Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe
Resource
win10v2004-20230221-en
General
-
Target
cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe
-
Size
566KB
-
MD5
7e7a7983f9b2f4b636d585d4e4afce28
-
SHA1
56d0aa2551344348cfe149a4b8afb1759bf10e2a
-
SHA256
cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84
-
SHA512
4b06c8b6380d11f98fc58bfa1a40988fc112dc8085a109d33c04e57c8309af800e88025e4b00b3b335b510f893b545bd7c28c354cf11a1fc0921ec4e598f766f
-
SSDEEP
12288:JMrZy90CdqIM0WX1w80BOjNyEWMznC/bAC9jGhjEm:gyx6L0BOj0SzC/0CY/
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l5627665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l5627665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l5627665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l5627665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l5627665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l5627665.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation m6623640.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1456 y6551769.exe 1520 k3646190.exe 2828 l5627665.exe 1120 m6623640.exe 3828 oneetx.exe 3300 oneetx.exe 468 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4772 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l5627665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l5627665.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6551769.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6551769.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 4028 1120 WerFault.exe 92 2224 1120 WerFault.exe 92 4856 1120 WerFault.exe 92 404 1120 WerFault.exe 92 1204 1120 WerFault.exe 92 1144 1120 WerFault.exe 92 4100 1120 WerFault.exe 92 468 1120 WerFault.exe 92 800 1120 WerFault.exe 92 3064 1120 WerFault.exe 92 2144 3828 WerFault.exe 112 1820 3828 WerFault.exe 112 552 3828 WerFault.exe 112 3392 3828 WerFault.exe 112 2620 3828 WerFault.exe 112 3604 3828 WerFault.exe 112 928 3828 WerFault.exe 112 3656 3828 WerFault.exe 112 2952 3828 WerFault.exe 112 3792 3828 WerFault.exe 112 440 3828 WerFault.exe 112 4628 3828 WerFault.exe 112 1932 3828 WerFault.exe 112 3748 3828 WerFault.exe 112 4172 3300 WerFault.exe 153 456 3828 WerFault.exe 112 2376 3828 WerFault.exe 112 4284 3828 WerFault.exe 112 3772 468 WerFault.exe 163 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1520 k3646190.exe 1520 k3646190.exe 2828 l5627665.exe 2828 l5627665.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1520 k3646190.exe Token: SeDebugPrivilege 2828 l5627665.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 m6623640.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1456 2128 cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe 83 PID 2128 wrote to memory of 1456 2128 cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe 83 PID 2128 wrote to memory of 1456 2128 cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe 83 PID 1456 wrote to memory of 1520 1456 y6551769.exe 84 PID 1456 wrote to memory of 1520 1456 y6551769.exe 84 PID 1456 wrote to memory of 1520 1456 y6551769.exe 84 PID 1456 wrote to memory of 2828 1456 y6551769.exe 91 PID 1456 wrote to memory of 2828 1456 y6551769.exe 91 PID 1456 wrote to memory of 2828 1456 y6551769.exe 91 PID 2128 wrote to memory of 1120 2128 cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe 92 PID 2128 wrote to memory of 1120 2128 cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe 92 PID 2128 wrote to memory of 1120 2128 cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe 92 PID 1120 wrote to memory of 3828 1120 m6623640.exe 112 PID 1120 wrote to memory of 3828 1120 m6623640.exe 112 PID 1120 wrote to memory of 3828 1120 m6623640.exe 112 PID 3828 wrote to memory of 1060 3828 oneetx.exe 129 PID 3828 wrote to memory of 1060 3828 oneetx.exe 129 PID 3828 wrote to memory of 1060 3828 oneetx.exe 129 PID 3828 wrote to memory of 4148 3828 oneetx.exe 135 PID 3828 wrote to memory of 4148 3828 oneetx.exe 135 PID 3828 wrote to memory of 4148 3828 oneetx.exe 135 PID 4148 wrote to memory of 3804 4148 cmd.exe 139 PID 4148 wrote to memory of 3804 4148 cmd.exe 139 PID 4148 wrote to memory of 3804 4148 cmd.exe 139 PID 4148 wrote to memory of 808 4148 cmd.exe 140 PID 4148 wrote to memory of 808 4148 cmd.exe 140 PID 4148 wrote to memory of 808 4148 cmd.exe 140 PID 4148 wrote to memory of 3568 4148 cmd.exe 141 PID 4148 wrote to memory of 3568 4148 cmd.exe 141 PID 4148 wrote to memory of 3568 4148 cmd.exe 141 PID 4148 wrote to memory of 316 4148 cmd.exe 143 PID 4148 wrote to memory of 316 4148 cmd.exe 143 PID 4148 wrote to memory of 316 4148 cmd.exe 143 PID 4148 wrote to memory of 428 4148 cmd.exe 142 PID 4148 wrote to memory of 428 4148 cmd.exe 142 PID 4148 wrote to memory of 428 4148 cmd.exe 142 PID 4148 wrote to memory of 224 4148 cmd.exe 144 PID 4148 wrote to memory of 224 4148 cmd.exe 144 PID 4148 wrote to memory of 224 4148 cmd.exe 144 PID 3828 wrote to memory of 4772 3828 oneetx.exe 158 PID 3828 wrote to memory of 4772 3828 oneetx.exe 158 PID 3828 wrote to memory of 4772 3828 oneetx.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe"C:\Users\Admin\AppData\Local\Temp\cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6551769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6551769.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3646190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3646190.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5627665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5627665.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6623640.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6623640.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6963⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 7803⤵
- Program crash
PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 8563⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9683⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9763⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9763⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 12163⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 12483⤵
- Program crash
PID:468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 13163⤵
- Program crash
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 6924⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 8324⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 9124⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10524⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10604⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10604⤵
- Program crash
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 11244⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 7724⤵
- Program crash
PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 7524⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 13044⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 12804⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 9124⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 12844⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10844⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 16364⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10684⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 16524⤵
- Program crash
PID:4284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 17563⤵
- Program crash
PID:3064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1120 -ip 11201⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1120 -ip 11201⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1120 -ip 11201⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1120 -ip 11201⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1120 -ip 11201⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1120 -ip 11201⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1120 -ip 11201⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1120 -ip 11201⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1120 -ip 11201⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1120 -ip 11201⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3828 -ip 38281⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3828 -ip 38281⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3828 -ip 38281⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3828 -ip 38281⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3828 -ip 38281⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3828 -ip 38281⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3828 -ip 38281⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3828 -ip 38281⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3828 -ip 38281⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3828 -ip 38281⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3828 -ip 38281⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3828 -ip 38281⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3828 -ip 38281⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3828 -ip 38281⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 3202⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3300 -ip 33001⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3828 -ip 38281⤵PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3828 -ip 38281⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3828 -ip 38281⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 3162⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 468 -ip 4681⤵PID:2572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
307KB
MD5d6e894be82dbc2a231357a4eec391b82
SHA11b033e4723203448e47b62e01b7e059f70f08356
SHA256f0923120afaab56ab9f1b1831bb95bd70b483511eb88003937fe57cd6fce4ef4
SHA5121ad229952654d858eaf07a0e8556709addaaae41effbdd214ddca1f79fe7903aa61cb2bed0cbaa0e9db5d9f90844a7d9ee0d5af1be4708dca0002e55639c2b29
-
Filesize
307KB
MD5d6e894be82dbc2a231357a4eec391b82
SHA11b033e4723203448e47b62e01b7e059f70f08356
SHA256f0923120afaab56ab9f1b1831bb95bd70b483511eb88003937fe57cd6fce4ef4
SHA5121ad229952654d858eaf07a0e8556709addaaae41effbdd214ddca1f79fe7903aa61cb2bed0cbaa0e9db5d9f90844a7d9ee0d5af1be4708dca0002e55639c2b29
-
Filesize
168KB
MD5d99eb5a889c59293a2133d17d02522e6
SHA1957babd11ae163d898f0eed108fa67bc9617f5a1
SHA2565d376271e30acc19bf25c365c9efc41f50b90d8c90cb0909c3a48d86d64edc71
SHA512ca0b09acafe1db8f5bc50d2858ce71e3dc915fdb509efd95f98e3e288ab56ceeac5129c045eb0f0922f32efd1da961373942e1dd71a25d1dcbb8f9a854df4090
-
Filesize
168KB
MD5d99eb5a889c59293a2133d17d02522e6
SHA1957babd11ae163d898f0eed108fa67bc9617f5a1
SHA2565d376271e30acc19bf25c365c9efc41f50b90d8c90cb0909c3a48d86d64edc71
SHA512ca0b09acafe1db8f5bc50d2858ce71e3dc915fdb509efd95f98e3e288ab56ceeac5129c045eb0f0922f32efd1da961373942e1dd71a25d1dcbb8f9a854df4090
-
Filesize
178KB
MD553c801d40fdeba50759aa01a79689f3b
SHA1ec10c13a31dcd3053e349b3090335cc500b79cae
SHA2566ec724a1143d1ea16fefc98d9a3904fb8ffb29b5eb678aa361e12a9177caedb9
SHA51294343c7d44624a220985b80e6d216438286b21a2b77dd9e2f033acf5259a114fdf929eca96c7f32e9b3854748b58aeb85e769ec9a67980507802fc070415fb6b
-
Filesize
178KB
MD553c801d40fdeba50759aa01a79689f3b
SHA1ec10c13a31dcd3053e349b3090335cc500b79cae
SHA2566ec724a1143d1ea16fefc98d9a3904fb8ffb29b5eb678aa361e12a9177caedb9
SHA51294343c7d44624a220985b80e6d216438286b21a2b77dd9e2f033acf5259a114fdf929eca96c7f32e9b3854748b58aeb85e769ec9a67980507802fc070415fb6b
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
268KB
MD5e86de67882ac742a7091309a939e6c63
SHA1cd635c0645a5d0e19d6387c4600f924b0d16a364
SHA256faa3f40837d968f8e176f33641dda765fa820f8ab9796c0b82c76f360a57f748
SHA5123425f6f52087f451b4354bfc1203ba8e4da7431588cdbfa79add3f661af2acea433cb79005025859a31197d242a0833c8079b7ce72a849078b3ec9794e9e547f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5