096180.exe PID 4208 wrote to memory of 4136 4208 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe lr674212.exe PID 4208 wrote to memory of 4136 4208 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe lr674212.exe PID 4208 wrote to memory of 4136 4208 9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe lr674212.exe PID 4136 wrote to memory of 1344 4136 lr674212.exe oneetx.exe PID 4136 wrote to memory of 1344 4136 lr674212.exe oneetx.exe PID 4136 wrote to memory of 1344 4136 lr674212.exe oneetx.exe PID 1344 wrote to memory of 772 1344 oneetx.exe schtasks.exe PID 1344 wrote to memory of 772 1344 oneetx.exe schtasks.exe PID 1344 wrote to memory of 772 1344 oneetx.exe schtasks.exe PID 1344 wrote to memory of 2028 1344 oneetx.exe rundll32.exe PID 1344 wrote to memory of 2028 1344 oneetx.exe rundll32.exe PID 1344 wrote to memory of 2028 1344 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe"C:\Users\Admin\AppData\Local\Temp\9f8a7924e66e8411ced4a039b0548afddadd4fd99a8698e2fa1c51e1d7d10bd7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWg8458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWg8458.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioh9752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioh9752.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it888976.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it888976.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr526561.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr526561.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp096180.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp096180.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr674212.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr674212.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 7003⤵
- Program crash
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 7563⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 8603⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 8643⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 9763⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 9763⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 12203⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 12683⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13203⤵
- Program crash
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6964⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 8404⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 9244⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 10564⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 10764⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 11124⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 11364⤵
- Program crash
PID:1184
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 9964⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7484⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7604⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 9924⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 11524⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 16044⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 11284⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 16204⤵
- Program crash
PID:1440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 14363⤵
- Program crash
PID:2184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4136 -ip 41361⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4136 -ip 41361⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4136 -ip 41361⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4136 -ip 41361⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4136 -ip 41361⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4136 -ip 41361⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4136 -ip 41361⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4136 -ip 41361⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4136 -ip 41361⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4136 -ip 41361⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1344 -ip 13441⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1344 -ip 13441⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1344 -ip 13441⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1344 -ip 13441⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1344 -ip 13441⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1344 -ip 13441⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1344 -ip 13441⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1344 -ip 13441⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1344 -ip 13441⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1344 -ip 13441⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1344 -ip 13441⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 3242⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2292 -ip 22921⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1344 -ip 13441⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1344 -ip 13441⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1344 -ip 13441⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 3162⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4964 -ip 49641⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1344 -ip 13441⤵PID:4124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
724KB
MD58a7a07e0c8fe0b3dea6a4247683620f4
SHA1b96b39fec0c1d37176956460477d7a680c016144
SHA25667943f4e92d560ae1879537e447bc9f84840ea3b8a1b5eeb039ff1958d8c5f51
SHA512e727ddd8dff4718ff1fe881bdc8a1ea904238cd5540e2947578633537bf1574950282d80303beec43362f272fe4860e9eb673a5fc34dec91a6407ec2feba063d
-
Filesize
724KB
MD58a7a07e0c8fe0b3dea6a4247683620f4
SHA1b96b39fec0c1d37176956460477d7a680c016144
SHA25667943f4e92d560ae1879537e447bc9f84840ea3b8a1b5eeb039ff1958d8c5f51
SHA512e727ddd8dff4718ff1fe881bdc8a1ea904238cd5540e2947578633537bf1574950282d80303beec43362f272fe4860e9eb673a5fc34dec91a6407ec2feba063d
-
Filesize
169KB
MD5011462146394f5cac0c2199d3ceb3ea5
SHA1b0a0b3419309275907c112ea9c5d054b5406af8d
SHA256b53faca2074a7bc4ac5f5dd649c2aa3d594db72e8bd7c1053b61dbf082eececb
SHA5122173b99fc4507fad6c586297325b84b3ff422018d4b2223c83a153566c4091035f2423d22f4b538eff7a6cd26abf1f41d11898eadaae5323df4148ac2be68cb3
-
Filesize
169KB
MD5011462146394f5cac0c2199d3ceb3ea5
SHA1b0a0b3419309275907c112ea9c5d054b5406af8d
SHA256b53faca2074a7bc4ac5f5dd649c2aa3d594db72e8bd7c1053b61dbf082eececb
SHA5122173b99fc4507fad6c586297325b84b3ff422018d4b2223c83a153566c4091035f2423d22f4b538eff7a6cd26abf1f41d11898eadaae5323df4148ac2be68cb3
-
Filesize
569KB
MD57ff929ba89472004bf5b221f30433571
SHA19d65254f93fa0b8a472cab4073cf341767d2ba2e
SHA256a252c916055b3edb23d0059912ff9c088413f389d9f5d30b060019e8fd94ef0d
SHA512e0f3e92472127b6e016179792e7ee9c328e83f399aab5fc32f3d6fbbf4277878feeb78fe294ad5dd4cf63290c22db70e158e826e012b69a9d99e9a4d30ea4f56
-
Filesize
569KB
MD57ff929ba89472004bf5b221f30433571
SHA19d65254f93fa0b8a472cab4073cf341767d2ba2e
SHA256a252c916055b3edb23d0059912ff9c088413f389d9f5d30b060019e8fd94ef0d
SHA512e0f3e92472127b6e016179792e7ee9c328e83f399aab5fc32f3d6fbbf4277878feeb78fe294ad5dd4cf63290c22db70e158e826e012b69a9d99e9a4d30ea4f56
-
Filesize
11KB
MD571a0f2ad74e9f1e6b4d97d37b332421b
SHA19beac6ca08d9049647cc8c16a465f615766d5971
SHA256b03dc861feaef3aae851e0adc086fd19afaaf51255217652319d9abd77cb6662
SHA512b183496eb9402d08ba9a8a5913b6e1d24275acae041d7260472839f120c6bc8d13a1e53a4f8dceacf9288b608acc3e35b138c90ef9e34ecc91598dfd71d75ff1
-
Filesize
11KB
MD571a0f2ad74e9f1e6b4d97d37b332421b
SHA19beac6ca08d9049647cc8c16a465f615766d5971
SHA256b03dc861feaef3aae851e0adc086fd19afaaf51255217652319d9abd77cb6662
SHA512b183496eb9402d08ba9a8a5913b6e1d24275acae041d7260472839f120c6bc8d13a1e53a4f8dceacf9288b608acc3e35b138c90ef9e34ecc91598dfd71d75ff1
-
Filesize
588KB
MD52de48c8886dffbf8ed0edc23b608464e
SHA1fdcafab25a71269472a7f4242aefc4272ede3ef4
SHA256716ef3d20b7498a4c0a185cb6f2c03de3053b3466577040e0199cdedb901d1c8
SHA5125a052cfd7b6688a8292c34400a58d1e09942ecd8623b2ef3100bf3aab7da172ccaea8c4f7e1b4be09b13d551b31687df6d8872f11ff0183e55ca79368fd72d50
-
Filesize
588KB
MD52de48c8886dffbf8ed0edc23b608464e
SHA1fdcafab25a71269472a7f4242aefc4272ede3ef4
SHA256716ef3d20b7498a4c0a185cb6f2c03de3053b3466577040e0199cdedb901d1c8
SHA5125a052cfd7b6688a8292c34400a58d1e09942ecd8623b2ef3100bf3aab7da172ccaea8c4f7e1b4be09b13d551b31687df6d8872f11ff0183e55ca79368fd72d50
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1