Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 22:30
Static task
static1
Behavioral task
behavioral1
Sample
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe
Resource
win10v2004-20230220-en
General
-
Target
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe
-
Size
566KB
-
MD5
4e1bacfcd84705b4cf20a1f794ee5145
-
SHA1
f8a78002722c75fdef79a1ee0f025d972d2ad37f
-
SHA256
f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a
-
SHA512
7c81c0963a08c99ff473ea2fa3c979bd669cdbdf7f1614ea0412a57bbef300a22e059f59fa34b48b317470e0d65f2e7bdef6cf74b8ef822aa01cc88207656fa6
-
SSDEEP
12288:9Mrky90yN/7lIQwgCKug+HOybVYBYl6yACz5zE6/w+:py1rQuL26PC6S
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l3795112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l3795112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l3795112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l3795112.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l3795112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l3795112.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m1964496.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2840 y5661592.exe 1108 k1312240.exe 3172 l3795112.exe 4752 m1964496.exe 628 oneetx.exe 2256 oneetx.exe 3956 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1036 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l3795112.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l3795112.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5661592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5661592.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 1000 4752 WerFault.exe 93 5104 4752 WerFault.exe 93 4748 4752 WerFault.exe 93 3828 4752 WerFault.exe 93 3360 4752 WerFault.exe 93 2112 4752 WerFault.exe 93 456 4752 WerFault.exe 93 1268 4752 WerFault.exe 93 4676 4752 WerFault.exe 93 2348 4752 WerFault.exe 93 4536 628 WerFault.exe 114 2452 628 WerFault.exe 114 2404 628 WerFault.exe 114 3112 628 WerFault.exe 114 3872 628 WerFault.exe 114 1352 628 WerFault.exe 114 2080 628 WerFault.exe 114 2056 628 WerFault.exe 114 4876 628 WerFault.exe 114 804 628 WerFault.exe 114 268 628 WerFault.exe 114 3148 628 WerFault.exe 114 1436 628 WerFault.exe 114 3888 2256 WerFault.exe 153 3664 628 WerFault.exe 114 4952 628 WerFault.exe 114 4000 628 WerFault.exe 114 432 3956 WerFault.exe 163 3832 628 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1108 k1312240.exe 1108 k1312240.exe 3172 l3795112.exe 3172 l3795112.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1108 k1312240.exe Token: SeDebugPrivilege 3172 l3795112.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4752 m1964496.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2840 2612 f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe 84 PID 2612 wrote to memory of 2840 2612 f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe 84 PID 2612 wrote to memory of 2840 2612 f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe 84 PID 2840 wrote to memory of 1108 2840 y5661592.exe 85 PID 2840 wrote to memory of 1108 2840 y5661592.exe 85 PID 2840 wrote to memory of 1108 2840 y5661592.exe 85 PID 2840 wrote to memory of 3172 2840 y5661592.exe 92 PID 2840 wrote to memory of 3172 2840 y5661592.exe 92 PID 2840 wrote to memory of 3172 2840 y5661592.exe 92 PID 2612 wrote to memory of 4752 2612 f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe 93 PID 2612 wrote to memory of 4752 2612 f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe 93 PID 2612 wrote to memory of 4752 2612 f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe 93 PID 4752 wrote to memory of 628 4752 m1964496.exe 114 PID 4752 wrote to memory of 628 4752 m1964496.exe 114 PID 4752 wrote to memory of 628 4752 m1964496.exe 114 PID 628 wrote to memory of 1680 628 oneetx.exe 131 PID 628 wrote to memory of 1680 628 oneetx.exe 131 PID 628 wrote to memory of 1680 628 oneetx.exe 131 PID 628 wrote to memory of 2192 628 oneetx.exe 137 PID 628 wrote to memory of 2192 628 oneetx.exe 137 PID 628 wrote to memory of 2192 628 oneetx.exe 137 PID 2192 wrote to memory of 4808 2192 cmd.exe 141 PID 2192 wrote to memory of 4808 2192 cmd.exe 141 PID 2192 wrote to memory of 4808 2192 cmd.exe 141 PID 2192 wrote to memory of 2136 2192 cmd.exe 142 PID 2192 wrote to memory of 2136 2192 cmd.exe 142 PID 2192 wrote to memory of 2136 2192 cmd.exe 142 PID 2192 wrote to memory of 4124 2192 cmd.exe 143 PID 2192 wrote to memory of 4124 2192 cmd.exe 143 PID 2192 wrote to memory of 4124 2192 cmd.exe 143 PID 2192 wrote to memory of 700 2192 cmd.exe 144 PID 2192 wrote to memory of 700 2192 cmd.exe 144 PID 2192 wrote to memory of 700 2192 cmd.exe 144 PID 2192 wrote to memory of 4304 2192 cmd.exe 145 PID 2192 wrote to memory of 4304 2192 cmd.exe 145 PID 2192 wrote to memory of 4304 2192 cmd.exe 145 PID 2192 wrote to memory of 4532 2192 cmd.exe 146 PID 2192 wrote to memory of 4532 2192 cmd.exe 146 PID 2192 wrote to memory of 4532 2192 cmd.exe 146 PID 628 wrote to memory of 1036 628 oneetx.exe 160 PID 628 wrote to memory of 1036 628 oneetx.exe 160 PID 628 wrote to memory of 1036 628 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe"C:\Users\Admin\AppData\Local\Temp\f43124385d79d157fdbc4a17bf45b8a32d9d78a796198e073a97baaa1e50610a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5661592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5661592.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1312240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1312240.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3795112.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3795112.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1964496.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1964496.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 6963⤵
- Program crash
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 7803⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 8563⤵
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 9523⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 9843⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 9843⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 12163⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 12323⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 13123⤵
- Program crash
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 6924⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 8364⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9124⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 10604⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 10524⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 10524⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 11084⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 9924⤵
- Program crash
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 8004⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:700
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 8364⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 12644⤵
- Program crash
PID:268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 13044⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 13284⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 11484⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 16124⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 15604⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 16284⤵
- Program crash
PID:3832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 13643⤵
- Program crash
PID:2348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4752 -ip 47521⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4752 -ip 47521⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4752 -ip 47521⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4752 -ip 47521⤵PID:2620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4752 -ip 47521⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4752 -ip 47521⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4752 -ip 47521⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4752 -ip 47521⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4752 -ip 47521⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4752 -ip 47521⤵PID:112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 628 -ip 6281⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 628 -ip 6281⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 628 -ip 6281⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 628 -ip 6281⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 628 -ip 6281⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 628 -ip 6281⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 628 -ip 6281⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 628 -ip 6281⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 628 -ip 6281⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 628 -ip 6281⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 628 -ip 6281⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 628 -ip 6281⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 628 -ip 6281⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 3122⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2256 -ip 22561⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 628 -ip 6281⤵PID:1000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 628 -ip 6281⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 628 -ip 6281⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 3202⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3956 -ip 39561⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 628 -ip 6281⤵PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
308KB
MD564f4c2b2dd3faf2aef8a8f73bfff08c7
SHA1f31ab39f53e80828c580a0858ce8c931977bad2c
SHA256ad0ad9df7ecfe9698eadd0c8896533ca2219a195f931ee70fed2e30e1cb2e857
SHA512be1ac09cb232d647a8a6d98b5578b3cd2985b39181cc498829158b43a201f9de3c6bd32241c8e3524947b8a2d78e26e248b84ed5654b73eec6042ba3cf279c38
-
Filesize
308KB
MD564f4c2b2dd3faf2aef8a8f73bfff08c7
SHA1f31ab39f53e80828c580a0858ce8c931977bad2c
SHA256ad0ad9df7ecfe9698eadd0c8896533ca2219a195f931ee70fed2e30e1cb2e857
SHA512be1ac09cb232d647a8a6d98b5578b3cd2985b39181cc498829158b43a201f9de3c6bd32241c8e3524947b8a2d78e26e248b84ed5654b73eec6042ba3cf279c38
-
Filesize
168KB
MD530067bccc1aefec77916af41e7036794
SHA17f17799d25f752e0250903db92d6978db20ed58d
SHA256cf48a779d22143be9557a811fcfd0c461683a5ce034dfe5170b2dfd6284e3fa1
SHA51290bb7c335beef8ec2ac5915fce1f4ba0e6a67b89b147388a7b73b835e305faa38d77be8819405cc75e3c4db981451818157991b8edc4346d27e619f86d6b4d72
-
Filesize
168KB
MD530067bccc1aefec77916af41e7036794
SHA17f17799d25f752e0250903db92d6978db20ed58d
SHA256cf48a779d22143be9557a811fcfd0c461683a5ce034dfe5170b2dfd6284e3fa1
SHA51290bb7c335beef8ec2ac5915fce1f4ba0e6a67b89b147388a7b73b835e305faa38d77be8819405cc75e3c4db981451818157991b8edc4346d27e619f86d6b4d72
-
Filesize
178KB
MD5ee9dc35526a103dfcdd876cfa86aa841
SHA1798361bbe2901b16791392ded696d7fb2ed6ccac
SHA256c47461a5daf4bd1a1d0406b0534f5eaa319ed48f34bfb02c1ea424bf3f2a90e2
SHA51258da2eb1b9cfc416d073f9e6446d83d6d5c073341328517d506c31fd51e58fe6bb8228cddb8a65513415168e276ccc8e0535f1a1dc877a95cd5e28fdd8af8d77
-
Filesize
178KB
MD5ee9dc35526a103dfcdd876cfa86aa841
SHA1798361bbe2901b16791392ded696d7fb2ed6ccac
SHA256c47461a5daf4bd1a1d0406b0534f5eaa319ed48f34bfb02c1ea424bf3f2a90e2
SHA51258da2eb1b9cfc416d073f9e6446d83d6d5c073341328517d506c31fd51e58fe6bb8228cddb8a65513415168e276ccc8e0535f1a1dc877a95cd5e28fdd8af8d77
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
268KB
MD5e51ccc458ab98f7f18393dd87a709a5b
SHA10fdfb048f851a5b8ed2e27ddcc78840865afe8ba
SHA256955fbad065df31c0ce4b85b15684e0b19148c6a9c12d55e3a046713e72ffd896
SHA512c3957bf35cd928e993b323f87c2f73eb79ff8c420c5fcf674921e00d1588aff07f410bb7d0ef06b6abe38a200c93d44f2d2111fc208c7f5f80798ca6a352d237
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5