Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 20:45
Static task
static1
Behavioral task
behavioral1
Sample
c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe
Resource
win10v2004-20230220-en
General
-
Target
c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe
-
Size
642KB
-
MD5
d7f49b495f97762914fb7d49d7811c92
-
SHA1
d2bc4bafa0516762aa0edd17f930e97cac945c8f
-
SHA256
c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f
-
SHA512
4f06a9bebee57bada36ef35f8d08844f3b7d241fe3495b60e6ab43f85c354d96431b719c9867d6d2cc94defc888e50fbf7198b7bbd8d762f84afaab3f40f47f9
-
SSDEEP
12288:/Mr5y90AReam88/VBXJzGb5l/FBf2fRTz+EAsKkQl5z:ayX/8ttJzGVlqfRflZKV5z
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1437234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1437234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1437234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1437234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1437234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1437234.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation i1024682.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1612 x9256546.exe 4800 g3835979.exe 2296 h1437234.exe 4520 i1024682.exe 1816 oneetx.exe 4628 oneetx.exe 4412 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1580 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1437234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1437234.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9256546.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9256546.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4776 2296 WerFault.exe 91 1272 4520 WerFault.exe 94 4712 4520 WerFault.exe 94 4824 4520 WerFault.exe 94 940 4520 WerFault.exe 94 1632 4520 WerFault.exe 94 2864 4520 WerFault.exe 94 1592 4520 WerFault.exe 94 3520 4520 WerFault.exe 94 1672 4520 WerFault.exe 94 2992 4520 WerFault.exe 94 1088 1816 WerFault.exe 114 3356 1816 WerFault.exe 114 5012 1816 WerFault.exe 114 4008 1816 WerFault.exe 114 1320 1816 WerFault.exe 114 4296 1816 WerFault.exe 114 2388 1816 WerFault.exe 114 2652 1816 WerFault.exe 114 4728 1816 WerFault.exe 114 948 1816 WerFault.exe 114 4932 1816 WerFault.exe 114 4320 1816 WerFault.exe 114 1404 1816 WerFault.exe 114 3956 1816 WerFault.exe 114 1120 4628 WerFault.exe 155 4652 1816 WerFault.exe 114 3908 1816 WerFault.exe 114 5072 1816 WerFault.exe 114 1444 4412 WerFault.exe 165 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4800 g3835979.exe 4800 g3835979.exe 2296 h1437234.exe 2296 h1437234.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4800 g3835979.exe Token: SeDebugPrivilege 2296 h1437234.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4520 i1024682.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1612 2276 c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe 83 PID 2276 wrote to memory of 1612 2276 c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe 83 PID 2276 wrote to memory of 1612 2276 c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe 83 PID 1612 wrote to memory of 4800 1612 x9256546.exe 84 PID 1612 wrote to memory of 4800 1612 x9256546.exe 84 PID 1612 wrote to memory of 4800 1612 x9256546.exe 84 PID 1612 wrote to memory of 2296 1612 x9256546.exe 91 PID 1612 wrote to memory of 2296 1612 x9256546.exe 91 PID 1612 wrote to memory of 2296 1612 x9256546.exe 91 PID 2276 wrote to memory of 4520 2276 c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe 94 PID 2276 wrote to memory of 4520 2276 c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe 94 PID 2276 wrote to memory of 4520 2276 c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe 94 PID 4520 wrote to memory of 1816 4520 i1024682.exe 114 PID 4520 wrote to memory of 1816 4520 i1024682.exe 114 PID 4520 wrote to memory of 1816 4520 i1024682.exe 114 PID 1816 wrote to memory of 4304 1816 oneetx.exe 131 PID 1816 wrote to memory of 4304 1816 oneetx.exe 131 PID 1816 wrote to memory of 4304 1816 oneetx.exe 131 PID 1816 wrote to memory of 2404 1816 oneetx.exe 137 PID 1816 wrote to memory of 2404 1816 oneetx.exe 137 PID 1816 wrote to memory of 2404 1816 oneetx.exe 137 PID 2404 wrote to memory of 2152 2404 cmd.exe 140 PID 2404 wrote to memory of 2152 2404 cmd.exe 140 PID 2404 wrote to memory of 2152 2404 cmd.exe 140 PID 2404 wrote to memory of 4416 2404 cmd.exe 142 PID 2404 wrote to memory of 4416 2404 cmd.exe 142 PID 2404 wrote to memory of 4416 2404 cmd.exe 142 PID 2404 wrote to memory of 2808 2404 cmd.exe 143 PID 2404 wrote to memory of 2808 2404 cmd.exe 143 PID 2404 wrote to memory of 2808 2404 cmd.exe 143 PID 2404 wrote to memory of 2304 2404 cmd.exe 144 PID 2404 wrote to memory of 2304 2404 cmd.exe 144 PID 2404 wrote to memory of 2304 2404 cmd.exe 144 PID 2404 wrote to memory of 2672 2404 cmd.exe 145 PID 2404 wrote to memory of 2672 2404 cmd.exe 145 PID 2404 wrote to memory of 2672 2404 cmd.exe 145 PID 2404 wrote to memory of 3348 2404 cmd.exe 146 PID 2404 wrote to memory of 3348 2404 cmd.exe 146 PID 2404 wrote to memory of 3348 2404 cmd.exe 146 PID 1816 wrote to memory of 1580 1816 oneetx.exe 160 PID 1816 wrote to memory of 1580 1816 oneetx.exe 160 PID 1816 wrote to memory of 1580 1816 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe"C:\Users\Admin\AppData\Local\Temp\c9211f568449907dc1a4d265e7a0d177d8e063f4d9d4f8ed7d3ccf5a8e85729f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9256546.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9256546.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3835979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3835979.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1437234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1437234.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 10844⤵
- Program crash
PID:4776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1024682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1024682.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 6963⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 7523⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 7923⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 9803⤵
- Program crash
PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 10043⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 9603⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 12083⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 12403⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 13163⤵
- Program crash
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 6924⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 8164⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 8924⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 10524⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 10724⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 10524⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 11124⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 9924⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 12484⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 9164⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 7324⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 7684⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 12524⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 15604⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 16284⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 15604⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 16364⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 17523⤵
- Program crash
PID:2992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2296 -ip 22961⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4520 -ip 45201⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4520 -ip 45201⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4520 -ip 45201⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4520 -ip 45201⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4520 -ip 45201⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4520 -ip 45201⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4520 -ip 45201⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4520 -ip 45201⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4520 -ip 45201⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4520 -ip 45201⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1816 -ip 18161⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1816 -ip 18161⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1816 -ip 18161⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1816 -ip 18161⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1816 -ip 18161⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1816 -ip 18161⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1816 -ip 18161⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1816 -ip 18161⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1816 -ip 18161⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1816 -ip 18161⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1816 -ip 18161⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1816 -ip 18161⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1816 -ip 18161⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1816 -ip 18161⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 3122⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4628 -ip 46281⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1816 -ip 18161⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1816 -ip 18161⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1816 -ip 18161⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 3202⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4412 -ip 44121⤵PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
384KB
MD587626073d163cff850b0caccfd41a509
SHA1c0649cd563eccac31eeb68a7e5fa0dd18f8b2c42
SHA256a4d2be3a5e8c8992681b7138865e66efb904c5e679635398eb4ec2181669b228
SHA512f89d9ca33b50b65908b1b5eebf08008300e01fe44650e6870079697514ed4303812cf10b38750eb079ddae16099ddc320865405d465d9c28cafd73cfd7045cc8
-
Filesize
384KB
MD587626073d163cff850b0caccfd41a509
SHA1c0649cd563eccac31eeb68a7e5fa0dd18f8b2c42
SHA256a4d2be3a5e8c8992681b7138865e66efb904c5e679635398eb4ec2181669b228
SHA512f89d9ca33b50b65908b1b5eebf08008300e01fe44650e6870079697514ed4303812cf10b38750eb079ddae16099ddc320865405d465d9c28cafd73cfd7045cc8
-
Filesize
168KB
MD53942f88c4a8595ba80dcad63ad27e8dc
SHA14d4d66eea37c15852317221343a5e08e76fe7921
SHA25649735178f56d03c22cb750e43927c4cb531cb5df27ffe3fffff4b0967c109855
SHA5124922d2b9e92a40524a8276ca97e1f9f4065862d4987ab4cee88c4ba2fd0c8cf2a6508dea6da88b62845ecb3ff5688fd26221a67561414a78186adaaac222e0ee
-
Filesize
168KB
MD53942f88c4a8595ba80dcad63ad27e8dc
SHA14d4d66eea37c15852317221343a5e08e76fe7921
SHA25649735178f56d03c22cb750e43927c4cb531cb5df27ffe3fffff4b0967c109855
SHA5124922d2b9e92a40524a8276ca97e1f9f4065862d4987ab4cee88c4ba2fd0c8cf2a6508dea6da88b62845ecb3ff5688fd26221a67561414a78186adaaac222e0ee
-
Filesize
289KB
MD5a5fac85305bd7ae69da9d377bbfecd3d
SHA1916112dc061d909dbbc86bf1bcf5d365f45acb6c
SHA256c0357ed0184edb9fbe2919e74ac66d7e7ce1d55277ff89e1ce75a1208174a0c5
SHA51207e1284f8f0aa18769ecaec2bed5d7055ca2257d5ec2f5020f25c01cd333c3ba391e67c09c2ce510c1d3b4af6c0c13511a219b1a212630d929f764229a48d8e8
-
Filesize
289KB
MD5a5fac85305bd7ae69da9d377bbfecd3d
SHA1916112dc061d909dbbc86bf1bcf5d365f45acb6c
SHA256c0357ed0184edb9fbe2919e74ac66d7e7ce1d55277ff89e1ce75a1208174a0c5
SHA51207e1284f8f0aa18769ecaec2bed5d7055ca2257d5ec2f5020f25c01cd333c3ba391e67c09c2ce510c1d3b4af6c0c13511a219b1a212630d929f764229a48d8e8
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
268KB
MD598d9b2ef29c3d51b5f0643d865c71fa6
SHA104f48ad257234362e8490fc9a990921129c1abe7
SHA2562f2e5cb42fa391eed48de90755082934f7d67aa20c67c53d81d901f4d42ed149
SHA5124e2a33ddc4c5517de41834ede87460ba6f51e95ae75838f14c596eedc851842b00efb553ccf8b909311ba1093c18bec06a244b185433248607a324147d5d99ce
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5