Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 22:28
Static task
static1
Behavioral task
behavioral1
Sample
51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe
Resource
win10v2004-20230220-en
General
-
Target
51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe
-
Size
566KB
-
MD5
2ab536372fe0d611fa7d5f72534e32b9
-
SHA1
554a1e9cc339b492b8463395845786f4ea2a165e
-
SHA256
51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3
-
SHA512
0f976b342fd85b54e9722795bbab37701cfff9e36931fbe47947a6be5d3034310d9cc5d2aa86022f443e960c340a72abb73e9bc7d9d3f1292bf3a4c76a34c682
-
SSDEEP
12288:cMr9y90dHbJJR4yE7H+ifGFNuaCErlcAJI:Jya7qvwFNbCAfI
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l2383513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l2383513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l2383513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l2383513.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l2383513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l2383513.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m9559836.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 5096 y0641083.exe 1324 k2631310.exe 4344 l2383513.exe 3632 m9559836.exe 3184 oneetx.exe 1260 oneetx.exe 4712 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4240 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l2383513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l2383513.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0641083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0641083.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4436 3632 WerFault.exe 93 4320 3632 WerFault.exe 93 448 3632 WerFault.exe 93 3736 3632 WerFault.exe 93 4240 3632 WerFault.exe 93 3860 3632 WerFault.exe 93 4276 3632 WerFault.exe 93 1216 3632 WerFault.exe 93 3780 3632 WerFault.exe 93 2132 3632 WerFault.exe 93 2976 3184 WerFault.exe 113 1568 3184 WerFault.exe 113 3924 3184 WerFault.exe 113 3856 3184 WerFault.exe 113 3740 3184 WerFault.exe 113 1880 3184 WerFault.exe 113 400 3184 WerFault.exe 113 1420 3184 WerFault.exe 113 5044 3184 WerFault.exe 113 760 3184 WerFault.exe 113 1872 3184 WerFault.exe 113 3272 3184 WerFault.exe 113 1440 3184 WerFault.exe 113 5092 3184 WerFault.exe 113 1336 3184 WerFault.exe 113 1836 1260 WerFault.exe 156 5088 3184 WerFault.exe 113 3764 3184 WerFault.exe 113 4968 3184 WerFault.exe 113 1472 4712 WerFault.exe 166 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2328 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1324 k2631310.exe 1324 k2631310.exe 4344 l2383513.exe 4344 l2383513.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1324 k2631310.exe Token: SeDebugPrivilege 4344 l2383513.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3632 m9559836.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1512 wrote to memory of 5096 1512 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe 84 PID 1512 wrote to memory of 5096 1512 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe 84 PID 1512 wrote to memory of 5096 1512 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe 84 PID 5096 wrote to memory of 1324 5096 y0641083.exe 85 PID 5096 wrote to memory of 1324 5096 y0641083.exe 85 PID 5096 wrote to memory of 1324 5096 y0641083.exe 85 PID 5096 wrote to memory of 4344 5096 y0641083.exe 92 PID 5096 wrote to memory of 4344 5096 y0641083.exe 92 PID 5096 wrote to memory of 4344 5096 y0641083.exe 92 PID 1512 wrote to memory of 3632 1512 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe 93 PID 1512 wrote to memory of 3632 1512 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe 93 PID 1512 wrote to memory of 3632 1512 51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe 93 PID 3632 wrote to memory of 3184 3632 m9559836.exe 113 PID 3632 wrote to memory of 3184 3632 m9559836.exe 113 PID 3632 wrote to memory of 3184 3632 m9559836.exe 113 PID 3184 wrote to memory of 2328 3184 oneetx.exe 130 PID 3184 wrote to memory of 2328 3184 oneetx.exe 130 PID 3184 wrote to memory of 2328 3184 oneetx.exe 130 PID 3184 wrote to memory of 796 3184 oneetx.exe 136 PID 3184 wrote to memory of 796 3184 oneetx.exe 136 PID 3184 wrote to memory of 796 3184 oneetx.exe 136 PID 796 wrote to memory of 216 796 cmd.exe 140 PID 796 wrote to memory of 216 796 cmd.exe 140 PID 796 wrote to memory of 216 796 cmd.exe 140 PID 796 wrote to memory of 632 796 cmd.exe 141 PID 796 wrote to memory of 632 796 cmd.exe 141 PID 796 wrote to memory of 632 796 cmd.exe 141 PID 796 wrote to memory of 4780 796 cmd.exe 142 PID 796 wrote to memory of 4780 796 cmd.exe 142 PID 796 wrote to memory of 4780 796 cmd.exe 142 PID 796 wrote to memory of 2576 796 cmd.exe 144 PID 796 wrote to memory of 2576 796 cmd.exe 144 PID 796 wrote to memory of 2576 796 cmd.exe 144 PID 796 wrote to memory of 4604 796 cmd.exe 143 PID 796 wrote to memory of 4604 796 cmd.exe 143 PID 796 wrote to memory of 4604 796 cmd.exe 143 PID 796 wrote to memory of 3256 796 cmd.exe 145 PID 796 wrote to memory of 3256 796 cmd.exe 145 PID 796 wrote to memory of 3256 796 cmd.exe 145 PID 3184 wrote to memory of 4240 3184 oneetx.exe 161 PID 3184 wrote to memory of 4240 3184 oneetx.exe 161 PID 3184 wrote to memory of 4240 3184 oneetx.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe"C:\Users\Admin\AppData\Local\Temp\51840cb7eebab55dbdf2400464817353def0dd3d2b549bc65897eab4d54f13b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0641083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0641083.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2631310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2631310.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2383513.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2383513.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9559836.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9559836.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 6963⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7803⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 7963⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9723⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10003⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9603⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 12163⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 11923⤵
- Program crash
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 13163⤵
- Program crash
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 6924⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 8844⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 9484⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 10804⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 9524⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 9524⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 11444⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 10204⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 11124⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 9084⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7844⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7284⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7764⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 14764⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 11044⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 16524⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 14764⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 16604⤵
- Program crash
PID:4968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 13643⤵
- Program crash
PID:2132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3632 -ip 36321⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3632 -ip 36321⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3632 -ip 36321⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3632 -ip 36321⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3632 -ip 36321⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3632 -ip 36321⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3632 -ip 36321⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3632 -ip 36321⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3632 -ip 36321⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3632 -ip 36321⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3184 -ip 31841⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3184 -ip 31841⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3184 -ip 31841⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3184 -ip 31841⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3184 -ip 31841⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3184 -ip 31841⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3184 -ip 31841⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3184 -ip 31841⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3184 -ip 31841⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3184 -ip 31841⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3184 -ip 31841⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3184 -ip 31841⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3184 -ip 31841⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3184 -ip 31841⤵PID:2620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3184 -ip 31841⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 3122⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1260 -ip 12601⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3184 -ip 31841⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3184 -ip 31841⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3184 -ip 31841⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 3162⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4712 -ip 47121⤵PID:4224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
307KB
MD565abf8fed4d32def039342f0757ebf0a
SHA178536377c6f2518e2eec3ded8f6f53efb442ed93
SHA256d9e6b2df01b8517bd4dd7c2e57d0f5f47a737931cd3c3ba4a21c2a5b674c6d17
SHA512c553aeabe750c204543d330ffeee500cc97b37df4e44f4ee59a86c5a88d4b3e4ef473f9ff42b8fe883cb2f653427b589bca1188c176cb8008732981399f5f1ef
-
Filesize
307KB
MD565abf8fed4d32def039342f0757ebf0a
SHA178536377c6f2518e2eec3ded8f6f53efb442ed93
SHA256d9e6b2df01b8517bd4dd7c2e57d0f5f47a737931cd3c3ba4a21c2a5b674c6d17
SHA512c553aeabe750c204543d330ffeee500cc97b37df4e44f4ee59a86c5a88d4b3e4ef473f9ff42b8fe883cb2f653427b589bca1188c176cb8008732981399f5f1ef
-
Filesize
168KB
MD59bd091193315dcd4d60ccc3726925f28
SHA1822411354bd418a64ae206dd7bebcf97818b2cdf
SHA256f8333f8e46ce1a40a777fb896243e5a44b56418ad4b5c74363e4fcd3b212dd36
SHA5122504f06be008454eb480caf62cefdc9951e642070c21cb239b7ab94210785f323e0ce56ef71224213f848227800cfac4cd10823120991c9e8a24faa3281dc4b0
-
Filesize
168KB
MD59bd091193315dcd4d60ccc3726925f28
SHA1822411354bd418a64ae206dd7bebcf97818b2cdf
SHA256f8333f8e46ce1a40a777fb896243e5a44b56418ad4b5c74363e4fcd3b212dd36
SHA5122504f06be008454eb480caf62cefdc9951e642070c21cb239b7ab94210785f323e0ce56ef71224213f848227800cfac4cd10823120991c9e8a24faa3281dc4b0
-
Filesize
178KB
MD51afbbb1125e8ec689c97fe36e706594b
SHA1dbbc9f0584b56a408a1c3d02734517914622526c
SHA25617e8eb4c75c2fa99cfb90a7b82719da253119cac83ad091c3754102a11c20a58
SHA512c86596471e85ae512e94da1a80b4eff1d0725b2832e9f5b6f58d793e0c3102b55c0b52e572e534b9dce667b588c9ea71e8d129909aae33f78405a6ce06833789
-
Filesize
178KB
MD51afbbb1125e8ec689c97fe36e706594b
SHA1dbbc9f0584b56a408a1c3d02734517914622526c
SHA25617e8eb4c75c2fa99cfb90a7b82719da253119cac83ad091c3754102a11c20a58
SHA512c86596471e85ae512e94da1a80b4eff1d0725b2832e9f5b6f58d793e0c3102b55c0b52e572e534b9dce667b588c9ea71e8d129909aae33f78405a6ce06833789
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
268KB
MD5da538837f13e63558030345a839b9b6c
SHA11aa65c3ab2c6c06ecc03a3a9a63895279999762a
SHA2560441e30520d11daca5dd7b965763805e80f58c612dce9afcba5b170a698dbc39
SHA5128889b8bd888eea69138d56f3d9ec9d3b9fc85b8cceedb048676a62c5b2673e6bcbeade60ed314ff290bd7878e12fa68adbf0ea479618f06799fee818638b71fb
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5