Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 12:52
Static task
static1
General
-
Target
6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe
-
Size
1.2MB
-
MD5
1dc35fca0330851928ad62a61ddb5b09
-
SHA1
d876a856525f54ef2b0e7518229796064c08f046
-
SHA256
6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b
-
SHA512
97ad9095490e3d5b708ffd6980119ef4573e7c141ba1fb4e064cb1282f5ab1d10ce80f71a38fd76d338271ba6862e9a039ad98b6d2d82fed779250204215c259
-
SSDEEP
24576:dyR56GRNx32WzkTyiot0SigRjMXwErLcx:4R5Rn9ohot0Pdw
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr209415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr209415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr209415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr209415.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr209415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr209415.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu566792.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si191904.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 412 un073196.exe 552 un235264.exe 3372 pr209415.exe 2460 qu566792.exe 2496 1.exe 3316 rk448335.exe 1456 si191904.exe 1716 oneetx.exe 4324 oneetx.exe 4996 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2828 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr209415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr209415.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un235264.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un073196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un073196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un235264.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 3316 3372 WerFault.exe 82 4324 2460 WerFault.exe 88 2988 1456 WerFault.exe 94 4864 1456 WerFault.exe 94 4716 1456 WerFault.exe 94 1680 1456 WerFault.exe 94 2848 1456 WerFault.exe 94 2236 1456 WerFault.exe 94 1740 1456 WerFault.exe 94 2660 1456 WerFault.exe 94 3428 1456 WerFault.exe 94 3824 1456 WerFault.exe 94 4680 1716 WerFault.exe 113 2240 1716 WerFault.exe 113 2160 1716 WerFault.exe 113 4388 1716 WerFault.exe 113 3804 1716 WerFault.exe 113 1500 1716 WerFault.exe 113 4092 1716 WerFault.exe 113 3996 1716 WerFault.exe 113 1668 1716 WerFault.exe 113 4104 1716 WerFault.exe 113 3812 1716 WerFault.exe 113 4344 1716 WerFault.exe 113 3956 4324 WerFault.exe 142 5060 1716 WerFault.exe 113 4688 1716 WerFault.exe 113 1664 1716 WerFault.exe 113 1580 4996 WerFault.exe 152 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3372 pr209415.exe 3372 pr209415.exe 2496 1.exe 3316 rk448335.exe 3316 rk448335.exe 2496 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3372 pr209415.exe Token: SeDebugPrivilege 2460 qu566792.exe Token: SeDebugPrivilege 3316 rk448335.exe Token: SeDebugPrivilege 2496 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1456 si191904.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1120 wrote to memory of 412 1120 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe 80 PID 1120 wrote to memory of 412 1120 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe 80 PID 1120 wrote to memory of 412 1120 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe 80 PID 412 wrote to memory of 552 412 un073196.exe 81 PID 412 wrote to memory of 552 412 un073196.exe 81 PID 412 wrote to memory of 552 412 un073196.exe 81 PID 552 wrote to memory of 3372 552 un235264.exe 82 PID 552 wrote to memory of 3372 552 un235264.exe 82 PID 552 wrote to memory of 3372 552 un235264.exe 82 PID 552 wrote to memory of 2460 552 un235264.exe 88 PID 552 wrote to memory of 2460 552 un235264.exe 88 PID 552 wrote to memory of 2460 552 un235264.exe 88 PID 2460 wrote to memory of 2496 2460 qu566792.exe 90 PID 2460 wrote to memory of 2496 2460 qu566792.exe 90 PID 2460 wrote to memory of 2496 2460 qu566792.exe 90 PID 412 wrote to memory of 3316 412 un073196.exe 93 PID 412 wrote to memory of 3316 412 un073196.exe 93 PID 412 wrote to memory of 3316 412 un073196.exe 93 PID 1120 wrote to memory of 1456 1120 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe 94 PID 1120 wrote to memory of 1456 1120 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe 94 PID 1120 wrote to memory of 1456 1120 6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe 94 PID 1456 wrote to memory of 1716 1456 si191904.exe 113 PID 1456 wrote to memory of 1716 1456 si191904.exe 113 PID 1456 wrote to memory of 1716 1456 si191904.exe 113 PID 1716 wrote to memory of 3596 1716 oneetx.exe 130 PID 1716 wrote to memory of 3596 1716 oneetx.exe 130 PID 1716 wrote to memory of 3596 1716 oneetx.exe 130 PID 1716 wrote to memory of 2828 1716 oneetx.exe 147 PID 1716 wrote to memory of 2828 1716 oneetx.exe 147 PID 1716 wrote to memory of 2828 1716 oneetx.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe"C:\Users\Admin\AppData\Local\Temp\6bb1fce7307600373696b9d05b1de27fc39e068fa921af8039ed13467be9860b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un073196.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un073196.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un235264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un235264.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr209415.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr209415.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 10885⤵
- Program crash
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu566792.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu566792.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 14045⤵
- Program crash
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk448335.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk448335.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si191904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si191904.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 7003⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 7323⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 8603⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 9523⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 9923⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 10123⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 12243⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 12163⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 13163⤵
- Program crash
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 6964⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 9124⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 9324⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 10924⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 9284⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 11164⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 11524⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 10284⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 6884⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 7564⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 7844⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 11764⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 16124⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 13724⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 16284⤵
- Program crash
PID:1664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 13603⤵
- Program crash
PID:3824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3372 -ip 33721⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2460 -ip 24601⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1456 -ip 14561⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1456 -ip 14561⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1456 -ip 14561⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1456 -ip 14561⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1456 -ip 14561⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1456 -ip 14561⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1456 -ip 14561⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1456 -ip 14561⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1456 -ip 14561⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1456 -ip 14561⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1716 -ip 17161⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1716 -ip 17161⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1716 -ip 17161⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1716 -ip 17161⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1716 -ip 17161⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1716 -ip 17161⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1716 -ip 17161⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1716 -ip 17161⤵PID:708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1716 -ip 17161⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1716 -ip 17161⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1716 -ip 17161⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1716 -ip 17161⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 3202⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4324 -ip 43241⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1716 -ip 17161⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1716 -ip 17161⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1716 -ip 17161⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 3242⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4996 -ip 49961⤵PID:4028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
395KB
MD54a04fe844d0697cd44aa9fc501cc4a2b
SHA19d3d7292f776cff124ccd59218e70c5036fde30c
SHA256cebcff48af7f45916dcbb2c0b30b67bdd0957c83e9bb04e7502e8fab54311f4c
SHA512025d50124126018a9e2aeaaf7a3cffb53b6b6c51ba4083e0afbd6110d95d11c8b0941ea8e0f63a7e519bc2ca1b2c02a3e5f7df99d230a01437c4a01a1448d146
-
Filesize
862KB
MD5e9f3db490cb51b09fc75d42e2adf21b0
SHA1dfef089ece4728bbd969ae6c2e0d9d936cf4ff2a
SHA25685f5740ca2c510330c6e814e65eb87b5667e907198ad17a32036898fc035c210
SHA5127f61ebfe780a0cc0968eb3fb6ee1dc17c4f494f0ecb03f25d68cdedb6b78fdcec23c6bac755cf168f1d84adf827983b3eff3fbee830cf630f50f3a6548b64614
-
Filesize
862KB
MD5e9f3db490cb51b09fc75d42e2adf21b0
SHA1dfef089ece4728bbd969ae6c2e0d9d936cf4ff2a
SHA25685f5740ca2c510330c6e814e65eb87b5667e907198ad17a32036898fc035c210
SHA5127f61ebfe780a0cc0968eb3fb6ee1dc17c4f494f0ecb03f25d68cdedb6b78fdcec23c6bac755cf168f1d84adf827983b3eff3fbee830cf630f50f3a6548b64614
-
Filesize
168KB
MD5279e7fb26a4227aaf1aef2458a20b051
SHA18a5b58d27ea6a318ea393eb4b29ae3fec503a667
SHA2569dad5a1238231b34d3c828307c99cac3facc04d71c244d23299ae37dffac680a
SHA5127f193d1df2fa5959392b626ec5ce3cea3016879fbf36c7134d51f0ee7045455deb84419318739223f0a2a3e5ef9fc5f178105819e4e862b778479b484c9cb4bf
-
Filesize
168KB
MD5279e7fb26a4227aaf1aef2458a20b051
SHA18a5b58d27ea6a318ea393eb4b29ae3fec503a667
SHA2569dad5a1238231b34d3c828307c99cac3facc04d71c244d23299ae37dffac680a
SHA5127f193d1df2fa5959392b626ec5ce3cea3016879fbf36c7134d51f0ee7045455deb84419318739223f0a2a3e5ef9fc5f178105819e4e862b778479b484c9cb4bf
-
Filesize
709KB
MD5763d95d449560416499d8f64783884cc
SHA1d0fde1cf105700b1bf5526ca3376c153c1cb1d4f
SHA256e36db4ec97e6ec67ab660b7540da3bb19e7aad3402b49e07f78805f8da342260
SHA512ec941bab1bce3a9b9dda093ebb4ddae839508718045710118e6a3a194413b5d6a75d1d234103a49aebaa722f4ce4aeee2b215cc519e0c3b6d52b83d65623dbd7
-
Filesize
709KB
MD5763d95d449560416499d8f64783884cc
SHA1d0fde1cf105700b1bf5526ca3376c153c1cb1d4f
SHA256e36db4ec97e6ec67ab660b7540da3bb19e7aad3402b49e07f78805f8da342260
SHA512ec941bab1bce3a9b9dda093ebb4ddae839508718045710118e6a3a194413b5d6a75d1d234103a49aebaa722f4ce4aeee2b215cc519e0c3b6d52b83d65623dbd7
-
Filesize
403KB
MD57274c4622021d4c4adc1010c69098bb2
SHA1d9ded3427da81848f15505d226dd20212148f15f
SHA2566741857b4f06ce1198d9d3bf43c09e9e86702a78dca53a0075e35f7302ddfdcf
SHA5121de5361dcedcd1aad05675fbd53884d709562bfc6e688f77bba4fa796ef1fec7ff78de3a9a1f8e686ddaad828519a00a3b3caaf5c61748c26daf9d408cb6341c
-
Filesize
403KB
MD57274c4622021d4c4adc1010c69098bb2
SHA1d9ded3427da81848f15505d226dd20212148f15f
SHA2566741857b4f06ce1198d9d3bf43c09e9e86702a78dca53a0075e35f7302ddfdcf
SHA5121de5361dcedcd1aad05675fbd53884d709562bfc6e688f77bba4fa796ef1fec7ff78de3a9a1f8e686ddaad828519a00a3b3caaf5c61748c26daf9d408cb6341c
-
Filesize
588KB
MD5ab1723b194059fdcc1b02abb5a88be18
SHA1134c4c3f7205454d26b0766b7d5c2c22b62effdc
SHA2561e0c05eed43252dcd526e0adf4bffc025fb759a863e7784bfcdaf2d437e34802
SHA5125cbd307b68e7c343b28ebb7e978d495090bba6f9860b72c08863bdc302ee004f7da44d66cf41cbc661e399dede47ae83ec8de86c3c9589ffd0304f6f5bac12ba
-
Filesize
588KB
MD5ab1723b194059fdcc1b02abb5a88be18
SHA1134c4c3f7205454d26b0766b7d5c2c22b62effdc
SHA2561e0c05eed43252dcd526e0adf4bffc025fb759a863e7784bfcdaf2d437e34802
SHA5125cbd307b68e7c343b28ebb7e978d495090bba6f9860b72c08863bdc302ee004f7da44d66cf41cbc661e399dede47ae83ec8de86c3c9589ffd0304f6f5bac12ba
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13