Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe
Resource
win10v2004-20230220-en
General
-
Target
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe
-
Size
567KB
-
MD5
551aabc308baa115813abbb911ab1401
-
SHA1
4f50c46190948b290c7f463d03bde9c323ce7949
-
SHA256
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5
-
SHA512
59a9c3359e32b32991261d2521cd48906770c041ca4008ace91c126cecd6054e69c0ba716299b297dc84598aa0d1341a8a5104a98d43e177d928a3b25fd9c483
-
SSDEEP
12288:JMrFy90k+ajqIEkd4PUAwJUhyMfzM9LaLVioMj8hmaHZJ:syHrEKuUwXSaLEJj8ooJ
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l0562507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l0562507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l0562507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l0562507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l0562507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l0562507.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation m3460415.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4800 y0126877.exe 1456 k7824875.exe 1948 l0562507.exe 1252 m3460415.exe 2272 oneetx.exe 1112 oneetx.exe 2356 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3484 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l0562507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l0562507.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0126877.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0126877.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 2456 1252 WerFault.exe 94 3412 1252 WerFault.exe 94 2004 1252 WerFault.exe 94 1800 1252 WerFault.exe 94 2908 1252 WerFault.exe 94 1080 1252 WerFault.exe 94 2972 1252 WerFault.exe 94 3572 1252 WerFault.exe 94 4672 1252 WerFault.exe 94 4236 1252 WerFault.exe 94 3392 2272 WerFault.exe 114 264 2272 WerFault.exe 114 4696 2272 WerFault.exe 114 1528 2272 WerFault.exe 114 4768 2272 WerFault.exe 114 1260 2272 WerFault.exe 114 1440 2272 WerFault.exe 114 940 2272 WerFault.exe 114 1120 2272 WerFault.exe 114 336 2272 WerFault.exe 114 652 2272 WerFault.exe 114 2696 2272 WerFault.exe 114 3052 2272 WerFault.exe 114 2720 2272 WerFault.exe 114 4448 1112 WerFault.exe 155 5076 2272 WerFault.exe 114 3512 2272 WerFault.exe 114 3416 2272 WerFault.exe 114 3788 2356 WerFault.exe 165 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1456 k7824875.exe 1456 k7824875.exe 1948 l0562507.exe 1948 l0562507.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1456 k7824875.exe Token: SeDebugPrivilege 1948 l0562507.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 m3460415.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4800 2072 d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe 84 PID 2072 wrote to memory of 4800 2072 d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe 84 PID 2072 wrote to memory of 4800 2072 d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe 84 PID 4800 wrote to memory of 1456 4800 y0126877.exe 85 PID 4800 wrote to memory of 1456 4800 y0126877.exe 85 PID 4800 wrote to memory of 1456 4800 y0126877.exe 85 PID 4800 wrote to memory of 1948 4800 y0126877.exe 92 PID 4800 wrote to memory of 1948 4800 y0126877.exe 92 PID 4800 wrote to memory of 1948 4800 y0126877.exe 92 PID 2072 wrote to memory of 1252 2072 d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe 94 PID 2072 wrote to memory of 1252 2072 d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe 94 PID 2072 wrote to memory of 1252 2072 d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe 94 PID 1252 wrote to memory of 2272 1252 m3460415.exe 114 PID 1252 wrote to memory of 2272 1252 m3460415.exe 114 PID 1252 wrote to memory of 2272 1252 m3460415.exe 114 PID 2272 wrote to memory of 3232 2272 oneetx.exe 131 PID 2272 wrote to memory of 3232 2272 oneetx.exe 131 PID 2272 wrote to memory of 3232 2272 oneetx.exe 131 PID 2272 wrote to memory of 4012 2272 oneetx.exe 137 PID 2272 wrote to memory of 4012 2272 oneetx.exe 137 PID 2272 wrote to memory of 4012 2272 oneetx.exe 137 PID 4012 wrote to memory of 2888 4012 cmd.exe 141 PID 4012 wrote to memory of 2888 4012 cmd.exe 141 PID 4012 wrote to memory of 2888 4012 cmd.exe 141 PID 4012 wrote to memory of 3016 4012 cmd.exe 142 PID 4012 wrote to memory of 3016 4012 cmd.exe 142 PID 4012 wrote to memory of 3016 4012 cmd.exe 142 PID 4012 wrote to memory of 4492 4012 cmd.exe 143 PID 4012 wrote to memory of 4492 4012 cmd.exe 143 PID 4012 wrote to memory of 4492 4012 cmd.exe 143 PID 4012 wrote to memory of 1196 4012 cmd.exe 144 PID 4012 wrote to memory of 1196 4012 cmd.exe 144 PID 4012 wrote to memory of 1196 4012 cmd.exe 144 PID 4012 wrote to memory of 2832 4012 cmd.exe 145 PID 4012 wrote to memory of 2832 4012 cmd.exe 145 PID 4012 wrote to memory of 2832 4012 cmd.exe 145 PID 4012 wrote to memory of 4556 4012 cmd.exe 146 PID 4012 wrote to memory of 4556 4012 cmd.exe 146 PID 4012 wrote to memory of 4556 4012 cmd.exe 146 PID 2272 wrote to memory of 3484 2272 oneetx.exe 160 PID 2272 wrote to memory of 3484 2272 oneetx.exe 160 PID 2272 wrote to memory of 3484 2272 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe"C:\Users\Admin\AppData\Local\Temp\d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0126877.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0126877.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7824875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7824875.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0562507.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0562507.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3460415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3460415.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 6963⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 7803⤵
- Program crash
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 7963⤵
- Program crash
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 9683⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8763⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8123⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 11803⤵
- Program crash
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 12363⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 13163⤵
- Program crash
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 7004⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 8484⤵
- Program crash
PID:264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 8924⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 10524⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 10724⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 10644⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 11084⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 9924⤵
- Program crash
PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 7764⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 13364⤵
- Program crash
PID:336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 7764⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 1324⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 9044⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 10924⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 16084⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 13644⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 16244⤵
- Program crash
PID:3416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8043⤵
- Program crash
PID:4236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1252 -ip 12521⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1252 -ip 12521⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1252 -ip 12521⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1252 -ip 12521⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1252 -ip 12521⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1252 -ip 12521⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1252 -ip 12521⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1252 -ip 12521⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1252 -ip 12521⤵PID:672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1252 -ip 12521⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2272 -ip 22721⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2272 -ip 22721⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2272 -ip 22721⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2272 -ip 22721⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2272 -ip 22721⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2272 -ip 22721⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2272 -ip 22721⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2272 -ip 22721⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2272 -ip 22721⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2272 -ip 22721⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2272 -ip 22721⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2272 -ip 22721⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2272 -ip 22721⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2272 -ip 22721⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 3122⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1112 -ip 11121⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2272 -ip 22721⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2272 -ip 22721⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2272 -ip 22721⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 3122⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2356 -ip 23561⤵PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
307KB
MD55d9365dbd0412d93b4610d15819aea32
SHA1ca17628605edf3d7b618c0833fc91842fb745722
SHA25604d3b837daa902c7921d2a19dcc0d925c132e380af088cba0776c2fa25a6a52f
SHA51243941ab29754909591865cd0e37aa51d8a6921f2e21ee5c20b2e3eebfa17992041fb52ed93829199bd09b7cd1d35f0c9bfc5f92bd04addef4da68274f9eb55e3
-
Filesize
307KB
MD55d9365dbd0412d93b4610d15819aea32
SHA1ca17628605edf3d7b618c0833fc91842fb745722
SHA25604d3b837daa902c7921d2a19dcc0d925c132e380af088cba0776c2fa25a6a52f
SHA51243941ab29754909591865cd0e37aa51d8a6921f2e21ee5c20b2e3eebfa17992041fb52ed93829199bd09b7cd1d35f0c9bfc5f92bd04addef4da68274f9eb55e3
-
Filesize
168KB
MD53d6e302092eacd9610adf9084298c577
SHA141114a31e2fdf989dd9709aae6826872e5fa2679
SHA2567357fe75ad6a5411e9c739310b4abc9ec96ada04d2c604a4dd5d22b01f384cde
SHA51289705da14e3ea2ec8c01c98cfc923d83a601714a87719ed46b4b8fc6406a0cc6de18ac0fda075aa59f38883d7b45d2b3d4c16777ce70183c6271fc5732e1779a
-
Filesize
168KB
MD53d6e302092eacd9610adf9084298c577
SHA141114a31e2fdf989dd9709aae6826872e5fa2679
SHA2567357fe75ad6a5411e9c739310b4abc9ec96ada04d2c604a4dd5d22b01f384cde
SHA51289705da14e3ea2ec8c01c98cfc923d83a601714a87719ed46b4b8fc6406a0cc6de18ac0fda075aa59f38883d7b45d2b3d4c16777ce70183c6271fc5732e1779a
-
Filesize
177KB
MD5079ca9cf7ac1e85abb9617439c661e90
SHA14f46a99099a897160198e10cbfbd27e8885012c1
SHA256fc36399dd04252171d8fa323013cb349e7a35676be499d2c3402de2d3f00cdab
SHA51269b5db24b705a396c0af9d04c5687711bb163a56ffded82169889bc2d2a85113b700927926717924cc062e0bbad2605e60cbea63d33851b83def0cf5b4875803
-
Filesize
177KB
MD5079ca9cf7ac1e85abb9617439c661e90
SHA14f46a99099a897160198e10cbfbd27e8885012c1
SHA256fc36399dd04252171d8fa323013cb349e7a35676be499d2c3402de2d3f00cdab
SHA51269b5db24b705a396c0af9d04c5687711bb163a56ffded82169889bc2d2a85113b700927926717924cc062e0bbad2605e60cbea63d33851b83def0cf5b4875803
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
271KB
MD53012e27a9421cf53243b56d1c8142243
SHA1f3d3a3fe052dc7d2f9867c690c3c626eb3b35114
SHA2564c1dad32a557dba6efe4c8e73c58b22962e35ec20fdd84ae5352a4fda0d26ca3
SHA512551039738dc1559a677eb6810dd65dc01d09475fc8902231e3443f756859807ebe10b9ff97e7e5fcfe9062aea28c7080cb54f89d23bf0905868bea58194cd890
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5