Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:07
Static task
static1
General
-
Target
dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe
-
Size
1.0MB
-
MD5
6da389d101577367705d57d5b1aacc6f
-
SHA1
fa64956414a375a07cfe772bec245d37a372d992
-
SHA256
dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895
-
SHA512
89de50c977c267167f8daa37a8f0af42480b00721f922935bd6ce2a5b7d60f0399b737fa76a305cf99dfd55387225716d815c3e1b77878dd6fe1829feb0be6bc
-
SSDEEP
24576:gybh7ZSNveyt6DAS1K9iFiETDCxemSeppolLzz:nbh7ZSNveyIDAS1W0j/CwOpp+L
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it924290.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it924290.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it924290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it924290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it924290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it924290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it924290.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr875249.exelr252473.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation jr875249.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr252473.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziGI9940.exeziSy3799.exeit924290.exejr875249.exe1.exekp718942.exelr252473.exeoneetx.exeoneetx.exeoneetx.exepid process 2120 ziGI9940.exe 2776 ziSy3799.exe 2352 it924290.exe 1324 jr875249.exe 4180 1.exe 2796 kp718942.exe 2292 lr252473.exe 2956 oneetx.exe 1308 oneetx.exe 2468 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2604 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it924290.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it924290.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziGI9940.exeziSy3799.exedadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGI9940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGI9940.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziSy3799.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziSy3799.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 376 2292 WerFault.exe lr252473.exe 2220 2292 WerFault.exe lr252473.exe 3352 2292 WerFault.exe lr252473.exe 3040 2292 WerFault.exe lr252473.exe 4060 2292 WerFault.exe lr252473.exe 4064 2292 WerFault.exe lr252473.exe 2244 2292 WerFault.exe lr252473.exe 3296 2292 WerFault.exe lr252473.exe 1588 2292 WerFault.exe lr252473.exe 4804 2292 WerFault.exe lr252473.exe 4760 2956 WerFault.exe oneetx.exe 2680 2956 WerFault.exe oneetx.exe 4720 2956 WerFault.exe oneetx.exe 5092 2956 WerFault.exe oneetx.exe 4972 2956 WerFault.exe oneetx.exe 4688 2956 WerFault.exe oneetx.exe 2696 2956 WerFault.exe oneetx.exe 4640 2956 WerFault.exe oneetx.exe 1664 2956 WerFault.exe oneetx.exe 1488 2956 WerFault.exe oneetx.exe 2960 2956 WerFault.exe oneetx.exe 1288 2956 WerFault.exe oneetx.exe 4500 2956 WerFault.exe oneetx.exe 3272 1308 WerFault.exe oneetx.exe 3280 2956 WerFault.exe oneetx.exe 4364 2956 WerFault.exe oneetx.exe 4552 2956 WerFault.exe oneetx.exe 3372 2468 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it924290.exekp718942.exe1.exepid process 2352 it924290.exe 2352 it924290.exe 2796 kp718942.exe 4180 1.exe 4180 1.exe 2796 kp718942.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it924290.exejr875249.exekp718942.exe1.exedescription pid process Token: SeDebugPrivilege 2352 it924290.exe Token: SeDebugPrivilege 1324 jr875249.exe Token: SeDebugPrivilege 2796 kp718942.exe Token: SeDebugPrivilege 4180 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr252473.exepid process 2292 lr252473.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exeziGI9940.exeziSy3799.exejr875249.exelr252473.exeoneetx.exedescription pid process target process PID 4108 wrote to memory of 2120 4108 dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe ziGI9940.exe PID 4108 wrote to memory of 2120 4108 dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe ziGI9940.exe PID 4108 wrote to memory of 2120 4108 dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe ziGI9940.exe PID 2120 wrote to memory of 2776 2120 ziGI9940.exe ziSy3799.exe PID 2120 wrote to memory of 2776 2120 ziGI9940.exe ziSy3799.exe PID 2120 wrote to memory of 2776 2120 ziGI9940.exe ziSy3799.exe PID 2776 wrote to memory of 2352 2776 ziSy3799.exe it924290.exe PID 2776 wrote to memory of 2352 2776 ziSy3799.exe it924290.exe PID 2776 wrote to memory of 1324 2776 ziSy3799.exe jr875249.exe PID 2776 wrote to memory of 1324 2776 ziSy3799.exe jr875249.exe PID 2776 wrote to memory of 1324 2776 ziSy3799.exe jr875249.exe PID 1324 wrote to memory of 4180 1324 jr875249.exe 1.exe PID 1324 wrote to memory of 4180 1324 jr875249.exe 1.exe PID 1324 wrote to memory of 4180 1324 jr875249.exe 1.exe PID 2120 wrote to memory of 2796 2120 ziGI9940.exe kp718942.exe PID 2120 wrote to memory of 2796 2120 ziGI9940.exe kp718942.exe PID 2120 wrote to memory of 2796 2120 ziGI9940.exe kp718942.exe PID 4108 wrote to memory of 2292 4108 dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe lr252473.exe PID 4108 wrote to memory of 2292 4108 dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe lr252473.exe PID 4108 wrote to memory of 2292 4108 dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe lr252473.exe PID 2292 wrote to memory of 2956 2292 lr252473.exe oneetx.exe PID 2292 wrote to memory of 2956 2292 lr252473.exe oneetx.exe PID 2292 wrote to memory of 2956 2292 lr252473.exe oneetx.exe PID 2956 wrote to memory of 4832 2956 oneetx.exe schtasks.exe PID 2956 wrote to memory of 4832 2956 oneetx.exe schtasks.exe PID 2956 wrote to memory of 4832 2956 oneetx.exe schtasks.exe PID 2956 wrote to memory of 2604 2956 oneetx.exe rundll32.exe PID 2956 wrote to memory of 2604 2956 oneetx.exe rundll32.exe PID 2956 wrote to memory of 2604 2956 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe"C:\Users\Admin\AppData\Local\Temp\dadc99768f8bc5a6b4f76f72daa767022e171e35eb873d2de37a56efc0200895.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGI9940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGI9940.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziSy3799.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziSy3799.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it924290.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it924290.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr875249.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr875249.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp718942.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp718942.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr252473.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr252473.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 7003⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 7843⤵
- Program crash
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 8603⤵
- Program crash
PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 9643⤵
- Program crash
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 10043⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 9723⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 12203⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 12683⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 13363⤵
- Program crash
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 6964⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 8524⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 9164⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 10564⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 11004⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 10564⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 10764⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 9964⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 7804⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 7484⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 9324⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 14364⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 10684⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 16364⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 10804⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 16524⤵
- Program crash
PID:4552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 13683⤵
- Program crash
PID:4804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2292 -ip 22921⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2292 -ip 22921⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2292 -ip 22921⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2292 -ip 22921⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2292 -ip 22921⤵PID:788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2292 -ip 22921⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2292 -ip 22921⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2292 -ip 22921⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2292 -ip 22921⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2292 -ip 22921⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2956 -ip 29561⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2956 -ip 29561⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2956 -ip 29561⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2956 -ip 29561⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2956 -ip 29561⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2956 -ip 29561⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2956 -ip 29561⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2956 -ip 29561⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2956 -ip 29561⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2956 -ip 29561⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2956 -ip 29561⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2956 -ip 29561⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2956 -ip 29561⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 3162⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1308 -ip 13081⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2956 -ip 29561⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2956 -ip 29561⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2956 -ip 29561⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 3202⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2468 -ip 24681⤵PID:3340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD5e6d7a5cea6d7c4c884f18c314e767f64
SHA15ce72bdf93f1c5f775e3113eb4420c73c8802ade
SHA25684826dd50022443523b951082f2b8b02d3e3767a944ea61e755df7780597ca6b
SHA512ec79b869ff598de73e650db9704ed863aff2bb23c989b4731195957ba2d5fb2b204b08e029098edff92ec7c81221f8a2addac6952df26db15edc1cb8124d6768
-
Filesize
723KB
MD5e6d7a5cea6d7c4c884f18c314e767f64
SHA15ce72bdf93f1c5f775e3113eb4420c73c8802ade
SHA25684826dd50022443523b951082f2b8b02d3e3767a944ea61e755df7780597ca6b
SHA512ec79b869ff598de73e650db9704ed863aff2bb23c989b4731195957ba2d5fb2b204b08e029098edff92ec7c81221f8a2addac6952df26db15edc1cb8124d6768
-
Filesize
169KB
MD5f2e3b1ceb6fe66f90ebd1e22d48e28d8
SHA12d5712514c71c4475b2a2a16ef8bb3d3983c837a
SHA2564ee1602b217f22b4a53da50cf40dd6a0fe8d7cb0c1dc1a586495b92f20c00de3
SHA5129e3855d0a6231b02480652317978fd07440ab5116aad5d5fc1876632e5d76132e728d66c18cb398b652042f92f4d7bf5e801893ab557cd73ac70a80abd0f7b25
-
Filesize
169KB
MD5f2e3b1ceb6fe66f90ebd1e22d48e28d8
SHA12d5712514c71c4475b2a2a16ef8bb3d3983c837a
SHA2564ee1602b217f22b4a53da50cf40dd6a0fe8d7cb0c1dc1a586495b92f20c00de3
SHA5129e3855d0a6231b02480652317978fd07440ab5116aad5d5fc1876632e5d76132e728d66c18cb398b652042f92f4d7bf5e801893ab557cd73ac70a80abd0f7b25
-
Filesize
570KB
MD51bc215ade6bd1aad1c9e8cef2a978525
SHA1bf4454c79cd7f9596e48b5766a5676974a1162eb
SHA256be63c9f2ea58f28407b54fd63cdcd6818f23f1623f979f3cd1daaa96c74c7420
SHA5121e0d70e10d9580bee1e60ea75f74279ade7fbee040b6acd2caf2cb5653a05b0487e51590a7348f1cb45ccbd2aa714a3710a21aefb40e06e8fa4dec49c39b41fb
-
Filesize
570KB
MD51bc215ade6bd1aad1c9e8cef2a978525
SHA1bf4454c79cd7f9596e48b5766a5676974a1162eb
SHA256be63c9f2ea58f28407b54fd63cdcd6818f23f1623f979f3cd1daaa96c74c7420
SHA5121e0d70e10d9580bee1e60ea75f74279ade7fbee040b6acd2caf2cb5653a05b0487e51590a7348f1cb45ccbd2aa714a3710a21aefb40e06e8fa4dec49c39b41fb
-
Filesize
11KB
MD577c06d90742d8a47aaa9a0de251e354c
SHA17093e1dfd6707015b4d55e0cae3bd895de53ef97
SHA256d26e443a261981f9b6d556f0ffa0afea82e397b727b99910706252cb1b3bd012
SHA5123e10d699112f347f9e1706339222a3ae1776b8540480466f065d208be9283bd52492387c80e713ec2dca576093c24e889a63150683853798b46535dbd509268f
-
Filesize
11KB
MD577c06d90742d8a47aaa9a0de251e354c
SHA17093e1dfd6707015b4d55e0cae3bd895de53ef97
SHA256d26e443a261981f9b6d556f0ffa0afea82e397b727b99910706252cb1b3bd012
SHA5123e10d699112f347f9e1706339222a3ae1776b8540480466f065d208be9283bd52492387c80e713ec2dca576093c24e889a63150683853798b46535dbd509268f
-
Filesize
588KB
MD58a34b9c65e750ddc2ff9cee44754102d
SHA1341b88d7ee25c7f3936577a91bfdc03cc61d79fd
SHA2566dc2e81c30eeaf4f51e4f706753bab6ed34a56a4e9f88ed2ae728c65255cad04
SHA512f6cfc7ba88c5fcd330a45cb9cf1c1af0311c6bdd1ee38f3c9173e2ca41342ddbe16e134d2ee66b673451ff184eca43a2968ec1006d9be01fcf40fba66aefd9ea
-
Filesize
588KB
MD58a34b9c65e750ddc2ff9cee44754102d
SHA1341b88d7ee25c7f3936577a91bfdc03cc61d79fd
SHA2566dc2e81c30eeaf4f51e4f706753bab6ed34a56a4e9f88ed2ae728c65255cad04
SHA512f6cfc7ba88c5fcd330a45cb9cf1c1af0311c6bdd1ee38f3c9173e2ca41342ddbe16e134d2ee66b673451ff184eca43a2968ec1006d9be01fcf40fba66aefd9ea
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1