Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 20:40
Static task
static1
Behavioral task
behavioral1
Sample
eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe
Resource
win10v2004-20230220-en
General
-
Target
eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe
-
Size
566KB
-
MD5
111012ffd9002b9cf20c155f218eae78
-
SHA1
f6ec38e22f1f8f9adeeb6cf7485bacb36804d725
-
SHA256
eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745
-
SHA512
bf301827467f46e10f607613ee2daaa341f8b767042e0f8cfd03ec386cd9df7e79b9deb4ddf5f90cd13a8e1cfcf8ee5ca05473a56e8bdb9002727f8c71a26953
-
SSDEEP
12288:RMr1y90athA7wMtuhfLas8lMlrPBsOBfM/Ka9faG4B:wybYIhX8lGff60
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l9378729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l9378729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l9378729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l9378729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l9378729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l9378729.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m6016723.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1208 y2691567.exe 2452 k4942448.exe 548 l9378729.exe 4536 m6016723.exe 1472 oneetx.exe 1744 oneetx.exe 3656 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2296 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l9378729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l9378729.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2691567.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2691567.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 5088 4536 WerFault.exe 94 2632 4536 WerFault.exe 94 712 4536 WerFault.exe 94 4932 4536 WerFault.exe 94 2336 4536 WerFault.exe 94 3480 4536 WerFault.exe 94 4308 4536 WerFault.exe 94 1996 4536 WerFault.exe 94 2392 4536 WerFault.exe 94 4032 4536 WerFault.exe 94 2868 1472 WerFault.exe 114 2832 1472 WerFault.exe 114 3500 1472 WerFault.exe 114 3620 1472 WerFault.exe 114 3312 1472 WerFault.exe 114 2160 1472 WerFault.exe 114 2000 1472 WerFault.exe 114 4200 1472 WerFault.exe 114 2112 1472 WerFault.exe 114 2656 1472 WerFault.exe 114 4980 1472 WerFault.exe 114 2684 1472 WerFault.exe 114 2204 1472 WerFault.exe 114 1892 1472 WerFault.exe 114 3492 1744 WerFault.exe 155 4772 1472 WerFault.exe 114 3436 1472 WerFault.exe 114 2724 1472 WerFault.exe 114 1388 3656 WerFault.exe 165 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2452 k4942448.exe 2452 k4942448.exe 548 l9378729.exe 548 l9378729.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2452 k4942448.exe Token: SeDebugPrivilege 548 l9378729.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4536 m6016723.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3628 wrote to memory of 1208 3628 eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe 85 PID 3628 wrote to memory of 1208 3628 eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe 85 PID 3628 wrote to memory of 1208 3628 eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe 85 PID 1208 wrote to memory of 2452 1208 y2691567.exe 86 PID 1208 wrote to memory of 2452 1208 y2691567.exe 86 PID 1208 wrote to memory of 2452 1208 y2691567.exe 86 PID 1208 wrote to memory of 548 1208 y2691567.exe 93 PID 1208 wrote to memory of 548 1208 y2691567.exe 93 PID 1208 wrote to memory of 548 1208 y2691567.exe 93 PID 3628 wrote to memory of 4536 3628 eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe 94 PID 3628 wrote to memory of 4536 3628 eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe 94 PID 3628 wrote to memory of 4536 3628 eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe 94 PID 4536 wrote to memory of 1472 4536 m6016723.exe 114 PID 4536 wrote to memory of 1472 4536 m6016723.exe 114 PID 4536 wrote to memory of 1472 4536 m6016723.exe 114 PID 1472 wrote to memory of 3920 1472 oneetx.exe 131 PID 1472 wrote to memory of 3920 1472 oneetx.exe 131 PID 1472 wrote to memory of 3920 1472 oneetx.exe 131 PID 1472 wrote to memory of 3756 1472 oneetx.exe 137 PID 1472 wrote to memory of 3756 1472 oneetx.exe 137 PID 1472 wrote to memory of 3756 1472 oneetx.exe 137 PID 3756 wrote to memory of 2132 3756 cmd.exe 141 PID 3756 wrote to memory of 2132 3756 cmd.exe 141 PID 3756 wrote to memory of 2132 3756 cmd.exe 141 PID 3756 wrote to memory of 4708 3756 cmd.exe 142 PID 3756 wrote to memory of 4708 3756 cmd.exe 142 PID 3756 wrote to memory of 4708 3756 cmd.exe 142 PID 3756 wrote to memory of 1384 3756 cmd.exe 143 PID 3756 wrote to memory of 1384 3756 cmd.exe 143 PID 3756 wrote to memory of 1384 3756 cmd.exe 143 PID 3756 wrote to memory of 2020 3756 cmd.exe 144 PID 3756 wrote to memory of 2020 3756 cmd.exe 144 PID 3756 wrote to memory of 2020 3756 cmd.exe 144 PID 3756 wrote to memory of 4376 3756 cmd.exe 145 PID 3756 wrote to memory of 4376 3756 cmd.exe 145 PID 3756 wrote to memory of 4376 3756 cmd.exe 145 PID 3756 wrote to memory of 3992 3756 cmd.exe 146 PID 3756 wrote to memory of 3992 3756 cmd.exe 146 PID 3756 wrote to memory of 3992 3756 cmd.exe 146 PID 1472 wrote to memory of 2296 1472 oneetx.exe 160 PID 1472 wrote to memory of 2296 1472 oneetx.exe 160 PID 1472 wrote to memory of 2296 1472 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe"C:\Users\Admin\AppData\Local\Temp\eb8d3ed944a013777e2766d5e0e9154932e40ba6fb45c52e8a3a54f2b5afe745.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2691567.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2691567.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4942448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4942448.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9378729.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9378729.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6016723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6016723.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 6963⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 7563⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 8643⤵
- Program crash
PID:712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 9523⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 9563⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 9563⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 12203⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 12083⤵
- Program crash
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 13203⤵
- Program crash
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 6924⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8684⤵
- Program crash
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8924⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 10524⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 10884⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 11084⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 11324⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 9924⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 7604⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 13204⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 9924⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 12804⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 12924⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 11564⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 16124⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 10884⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 16284⤵
- Program crash
PID:2724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 7483⤵
- Program crash
PID:4032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4536 -ip 45361⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4536 -ip 45361⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4536 -ip 45361⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4536 -ip 45361⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4536 -ip 45361⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4536 -ip 45361⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4536 -ip 45361⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4536 -ip 45361⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4536 -ip 45361⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4536 -ip 45361⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1472 -ip 14721⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1472 -ip 14721⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1472 -ip 14721⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1472 -ip 14721⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1472 -ip 14721⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1472 -ip 14721⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1472 -ip 14721⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1472 -ip 14721⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1472 -ip 14721⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1472 -ip 14721⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1472 -ip 14721⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1472 -ip 14721⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1472 -ip 14721⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1472 -ip 14721⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 3122⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1744 -ip 17441⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1472 -ip 14721⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1472 -ip 14721⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1472 -ip 14721⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 3122⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3656 -ip 36561⤵PID:464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
307KB
MD5b3990f9222577abd643d2d2d8512a35d
SHA17f94faef1614a6735d97c4e515f59e5bb701407d
SHA2564367a8102499d8d609d7a0af1bf41f2298b228900a2bce2381c714e971f6e2ad
SHA5126ab29a43c2c5dfb3fc40dbaf2ef5f45e918e28c5d7a191704f8f6fef58bf0b4ddb478e75738a71b288f2b16db6ecebbbb76a37906da6d1e20f5bd76e0d5fde1f
-
Filesize
307KB
MD5b3990f9222577abd643d2d2d8512a35d
SHA17f94faef1614a6735d97c4e515f59e5bb701407d
SHA2564367a8102499d8d609d7a0af1bf41f2298b228900a2bce2381c714e971f6e2ad
SHA5126ab29a43c2c5dfb3fc40dbaf2ef5f45e918e28c5d7a191704f8f6fef58bf0b4ddb478e75738a71b288f2b16db6ecebbbb76a37906da6d1e20f5bd76e0d5fde1f
-
Filesize
168KB
MD5f439b672d5c5115ebf68c99314f7ce9b
SHA1ab6d2d5f16b0b09a64dd8f00397b574badfb30c8
SHA256396de9cea9e02cda0f1bb68d2da62b705042dd96c011a663e181dfb91e96f0b6
SHA512034a62edbd0c4a7303dc0a48c055c8d0a78ca51ca8678e329c027b40c6148682bb8b84f73ff890ffd56481d12d3f59fb4196f04b849cfe4f01f15d215673c925
-
Filesize
168KB
MD5f439b672d5c5115ebf68c99314f7ce9b
SHA1ab6d2d5f16b0b09a64dd8f00397b574badfb30c8
SHA256396de9cea9e02cda0f1bb68d2da62b705042dd96c011a663e181dfb91e96f0b6
SHA512034a62edbd0c4a7303dc0a48c055c8d0a78ca51ca8678e329c027b40c6148682bb8b84f73ff890ffd56481d12d3f59fb4196f04b849cfe4f01f15d215673c925
-
Filesize
178KB
MD57e8513f53afe5e6a2a7625e22676c021
SHA177f8899820c11cbf950242bc107c37c472d36365
SHA256a7dacbefb1dc61f3e07f9abe0237d644e78eca9ee24ecf2c576889afd74b53c8
SHA51241a07ae978494becce97be21fded2b2fcccf64d2cc1bfbaabf38433a31e57ec4c23dce85286018c87700eb2dfee57fc1c7b0e46ed86c7f51b82b46f5fc41f973
-
Filesize
178KB
MD57e8513f53afe5e6a2a7625e22676c021
SHA177f8899820c11cbf950242bc107c37c472d36365
SHA256a7dacbefb1dc61f3e07f9abe0237d644e78eca9ee24ecf2c576889afd74b53c8
SHA51241a07ae978494becce97be21fded2b2fcccf64d2cc1bfbaabf38433a31e57ec4c23dce85286018c87700eb2dfee57fc1c7b0e46ed86c7f51b82b46f5fc41f973
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
268KB
MD54353ab4421d2713c5c33e9e3e78302e7
SHA10d6fb7a3ee7e138e1060d58b9f88350e1a68c93b
SHA256c280a4a89cdbf0a5756ab0aa4d08ea89b94e82263c66f4003e4f1771c4f62067
SHA512153598c7d76df6413c57c0e86f127129c5d895c62b060fa08b95b3dc1791c6208b32db9f8238563a8ddb617d267c52d652f1415c25a0dc113d4e0d761120b868
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5