Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe
Resource
win10v2004-20230220-en
General
-
Target
aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe
-
Size
643KB
-
MD5
532be5d475eaf6ec85462afedc272462
-
SHA1
4e46cd8fd3db55f9ee1da190bc3b4f248090b923
-
SHA256
aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd
-
SHA512
3cfbfd6b1ce6d5d818383ff9b0f40249ca55ce15832d50f001ee4655081213e35ed9afa318bed72db81eb0c80bd57e53397295200d3f0dd681bbd538731a302a
-
SSDEEP
12288:vMrdy90Trk93VzHBJp+HOgljUGM8qCAOBmWwMCEmd7auvpxhNGqOl/:ay79qO4jUGMiA9DZEm1pvpxzGqOl/
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h6495452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h6495452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h6495452.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h6495452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h6495452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h6495452.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation i6290651.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1792 x3375455.exe 3660 g6195184.exe 3964 h6495452.exe 2216 i6290651.exe 1444 oneetx.exe 4472 oneetx.exe 1452 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4132 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h6495452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h6495452.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3375455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3375455.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 856 3964 WerFault.exe 92 2408 2216 WerFault.exe 97 4828 2216 WerFault.exe 97 1244 2216 WerFault.exe 97 3192 2216 WerFault.exe 97 4844 2216 WerFault.exe 97 5008 2216 WerFault.exe 97 3700 2216 WerFault.exe 97 3372 2216 WerFault.exe 97 2152 2216 WerFault.exe 97 1272 2216 WerFault.exe 97 1668 1444 WerFault.exe 116 2788 1444 WerFault.exe 116 4064 1444 WerFault.exe 116 4456 1444 WerFault.exe 116 3596 1444 WerFault.exe 116 1540 1444 WerFault.exe 116 4772 1444 WerFault.exe 116 1324 1444 WerFault.exe 116 4892 1444 WerFault.exe 116 1572 1444 WerFault.exe 116 4316 1444 WerFault.exe 116 4476 1444 WerFault.exe 116 1208 1444 WerFault.exe 116 3676 4472 WerFault.exe 155 1356 1444 WerFault.exe 116 2516 1444 WerFault.exe 116 3700 1444 WerFault.exe 116 3320 1452 WerFault.exe 165 1604 1444 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3660 g6195184.exe 3660 g6195184.exe 3964 h6495452.exe 3964 h6495452.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3660 g6195184.exe Token: SeDebugPrivilege 3964 h6495452.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 i6290651.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 784 wrote to memory of 1792 784 aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe 84 PID 784 wrote to memory of 1792 784 aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe 84 PID 784 wrote to memory of 1792 784 aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe 84 PID 1792 wrote to memory of 3660 1792 x3375455.exe 85 PID 1792 wrote to memory of 3660 1792 x3375455.exe 85 PID 1792 wrote to memory of 3660 1792 x3375455.exe 85 PID 1792 wrote to memory of 3964 1792 x3375455.exe 92 PID 1792 wrote to memory of 3964 1792 x3375455.exe 92 PID 1792 wrote to memory of 3964 1792 x3375455.exe 92 PID 784 wrote to memory of 2216 784 aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe 97 PID 784 wrote to memory of 2216 784 aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe 97 PID 784 wrote to memory of 2216 784 aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe 97 PID 2216 wrote to memory of 1444 2216 i6290651.exe 116 PID 2216 wrote to memory of 1444 2216 i6290651.exe 116 PID 2216 wrote to memory of 1444 2216 i6290651.exe 116 PID 1444 wrote to memory of 3888 1444 oneetx.exe 133 PID 1444 wrote to memory of 3888 1444 oneetx.exe 133 PID 1444 wrote to memory of 3888 1444 oneetx.exe 133 PID 1444 wrote to memory of 852 1444 oneetx.exe 139 PID 1444 wrote to memory of 852 1444 oneetx.exe 139 PID 1444 wrote to memory of 852 1444 oneetx.exe 139 PID 852 wrote to memory of 2564 852 cmd.exe 143 PID 852 wrote to memory of 2564 852 cmd.exe 143 PID 852 wrote to memory of 2564 852 cmd.exe 143 PID 852 wrote to memory of 4172 852 cmd.exe 144 PID 852 wrote to memory of 4172 852 cmd.exe 144 PID 852 wrote to memory of 4172 852 cmd.exe 144 PID 852 wrote to memory of 3400 852 cmd.exe 145 PID 852 wrote to memory of 3400 852 cmd.exe 145 PID 852 wrote to memory of 3400 852 cmd.exe 145 PID 852 wrote to memory of 684 852 cmd.exe 146 PID 852 wrote to memory of 684 852 cmd.exe 146 PID 852 wrote to memory of 684 852 cmd.exe 146 PID 852 wrote to memory of 3720 852 cmd.exe 147 PID 852 wrote to memory of 3720 852 cmd.exe 147 PID 852 wrote to memory of 3720 852 cmd.exe 147 PID 852 wrote to memory of 5016 852 cmd.exe 148 PID 852 wrote to memory of 5016 852 cmd.exe 148 PID 852 wrote to memory of 5016 852 cmd.exe 148 PID 1444 wrote to memory of 4132 1444 oneetx.exe 162 PID 1444 wrote to memory of 4132 1444 oneetx.exe 162 PID 1444 wrote to memory of 4132 1444 oneetx.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe"C:\Users\Admin\AppData\Local\Temp\aadfba45456c88e77ffc81c04db461c55624290008f92197dd78474c5840a8bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3375455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3375455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6195184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6195184.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6495452.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6495452.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 10844⤵
- Program crash
PID:856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6290651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6290651.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 6963⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 7803⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 7963⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 9723⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 9763⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 9763⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 12203⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 12563⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 13163⤵
- Program crash
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 6924⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 8844⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 9444⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 10524⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 10604⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 10604⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 11044⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 9924⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 7764⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 12924⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 12724⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 7524⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 9924⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 11364⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 16404⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 15524⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 10764⤵
- Program crash
PID:1604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 17563⤵
- Program crash
PID:1272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3964 -ip 39641⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2216 -ip 22161⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2216 -ip 22161⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2216 -ip 22161⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2216 -ip 22161⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2216 -ip 22161⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2216 -ip 22161⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2216 -ip 22161⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2216 -ip 22161⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2216 -ip 22161⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2216 -ip 22161⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1444 -ip 14441⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1444 -ip 14441⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1444 -ip 14441⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1444 -ip 14441⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 1444 -ip 14441⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1444 -ip 14441⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1444 -ip 14441⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1444 -ip 14441⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1444 -ip 14441⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1444 -ip 14441⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1444 -ip 14441⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1444 -ip 14441⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1444 -ip 14441⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 3202⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4472 -ip 44721⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1444 -ip 14441⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1444 -ip 14441⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1444 -ip 14441⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 3162⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1452 -ip 14521⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1444 -ip 14441⤵PID:2708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
383KB
MD578d4c444276d9135d7e114dc2ddaaefb
SHA19490cf6adc9e56fad98600b05af2b61a670e6ec6
SHA256a04fdd1489904081ec086cb7c5f6c5a420b50071d7602b7fe018665d23070d07
SHA512672b7b7b906c008840e758b6b53e23e5825d6101b5150d8dcac20768fa13e1b628190356477aacb61b3158aa09b2e9e2aba8666525596a4c78a723024601c4e6
-
Filesize
383KB
MD578d4c444276d9135d7e114dc2ddaaefb
SHA19490cf6adc9e56fad98600b05af2b61a670e6ec6
SHA256a04fdd1489904081ec086cb7c5f6c5a420b50071d7602b7fe018665d23070d07
SHA512672b7b7b906c008840e758b6b53e23e5825d6101b5150d8dcac20768fa13e1b628190356477aacb61b3158aa09b2e9e2aba8666525596a4c78a723024601c4e6
-
Filesize
168KB
MD5bd35cfa70803884fd8eb5ae7388d2dd9
SHA158ee69efc9e43094784a2332d0181f885275110f
SHA2560a31864204e1e93a1fbde5245cac71000c78df7849b4bec58ec42faca4b14cc9
SHA51200ed602d113dcc44b11b0189ffb5623e7d0676a2025d6fdacecbd136f9feb38a194228688974fa6ae4d9d132a69cabe539932a6223e48c7e9f634e27feaa3338
-
Filesize
168KB
MD5bd35cfa70803884fd8eb5ae7388d2dd9
SHA158ee69efc9e43094784a2332d0181f885275110f
SHA2560a31864204e1e93a1fbde5245cac71000c78df7849b4bec58ec42faca4b14cc9
SHA51200ed602d113dcc44b11b0189ffb5623e7d0676a2025d6fdacecbd136f9feb38a194228688974fa6ae4d9d132a69cabe539932a6223e48c7e9f634e27feaa3338
-
Filesize
292KB
MD55df335697aeaf59a00561dc82ccadc1e
SHA1d30770e8ef6c90073f9d1563fc4710fa80be9f9d
SHA2569ed2c684ef73d63745eba217c102573f40c0f0f5ba977750d66da3352d069ca0
SHA5120001eb310042dc3cf282643ef7e6b45a6bf93df1c5de09e94ef78dba4f6682d4dc0c2d0318e45eda3643d02aa72908411a78a8ea8c91ba3aea7a3321a08a5173
-
Filesize
292KB
MD55df335697aeaf59a00561dc82ccadc1e
SHA1d30770e8ef6c90073f9d1563fc4710fa80be9f9d
SHA2569ed2c684ef73d63745eba217c102573f40c0f0f5ba977750d66da3352d069ca0
SHA5120001eb310042dc3cf282643ef7e6b45a6bf93df1c5de09e94ef78dba4f6682d4dc0c2d0318e45eda3643d02aa72908411a78a8ea8c91ba3aea7a3321a08a5173
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
271KB
MD54dfd92b8c6628e39dc99d65d0c4445ee
SHA190a0078a1a1a87d71d2fb7c4c077a425794def68
SHA256626a1fd221fb8313911913b8c6a241927f8a8dc66a8bc55c1f1ec3d726561c21
SHA51243549e3e88714a5dc78b8241e69402502099913d3d55c939b9e0bbb741911743481fd42c5ed5f387897ba8b056b385a9124c81464be0204b31c18ce16d6b4f4b
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5