Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 21:37
Static task
static1
Behavioral task
behavioral1
Sample
e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe
Resource
win10v2004-20230220-en
General
-
Target
e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe
-
Size
566KB
-
MD5
2fb5c99a4246af5d4c67694c6a959fb1
-
SHA1
d43a2f6a604963a6aa4b8d2ae183f4e061a18512
-
SHA256
e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295
-
SHA512
f4ba416382c1928aff12e67c6acaf290cdd51663ad16394803c956eb18d18c62a7200925507e109bcbb4f09ab53d772d9430f8b80ede80adf522603ce3b30aa9
-
SSDEEP
12288:0MrLy90WKWk05bNU04dbUXrSiWS2ATTGXjVcW:HydKW/4K7Lds
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l2810925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l2810925.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l2810925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l2810925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l2810925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l2810925.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m3508672.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3224 y3686297.exe 532 k4630618.exe 4620 l2810925.exe 1908 m3508672.exe 2596 oneetx.exe 4080 oneetx.exe 2076 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3200 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l2810925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l2810925.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3686297.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3686297.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 2380 1908 WerFault.exe 93 4656 1908 WerFault.exe 93 2632 1908 WerFault.exe 93 5116 1908 WerFault.exe 93 2416 1908 WerFault.exe 93 5092 1908 WerFault.exe 93 4892 1908 WerFault.exe 93 1528 1908 WerFault.exe 93 1152 1908 WerFault.exe 93 4280 1908 WerFault.exe 93 3608 2596 WerFault.exe 113 3008 2596 WerFault.exe 113 4968 2596 WerFault.exe 113 3840 2596 WerFault.exe 113 4576 2596 WerFault.exe 113 4504 2596 WerFault.exe 113 3108 2596 WerFault.exe 113 1700 2596 WerFault.exe 113 4636 2596 WerFault.exe 113 1900 2596 WerFault.exe 113 2024 2596 WerFault.exe 113 2040 2596 WerFault.exe 113 2552 2596 WerFault.exe 113 4672 2596 WerFault.exe 113 3860 4080 WerFault.exe 154 4784 2596 WerFault.exe 113 2316 2596 WerFault.exe 113 376 2596 WerFault.exe 113 4676 2076 WerFault.exe 164 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 532 k4630618.exe 532 k4630618.exe 4620 l2810925.exe 4620 l2810925.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 532 k4630618.exe Token: SeDebugPrivilege 4620 l2810925.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 m3508672.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3128 wrote to memory of 3224 3128 e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe 84 PID 3128 wrote to memory of 3224 3128 e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe 84 PID 3128 wrote to memory of 3224 3128 e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe 84 PID 3224 wrote to memory of 532 3224 y3686297.exe 85 PID 3224 wrote to memory of 532 3224 y3686297.exe 85 PID 3224 wrote to memory of 532 3224 y3686297.exe 85 PID 3224 wrote to memory of 4620 3224 y3686297.exe 92 PID 3224 wrote to memory of 4620 3224 y3686297.exe 92 PID 3224 wrote to memory of 4620 3224 y3686297.exe 92 PID 3128 wrote to memory of 1908 3128 e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe 93 PID 3128 wrote to memory of 1908 3128 e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe 93 PID 3128 wrote to memory of 1908 3128 e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe 93 PID 1908 wrote to memory of 2596 1908 m3508672.exe 113 PID 1908 wrote to memory of 2596 1908 m3508672.exe 113 PID 1908 wrote to memory of 2596 1908 m3508672.exe 113 PID 2596 wrote to memory of 2192 2596 oneetx.exe 130 PID 2596 wrote to memory of 2192 2596 oneetx.exe 130 PID 2596 wrote to memory of 2192 2596 oneetx.exe 130 PID 2596 wrote to memory of 3592 2596 oneetx.exe 136 PID 2596 wrote to memory of 3592 2596 oneetx.exe 136 PID 2596 wrote to memory of 3592 2596 oneetx.exe 136 PID 3592 wrote to memory of 2104 3592 cmd.exe 139 PID 3592 wrote to memory of 2104 3592 cmd.exe 139 PID 3592 wrote to memory of 2104 3592 cmd.exe 139 PID 3592 wrote to memory of 2332 3592 cmd.exe 141 PID 3592 wrote to memory of 2332 3592 cmd.exe 141 PID 3592 wrote to memory of 2332 3592 cmd.exe 141 PID 3592 wrote to memory of 4824 3592 cmd.exe 142 PID 3592 wrote to memory of 4824 3592 cmd.exe 142 PID 3592 wrote to memory of 4824 3592 cmd.exe 142 PID 3592 wrote to memory of 4796 3592 cmd.exe 144 PID 3592 wrote to memory of 4796 3592 cmd.exe 144 PID 3592 wrote to memory of 4796 3592 cmd.exe 144 PID 3592 wrote to memory of 4904 3592 cmd.exe 143 PID 3592 wrote to memory of 4904 3592 cmd.exe 143 PID 3592 wrote to memory of 4904 3592 cmd.exe 143 PID 3592 wrote to memory of 1592 3592 cmd.exe 145 PID 3592 wrote to memory of 1592 3592 cmd.exe 145 PID 3592 wrote to memory of 1592 3592 cmd.exe 145 PID 2596 wrote to memory of 3200 2596 oneetx.exe 159 PID 2596 wrote to memory of 3200 2596 oneetx.exe 159 PID 2596 wrote to memory of 3200 2596 oneetx.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe"C:\Users\Admin\AppData\Local\Temp\e672f587f110093013168e7c191981845ee75e9844437248acc073152e9b4295.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3686297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3686297.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4630618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4630618.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2810925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2810925.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3508672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3508672.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 6963⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 7803⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 8123⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 9603⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 9923⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 9923⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 11803⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 12243⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 13163⤵
- Program crash
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 6924⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 8364⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 8924⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 10524⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 10724⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 11084⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 11164⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 9924⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 7764⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 13564⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 13324⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 7564⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 7604⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 11564⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 16204⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 11004⤵
- Program crash
PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 16564⤵
- Program crash
PID:376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 7083⤵
- Program crash
PID:4280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1908 -ip 19081⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1908 -ip 19081⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1908 -ip 19081⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1908 -ip 19081⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1908 -ip 19081⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1908 -ip 19081⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1908 -ip 19081⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1908 -ip 19081⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1908 -ip 19081⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1908 -ip 19081⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2596 -ip 25961⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2596 -ip 25961⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2596 -ip 25961⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2596 -ip 25961⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2596 -ip 25961⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2596 -ip 25961⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2596 -ip 25961⤵PID:1072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2596 -ip 25961⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2596 -ip 25961⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2596 -ip 25961⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2596 -ip 25961⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 2596 -ip 25961⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2596 -ip 25961⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 2596 -ip 25961⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 3162⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4080 -ip 40801⤵PID:952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 2596 -ip 25961⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2596 -ip 25961⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2596 -ip 25961⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 3162⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2076 -ip 20761⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
307KB
MD58b5f2d6613aff48acc13548812714759
SHA1d8c40a725472f82cff9c5203973cf77d197fc36d
SHA256ab2106cb99016f89c3c38b80b59c2722764c07b515cfa6fa2f2a5f86b18bb0f2
SHA5129de7a23fd7c03a3f237871dec52bdf32bcf46300c5859594bcd62b133fdc1a3f46d69ecda7a494666190fa6159c3b4613a6fee6fa67131d7b562d2d634f1d7a6
-
Filesize
307KB
MD58b5f2d6613aff48acc13548812714759
SHA1d8c40a725472f82cff9c5203973cf77d197fc36d
SHA256ab2106cb99016f89c3c38b80b59c2722764c07b515cfa6fa2f2a5f86b18bb0f2
SHA5129de7a23fd7c03a3f237871dec52bdf32bcf46300c5859594bcd62b133fdc1a3f46d69ecda7a494666190fa6159c3b4613a6fee6fa67131d7b562d2d634f1d7a6
-
Filesize
168KB
MD59b16ad996581a94b97baa4c409e36238
SHA11a30bdda468ffde313da8b56a3b4661b18319cae
SHA256ab86288d78f57a2c18a77bf3500547560585029d631437bca4094d555b22f294
SHA512099c4a9a76c103386b7f526c3e35731dc266aeb1bd984ceae1e18e6c4a5361133e5fb750052fbfc2aa5773037ccbdd49b083bd2563447abaa19fbdfe12b04124
-
Filesize
168KB
MD59b16ad996581a94b97baa4c409e36238
SHA11a30bdda468ffde313da8b56a3b4661b18319cae
SHA256ab86288d78f57a2c18a77bf3500547560585029d631437bca4094d555b22f294
SHA512099c4a9a76c103386b7f526c3e35731dc266aeb1bd984ceae1e18e6c4a5361133e5fb750052fbfc2aa5773037ccbdd49b083bd2563447abaa19fbdfe12b04124
-
Filesize
178KB
MD5dd972f7569bb4c1c25ab72f11878c105
SHA1f9fee80097efcd2596b6caa4e4fff114e2d77914
SHA256254cc74ef121ae3213a1a535e0633db387292614aee0664e9c6849db774c84c9
SHA512676c7411c66b0cfc481101ceb7265139e74e118fe0a342419613f11c48acd460d2f650d21c96959944fb910eb2d5fa8e29a25b03de15c2cb6dbc9bc89537396c
-
Filesize
178KB
MD5dd972f7569bb4c1c25ab72f11878c105
SHA1f9fee80097efcd2596b6caa4e4fff114e2d77914
SHA256254cc74ef121ae3213a1a535e0633db387292614aee0664e9c6849db774c84c9
SHA512676c7411c66b0cfc481101ceb7265139e74e118fe0a342419613f11c48acd460d2f650d21c96959944fb910eb2d5fa8e29a25b03de15c2cb6dbc9bc89537396c
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
268KB
MD5ff13685bd58f76564cb4f31d5ed9481d
SHA111ff0ac4de69e695ca24fd491dadc0bd6f802b75
SHA256229487f89e1abf0d9baa072f559b3fc72782bc84d3298ecc17d23c11faa316ae
SHA5125500837a3ea9e06aaf7db7556efba1fa771764ba215fbd47dd52c7f578476202729298eefa64179135ce52edb1bc7a37e8ca311f350b077752922a17d9683fc2
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5