Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 08:58
Static task
static1
General
-
Target
7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe
-
Size
1.0MB
-
MD5
2f26aa3f89426a5e36747757afaf0477
-
SHA1
5b324867259bcd41991c8c98ba235dd339ce1167
-
SHA256
7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474
-
SHA512
14740ab0715697bf97f2e5582f98f4dd62cbfafbce0dfa3fb0e51400a22c6d466a44a5eebdb10ea5a349ed2ee58072903654a69b1e98e41d289d25f4be7f7e72
-
SSDEEP
24576:fyYEAJGv4zcn7ZzhI1M9Wimq6NikX1zYMM:qY0t7ZzhI1IJZ6JFZ
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it151693.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it151693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it151693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it151693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it151693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it151693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it151693.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr157433.exelr753547.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr157433.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr753547.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
ziYF2195.exezivW4752.exeit151693.exejr157433.exe1.exekp344821.exelr753547.exeoneetx.exeoneetx.exeoneetx.exepid process 4112 ziYF2195.exe 3396 zivW4752.exe 1436 it151693.exe 408 jr157433.exe 1936 1.exe 2208 kp344821.exe 832 lr753547.exe 4272 oneetx.exe 1776 oneetx.exe 2728 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2560 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it151693.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it151693.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zivW4752.exe7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exeziYF2195.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivW4752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zivW4752.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYF2195.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYF2195.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1500 832 WerFault.exe lr753547.exe 2348 832 WerFault.exe lr753547.exe 1788 832 WerFault.exe lr753547.exe 1640 832 WerFault.exe lr753547.exe 4824 832 WerFault.exe lr753547.exe 5008 832 WerFault.exe lr753547.exe 3956 832 WerFault.exe lr753547.exe 1444 832 WerFault.exe lr753547.exe 3232 832 WerFault.exe lr753547.exe 4864 832 WerFault.exe lr753547.exe 4040 4272 WerFault.exe oneetx.exe 3540 4272 WerFault.exe oneetx.exe 3612 4272 WerFault.exe oneetx.exe 3684 4272 WerFault.exe oneetx.exe 544 4272 WerFault.exe oneetx.exe 1844 4272 WerFault.exe oneetx.exe 4792 4272 WerFault.exe oneetx.exe 4960 4272 WerFault.exe oneetx.exe 2372 4272 WerFault.exe oneetx.exe 2264 4272 WerFault.exe oneetx.exe 2196 4272 WerFault.exe oneetx.exe 2632 4272 WerFault.exe oneetx.exe 2324 4272 WerFault.exe oneetx.exe 2148 1776 WerFault.exe oneetx.exe 4300 4272 WerFault.exe oneetx.exe 2580 4272 WerFault.exe oneetx.exe 904 4272 WerFault.exe oneetx.exe 3724 2728 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it151693.exekp344821.exe1.exepid process 1436 it151693.exe 1436 it151693.exe 2208 kp344821.exe 2208 kp344821.exe 1936 1.exe 1936 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it151693.exejr157433.exekp344821.exe1.exedescription pid process Token: SeDebugPrivilege 1436 it151693.exe Token: SeDebugPrivilege 408 jr157433.exe Token: SeDebugPrivilege 2208 kp344821.exe Token: SeDebugPrivilege 1936 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr753547.exepid process 832 lr753547.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exeziYF2195.exezivW4752.exejr157433.exelr753547.exeoneetx.exedescription pid process target process PID 800 wrote to memory of 4112 800 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe ziYF2195.exe PID 800 wrote to memory of 4112 800 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe ziYF2195.exe PID 800 wrote to memory of 4112 800 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe ziYF2195.exe PID 4112 wrote to memory of 3396 4112 ziYF2195.exe zivW4752.exe PID 4112 wrote to memory of 3396 4112 ziYF2195.exe zivW4752.exe PID 4112 wrote to memory of 3396 4112 ziYF2195.exe zivW4752.exe PID 3396 wrote to memory of 1436 3396 zivW4752.exe it151693.exe PID 3396 wrote to memory of 1436 3396 zivW4752.exe it151693.exe PID 3396 wrote to memory of 408 3396 zivW4752.exe jr157433.exe PID 3396 wrote to memory of 408 3396 zivW4752.exe jr157433.exe PID 3396 wrote to memory of 408 3396 zivW4752.exe jr157433.exe PID 408 wrote to memory of 1936 408 jr157433.exe 1.exe PID 408 wrote to memory of 1936 408 jr157433.exe 1.exe PID 408 wrote to memory of 1936 408 jr157433.exe 1.exe PID 4112 wrote to memory of 2208 4112 ziYF2195.exe kp344821.exe PID 4112 wrote to memory of 2208 4112 ziYF2195.exe kp344821.exe PID 4112 wrote to memory of 2208 4112 ziYF2195.exe kp344821.exe PID 800 wrote to memory of 832 800 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe lr753547.exe PID 800 wrote to memory of 832 800 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe lr753547.exe PID 800 wrote to memory of 832 800 7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe lr753547.exe PID 832 wrote to memory of 4272 832 lr753547.exe oneetx.exe PID 832 wrote to memory of 4272 832 lr753547.exe oneetx.exe PID 832 wrote to memory of 4272 832 lr753547.exe oneetx.exe PID 4272 wrote to memory of 4424 4272 oneetx.exe schtasks.exe PID 4272 wrote to memory of 4424 4272 oneetx.exe schtasks.exe PID 4272 wrote to memory of 4424 4272 oneetx.exe schtasks.exe PID 4272 wrote to memory of 2560 4272 oneetx.exe rundll32.exe PID 4272 wrote to memory of 2560 4272 oneetx.exe rundll32.exe PID 4272 wrote to memory of 2560 4272 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe"C:\Users\Admin\AppData\Local\Temp\7ccfe5db7a804d41181351fea51317adb6ed7eb51dc9eb458d527abc124a8474.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYF2195.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYF2195.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivW4752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivW4752.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it151693.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it151693.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr157433.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr157433.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp344821.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp344821.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753547.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 7003⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 7843⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 8083⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 9803⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 10203⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 9603⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 12123⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 12483⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 13243⤵
- Program crash
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 6324⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 9124⤵
- Program crash
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 9364⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 10844⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 9364⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 9324⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 11124⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 10284⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 6964⤵
- Program crash
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 12844⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 13324⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 14884⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 11444⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 7564⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 9524⤵
- Program crash
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 16684⤵
- Program crash
PID:904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 13643⤵
- Program crash
PID:4864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 832 -ip 8321⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 832 -ip 8321⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 832 -ip 8321⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 832 -ip 8321⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 832 -ip 8321⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 832 -ip 8321⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 832 -ip 8321⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 832 -ip 8321⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 832 -ip 8321⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 832 -ip 8321⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4272 -ip 42721⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4272 -ip 42721⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4272 -ip 42721⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4272 -ip 42721⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4272 -ip 42721⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4272 -ip 42721⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4272 -ip 42721⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4272 -ip 42721⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4272 -ip 42721⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4272 -ip 42721⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4272 -ip 42721⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4272 -ip 42721⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4272 -ip 42721⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 3242⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1776 -ip 17761⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4272 -ip 42721⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4272 -ip 42721⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4272 -ip 42721⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 3202⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 2728 -ip 27281⤵PID:1084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD5f97ce163963bc532fdbd413053cc474f
SHA15a097bb044f1363704d1ca6f4f851af3f047d78b
SHA2562bf2c1a8bd3211a5d23eaace1328f577387ffb301b6f8eee11cbf929600770b5
SHA51245a4c83ddf2035ce07b2076912c598fdd16cc320007aedf8a68d078e093d58bd1b50e54cfad8166f33e10e3e49bd714fdcc9a0c236e5983eeb204a57a342ef44
-
Filesize
723KB
MD5f97ce163963bc532fdbd413053cc474f
SHA15a097bb044f1363704d1ca6f4f851af3f047d78b
SHA2562bf2c1a8bd3211a5d23eaace1328f577387ffb301b6f8eee11cbf929600770b5
SHA51245a4c83ddf2035ce07b2076912c598fdd16cc320007aedf8a68d078e093d58bd1b50e54cfad8166f33e10e3e49bd714fdcc9a0c236e5983eeb204a57a342ef44
-
Filesize
169KB
MD5802bdbe5d5818cdc0012180d733410c0
SHA14e7a60b2233365d6ba3cc5e2adbee2f2b7d8a8db
SHA25627efd2ea257a6c34e96419c452eda9ee418a0eb02cbbad0ae8a02dd9935bae3b
SHA512a2ade24d3600c0f2bd70ff3deb40d19061639f28c35b994f9073aa838dbcb664c5d33c91c3a7b7b4b898ce31d6e14d6184e324864474590ae1760cb2ae59f4f4
-
Filesize
169KB
MD5802bdbe5d5818cdc0012180d733410c0
SHA14e7a60b2233365d6ba3cc5e2adbee2f2b7d8a8db
SHA25627efd2ea257a6c34e96419c452eda9ee418a0eb02cbbad0ae8a02dd9935bae3b
SHA512a2ade24d3600c0f2bd70ff3deb40d19061639f28c35b994f9073aa838dbcb664c5d33c91c3a7b7b4b898ce31d6e14d6184e324864474590ae1760cb2ae59f4f4
-
Filesize
569KB
MD55e2d21bf081f1111f69331f047374c24
SHA1b7d3f3a6aeaebe72a277126fb0d0b800a0ffbe77
SHA2567a8b3a231589dc31642f07ff0ab34f0947742907e1d8fcc6776cb2ff01557b93
SHA51253ce0fb4e201ab80f3ca3eed5a24cd09515613ed3b528ee20ad25e393746259c968c28d4177eda70cf292368847aaaac00ebd4af7e0bf623be7af58e3fbffd8f
-
Filesize
569KB
MD55e2d21bf081f1111f69331f047374c24
SHA1b7d3f3a6aeaebe72a277126fb0d0b800a0ffbe77
SHA2567a8b3a231589dc31642f07ff0ab34f0947742907e1d8fcc6776cb2ff01557b93
SHA51253ce0fb4e201ab80f3ca3eed5a24cd09515613ed3b528ee20ad25e393746259c968c28d4177eda70cf292368847aaaac00ebd4af7e0bf623be7af58e3fbffd8f
-
Filesize
11KB
MD56dec0c4453d6a572e50123b3b699e886
SHA1d330d63fe1ae1120339fc79890141f624b0bf21b
SHA25663acc5bec32e686a44c6ccae288c690b385db7ab57eb853ce022b4cf909206d4
SHA512a412b60cf60e996b5de072bbbe746b6ecefdecccbf8d33d9bfd66119b1aed8308926f875f622da21d5175a531ea8857726731671c8663fcd0a46c508042777da
-
Filesize
11KB
MD56dec0c4453d6a572e50123b3b699e886
SHA1d330d63fe1ae1120339fc79890141f624b0bf21b
SHA25663acc5bec32e686a44c6ccae288c690b385db7ab57eb853ce022b4cf909206d4
SHA512a412b60cf60e996b5de072bbbe746b6ecefdecccbf8d33d9bfd66119b1aed8308926f875f622da21d5175a531ea8857726731671c8663fcd0a46c508042777da
-
Filesize
588KB
MD5e70c17c596f66ca5052a13e4de69ba9e
SHA1aea3adb4f6cac5286b367af350029d56bbe8a6a3
SHA256906008f0b422f3d445bfb96e692c6792c9f4afe3b87a8e943bfffd62fedcc1c2
SHA512b3260903c56f934caf0a372b5aad170bd786563c677eb72c3c7b7d8b7e3a1091254c72350e94c417850f9d24041d235bc6033b6fd8b0996a0c03951e6c05abbb
-
Filesize
588KB
MD5e70c17c596f66ca5052a13e4de69ba9e
SHA1aea3adb4f6cac5286b367af350029d56bbe8a6a3
SHA256906008f0b422f3d445bfb96e692c6792c9f4afe3b87a8e943bfffd62fedcc1c2
SHA512b3260903c56f934caf0a372b5aad170bd786563c677eb72c3c7b7d8b7e3a1091254c72350e94c417850f9d24041d235bc6033b6fd8b0996a0c03951e6c05abbb
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1