Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:52
Static task
static1
General
-
Target
97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe
-
Size
1.0MB
-
MD5
3ffb7f4de72fe068b515eb1e0b8c2c32
-
SHA1
59b3e195e77f8f6479d326444ffceaca32116089
-
SHA256
97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402
-
SHA512
bedc59ba5febc665f28b6d0586f8d69c82e0a642540768de4dcc0a5b6c3b4ca4788df67cfb830a9a508ab7f55d1da3cda1908c2c9865b605b19499eabb1eac74
-
SSDEEP
12288:NMray909cR1Rm5yu4oBRvJ6udXCOVqa46c1vDZ95ys5A10oNori18tiYKOE:XyKLyu4I3dcf1l95BGf+M
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it526702.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it526702.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it526702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it526702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it526702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it526702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it526702.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr275128.exelr546502.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr275128.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr546502.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
zipg0853.exeziub6130.exeit526702.exejr275128.exe1.exekp384712.exelr546502.exeoneetx.exeoneetx.exeoneetx.exepid process 2684 zipg0853.exe 736 ziub6130.exe 1316 it526702.exe 4748 jr275128.exe 1460 1.exe 552 kp384712.exe 2308 lr546502.exe 4872 oneetx.exe 3268 oneetx.exe 2468 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4556 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it526702.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it526702.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziub6130.exe97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exezipg0853.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziub6130.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziub6130.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipg0853.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipg0853.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2620 2308 WerFault.exe lr546502.exe 4908 2308 WerFault.exe lr546502.exe 4556 2308 WerFault.exe lr546502.exe 2248 2308 WerFault.exe lr546502.exe 2256 2308 WerFault.exe lr546502.exe 4252 2308 WerFault.exe lr546502.exe 3356 2308 WerFault.exe lr546502.exe 3848 2308 WerFault.exe lr546502.exe 1484 2308 WerFault.exe lr546502.exe 4840 2308 WerFault.exe lr546502.exe 1956 4872 WerFault.exe oneetx.exe 2828 4872 WerFault.exe oneetx.exe 4452 4872 WerFault.exe oneetx.exe 3684 4872 WerFault.exe oneetx.exe 4900 4872 WerFault.exe oneetx.exe 3888 4872 WerFault.exe oneetx.exe 2656 4872 WerFault.exe oneetx.exe 736 4872 WerFault.exe oneetx.exe 2148 4872 WerFault.exe oneetx.exe 4160 4872 WerFault.exe oneetx.exe 4516 4872 WerFault.exe oneetx.exe 828 4872 WerFault.exe oneetx.exe 5036 3268 WerFault.exe oneetx.exe 3448 4872 WerFault.exe oneetx.exe 2264 4872 WerFault.exe oneetx.exe 1124 4872 WerFault.exe oneetx.exe 3356 2468 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it526702.exekp384712.exe1.exepid process 1316 it526702.exe 1316 it526702.exe 552 kp384712.exe 1460 1.exe 552 kp384712.exe 1460 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it526702.exejr275128.exekp384712.exe1.exedescription pid process Token: SeDebugPrivilege 1316 it526702.exe Token: SeDebugPrivilege 4748 jr275128.exe Token: SeDebugPrivilege 552 kp384712.exe Token: SeDebugPrivilege 1460 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr546502.exepid process 2308 lr546502.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exezipg0853.exeziub6130.exejr275128.exelr546502.exeoneetx.exedescription pid process target process PID 4180 wrote to memory of 2684 4180 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe zipg0853.exe PID 4180 wrote to memory of 2684 4180 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe zipg0853.exe PID 4180 wrote to memory of 2684 4180 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe zipg0853.exe PID 2684 wrote to memory of 736 2684 zipg0853.exe ziub6130.exe PID 2684 wrote to memory of 736 2684 zipg0853.exe ziub6130.exe PID 2684 wrote to memory of 736 2684 zipg0853.exe ziub6130.exe PID 736 wrote to memory of 1316 736 ziub6130.exe it526702.exe PID 736 wrote to memory of 1316 736 ziub6130.exe it526702.exe PID 736 wrote to memory of 4748 736 ziub6130.exe jr275128.exe PID 736 wrote to memory of 4748 736 ziub6130.exe jr275128.exe PID 736 wrote to memory of 4748 736 ziub6130.exe jr275128.exe PID 4748 wrote to memory of 1460 4748 jr275128.exe 1.exe PID 4748 wrote to memory of 1460 4748 jr275128.exe 1.exe PID 4748 wrote to memory of 1460 4748 jr275128.exe 1.exe PID 2684 wrote to memory of 552 2684 zipg0853.exe kp384712.exe PID 2684 wrote to memory of 552 2684 zipg0853.exe kp384712.exe PID 2684 wrote to memory of 552 2684 zipg0853.exe kp384712.exe PID 4180 wrote to memory of 2308 4180 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe lr546502.exe PID 4180 wrote to memory of 2308 4180 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe lr546502.exe PID 4180 wrote to memory of 2308 4180 97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe lr546502.exe PID 2308 wrote to memory of 4872 2308 lr546502.exe oneetx.exe PID 2308 wrote to memory of 4872 2308 lr546502.exe oneetx.exe PID 2308 wrote to memory of 4872 2308 lr546502.exe oneetx.exe PID 4872 wrote to memory of 4704 4872 oneetx.exe schtasks.exe PID 4872 wrote to memory of 4704 4872 oneetx.exe schtasks.exe PID 4872 wrote to memory of 4704 4872 oneetx.exe schtasks.exe PID 4872 wrote to memory of 4556 4872 oneetx.exe rundll32.exe PID 4872 wrote to memory of 4556 4872 oneetx.exe rundll32.exe PID 4872 wrote to memory of 4556 4872 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe"C:\Users\Admin\AppData\Local\Temp\97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg0853.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg0853.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziub6130.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziub6130.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it526702.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it526702.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr275128.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr275128.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp384712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp384712.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr546502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr546502.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7003⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7843⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7603⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 9563⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8723⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 8723⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 12203⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 12083⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 13163⤵
- Program crash
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 6964⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 7924⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 9204⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10564⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10964⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10964⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10804⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 9964⤵
- Program crash
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 12924⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 13004⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 12884⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 11084⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 16124⤵
- Program crash
PID:3448
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 11404⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 16284⤵
- Program crash
PID:1124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 7683⤵
- Program crash
PID:4840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2308 -ip 23081⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2308 -ip 23081⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2308 -ip 23081⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2308 -ip 23081⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2308 -ip 23081⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2308 -ip 23081⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2308 -ip 23081⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2308 -ip 23081⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2308 -ip 23081⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2308 -ip 23081⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4872 -ip 48721⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4872 -ip 48721⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4872 -ip 48721⤵PID:680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4872 -ip 48721⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4872 -ip 48721⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4872 -ip 48721⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4872 -ip 48721⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4872 -ip 48721⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4872 -ip 48721⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4872 -ip 48721⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4872 -ip 48721⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4872 -ip 48721⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 3242⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3268 -ip 32681⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4872 -ip 48721⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4872 -ip 48721⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4872 -ip 48721⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 3162⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2468 -ip 24681⤵PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD5160dac46ad229c8880ec309ac83c20fd
SHA1f2347fb4a175ff8453ef749ac91a7323bcb1c84b
SHA25665af648acde0b8887e6e9ce51ecf4db07784793fc1f363b33b5fa175dfdde952
SHA512a8b3b9d9d800008978ebd9306d36ddb19c2bfd3abbe47d90733f8abc26a638dabce6155905cf73e81df29f03de8ab8c854e8316b1c575c3772cf694a6567b820
-
Filesize
723KB
MD5160dac46ad229c8880ec309ac83c20fd
SHA1f2347fb4a175ff8453ef749ac91a7323bcb1c84b
SHA25665af648acde0b8887e6e9ce51ecf4db07784793fc1f363b33b5fa175dfdde952
SHA512a8b3b9d9d800008978ebd9306d36ddb19c2bfd3abbe47d90733f8abc26a638dabce6155905cf73e81df29f03de8ab8c854e8316b1c575c3772cf694a6567b820
-
Filesize
169KB
MD54650f90663a966bff48ef573e7a999d8
SHA1adc7c78d8c71f6d4bc637c97ec8a32cae932f08c
SHA2560aa495a9f4fe1c4aba9eeed5307634d945d025d9aa05919ff6d55ccf07efb799
SHA5122148cc7bc0ea17a66cbd08eb622f8ded6b68f264b54e84b8ae8ded1486b18dd6c0b4207e7c279de92c7227d01d864c7716e661e2b44f977df94c37a886367d0f
-
Filesize
169KB
MD54650f90663a966bff48ef573e7a999d8
SHA1adc7c78d8c71f6d4bc637c97ec8a32cae932f08c
SHA2560aa495a9f4fe1c4aba9eeed5307634d945d025d9aa05919ff6d55ccf07efb799
SHA5122148cc7bc0ea17a66cbd08eb622f8ded6b68f264b54e84b8ae8ded1486b18dd6c0b4207e7c279de92c7227d01d864c7716e661e2b44f977df94c37a886367d0f
-
Filesize
570KB
MD5d1b5f91db8e6ee6997144b50dc13d83a
SHA1132e765c77d8232342f13ece8463ffc2e4bf9652
SHA2560d6454127a5920935c8582ba003b6e2b024fca4223107880b45fc6012d25da28
SHA512eda1fb0c71403014adb24d62908fa6c44daa406468f36e84290ca2e96aaec185087b2b48ff2f5823bcfa66f4f756d11800ea23fbfce106924b086c02edcd049a
-
Filesize
570KB
MD5d1b5f91db8e6ee6997144b50dc13d83a
SHA1132e765c77d8232342f13ece8463ffc2e4bf9652
SHA2560d6454127a5920935c8582ba003b6e2b024fca4223107880b45fc6012d25da28
SHA512eda1fb0c71403014adb24d62908fa6c44daa406468f36e84290ca2e96aaec185087b2b48ff2f5823bcfa66f4f756d11800ea23fbfce106924b086c02edcd049a
-
Filesize
11KB
MD5e7ba00180317fb9470d044e0c8eb627c
SHA16e3eebcb66db4df4a5a76665cad16c84373a66be
SHA2568153d1d64890d5af76f7677c19f051eceb97018ce5f53055e9d07273462ceb63
SHA512f4cc0caec15a45f0d5c65a6dccdce990f1f19b6e892d26ea95abca4e1234401db024ff79f1e223f1b7c8767890b1a40649860a45b47f9047125638a8c2fd3fc5
-
Filesize
11KB
MD5e7ba00180317fb9470d044e0c8eb627c
SHA16e3eebcb66db4df4a5a76665cad16c84373a66be
SHA2568153d1d64890d5af76f7677c19f051eceb97018ce5f53055e9d07273462ceb63
SHA512f4cc0caec15a45f0d5c65a6dccdce990f1f19b6e892d26ea95abca4e1234401db024ff79f1e223f1b7c8767890b1a40649860a45b47f9047125638a8c2fd3fc5
-
Filesize
588KB
MD5df26ed595ef93ba151698d5266ee74c7
SHA1e18238664f21843b58ac01ac1b7e947988936f70
SHA256221a4084fee4e87539198e672be39214cbd3009b4b2c8823e368243e81946545
SHA512a7a0c518ddc1f69b8838b25ad50f2f4c9fa66e40d94dae4454b841230f675535e9548343a421b811969827ebfca08011e00a2b58fc40fe4007f6cf009ef4af26
-
Filesize
588KB
MD5df26ed595ef93ba151698d5266ee74c7
SHA1e18238664f21843b58ac01ac1b7e947988936f70
SHA256221a4084fee4e87539198e672be39214cbd3009b4b2c8823e368243e81946545
SHA512a7a0c518ddc1f69b8838b25ad50f2f4c9fa66e40d94dae4454b841230f675535e9548343a421b811969827ebfca08011e00a2b58fc40fe4007f6cf009ef4af26
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1