Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe
Resource
win10v2004-20230220-en
General
-
Target
25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe
-
Size
566KB
-
MD5
1e51befcf28eeaff05f917b752fb0729
-
SHA1
bd08f98c7205f03a45b11ebcf7440f3780658b21
-
SHA256
25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da
-
SHA512
2ac191186a289a2710855e42d22a6b61660503ded6c7868e08c7b71870260f78be7ba039eb8bd1e5df8de6d992dc26fe5a1428caf60631e86fdfd7c7a6a61513
-
SSDEEP
12288:eMrhy900hYbHRsMWxH2g3Mxqrr3QqVKQpmV792CTENdg:/ygHRRA2hArcMKQps7fEjg
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l0027931.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l0027931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l0027931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l0027931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l0027931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l0027931.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m8047202.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1392 y2333101.exe 1936 k9024388.exe 4324 l0027931.exe 2656 m8047202.exe 1228 oneetx.exe 1396 oneetx.exe 1724 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3516 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l0027931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l0027931.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2333101.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2333101.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 3196 2656 WerFault.exe 93 3100 2656 WerFault.exe 93 4512 2656 WerFault.exe 93 4508 2656 WerFault.exe 93 3888 2656 WerFault.exe 93 4900 2656 WerFault.exe 93 3144 2656 WerFault.exe 93 3176 2656 WerFault.exe 93 4648 2656 WerFault.exe 93 4284 2656 WerFault.exe 93 1500 1228 WerFault.exe 113 3212 1228 WerFault.exe 113 1900 1228 WerFault.exe 113 456 1228 WerFault.exe 113 2380 1228 WerFault.exe 113 492 1228 WerFault.exe 113 4112 1228 WerFault.exe 113 1328 1228 WerFault.exe 113 4624 1228 WerFault.exe 113 820 1228 WerFault.exe 113 5080 1228 WerFault.exe 113 752 1228 WerFault.exe 113 1764 1228 WerFault.exe 113 4252 1396 WerFault.exe 152 4432 1228 WerFault.exe 113 3940 1228 WerFault.exe 113 1784 1228 WerFault.exe 113 1740 1228 WerFault.exe 113 4288 1724 WerFault.exe 164 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1936 k9024388.exe 1936 k9024388.exe 4324 l0027931.exe 4324 l0027931.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1936 k9024388.exe Token: SeDebugPrivilege 4324 l0027931.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 m8047202.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1392 1368 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe 84 PID 1368 wrote to memory of 1392 1368 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe 84 PID 1368 wrote to memory of 1392 1368 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe 84 PID 1392 wrote to memory of 1936 1392 y2333101.exe 85 PID 1392 wrote to memory of 1936 1392 y2333101.exe 85 PID 1392 wrote to memory of 1936 1392 y2333101.exe 85 PID 1392 wrote to memory of 4324 1392 y2333101.exe 92 PID 1392 wrote to memory of 4324 1392 y2333101.exe 92 PID 1392 wrote to memory of 4324 1392 y2333101.exe 92 PID 1368 wrote to memory of 2656 1368 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe 93 PID 1368 wrote to memory of 2656 1368 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe 93 PID 1368 wrote to memory of 2656 1368 25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe 93 PID 2656 wrote to memory of 1228 2656 m8047202.exe 113 PID 2656 wrote to memory of 1228 2656 m8047202.exe 113 PID 2656 wrote to memory of 1228 2656 m8047202.exe 113 PID 1228 wrote to memory of 1520 1228 oneetx.exe 130 PID 1228 wrote to memory of 1520 1228 oneetx.exe 130 PID 1228 wrote to memory of 1520 1228 oneetx.exe 130 PID 1228 wrote to memory of 3796 1228 oneetx.exe 136 PID 1228 wrote to memory of 3796 1228 oneetx.exe 136 PID 1228 wrote to memory of 3796 1228 oneetx.exe 136 PID 3796 wrote to memory of 264 3796 cmd.exe 140 PID 3796 wrote to memory of 264 3796 cmd.exe 140 PID 3796 wrote to memory of 264 3796 cmd.exe 140 PID 3796 wrote to memory of 1512 3796 cmd.exe 141 PID 3796 wrote to memory of 1512 3796 cmd.exe 141 PID 3796 wrote to memory of 1512 3796 cmd.exe 141 PID 3796 wrote to memory of 376 3796 cmd.exe 142 PID 3796 wrote to memory of 376 3796 cmd.exe 142 PID 3796 wrote to memory of 376 3796 cmd.exe 142 PID 3796 wrote to memory of 3132 3796 cmd.exe 143 PID 3796 wrote to memory of 3132 3796 cmd.exe 143 PID 3796 wrote to memory of 3132 3796 cmd.exe 143 PID 3796 wrote to memory of 2424 3796 cmd.exe 144 PID 3796 wrote to memory of 2424 3796 cmd.exe 144 PID 3796 wrote to memory of 2424 3796 cmd.exe 144 PID 3796 wrote to memory of 4280 3796 cmd.exe 145 PID 3796 wrote to memory of 4280 3796 cmd.exe 145 PID 3796 wrote to memory of 4280 3796 cmd.exe 145 PID 1228 wrote to memory of 3516 1228 oneetx.exe 159 PID 1228 wrote to memory of 3516 1228 oneetx.exe 159 PID 1228 wrote to memory of 3516 1228 oneetx.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe"C:\Users\Admin\AppData\Local\Temp\25c2716f8db40bbdb8a90ce81ffe3a4b65f0ee554d77f24b369b3e35bf50c8da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2333101.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2333101.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9024388.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9024388.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0027931.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0027931.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8047202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8047202.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 6963⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 7803⤵
- Program crash
PID:3100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 8563⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 8643⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 9483⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 9483⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 12163⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 12523⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 13123⤵
- Program crash
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 6924⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 8444⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 8924⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 10524⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 10524⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 10524⤵
- Program crash
PID:492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 11084⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 9924⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 13004⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7764⤵
- Program crash
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7804⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 13284⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 13204⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 10804⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 16164⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 11364⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 16284⤵
- Program crash
PID:1740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 14203⤵
- Program crash
PID:4284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2656 -ip 26561⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2656 -ip 26561⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2656 -ip 26561⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2656 -ip 26561⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2656 -ip 26561⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2656 -ip 26561⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2656 -ip 26561⤵PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2656 -ip 26561⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2656 -ip 26561⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2656 -ip 26561⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1228 -ip 12281⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1228 -ip 12281⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1228 -ip 12281⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1228 -ip 12281⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1228 -ip 12281⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1228 -ip 12281⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1228 -ip 12281⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1228 -ip 12281⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1228 -ip 12281⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1228 -ip 12281⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1228 -ip 12281⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1228 -ip 12281⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1228 -ip 12281⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 3242⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1396 -ip 13961⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1228 -ip 12281⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1228 -ip 12281⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1228 -ip 12281⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1228 -ip 12281⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 3162⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1724 -ip 17241⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
307KB
MD507a33e70c97dab5f13da9ab04ba17e92
SHA19dcdb45b838a074b7353d3159ffe015b23be390d
SHA256a7a04db75b705b49c6c01d6161b7b8a8b2a83954b3002cf85fe561cd2b360655
SHA512960969ca3a7d3de94179a854fa21df6c4def747af0e5094d50fa63e75caf9e13f6cfa721890780ea54236a06fb241cd6d708e8cf5c3fe22962ba3dd93a072743
-
Filesize
307KB
MD507a33e70c97dab5f13da9ab04ba17e92
SHA19dcdb45b838a074b7353d3159ffe015b23be390d
SHA256a7a04db75b705b49c6c01d6161b7b8a8b2a83954b3002cf85fe561cd2b360655
SHA512960969ca3a7d3de94179a854fa21df6c4def747af0e5094d50fa63e75caf9e13f6cfa721890780ea54236a06fb241cd6d708e8cf5c3fe22962ba3dd93a072743
-
Filesize
168KB
MD54c39f67ec5d673f40cb0e1c6f44b895a
SHA1a3e0766954ff2cdb5e93a650d97543995d3817f9
SHA256c3eeae357dc46604dd935d075ccb9469b9a45c93b1977e6c3bf1b8c6bc222dbb
SHA512ea0b8e82bc28c3cd865c3954b13c503d9021470b7cb24c6965f62d590ba46ff380d57bece169ca6952db26cb2eaf66860447e637d427ea661d174baf970ead6f
-
Filesize
168KB
MD54c39f67ec5d673f40cb0e1c6f44b895a
SHA1a3e0766954ff2cdb5e93a650d97543995d3817f9
SHA256c3eeae357dc46604dd935d075ccb9469b9a45c93b1977e6c3bf1b8c6bc222dbb
SHA512ea0b8e82bc28c3cd865c3954b13c503d9021470b7cb24c6965f62d590ba46ff380d57bece169ca6952db26cb2eaf66860447e637d427ea661d174baf970ead6f
-
Filesize
178KB
MD5ae983a2016230fa32e42f3b152c3be51
SHA1adfb82e06cee94ccf6bb4ee0ec0cdcb3c614d7e5
SHA2567f8e7e0034737e8195f96fc2fa09259854e1db90f90253f3b1c307d69fc7dfee
SHA512e3ef0714a1def8b3baa1e30e4e16b5360ad12df25c308947fb1823b986c1791a034737577e9cb7dd8435370365be27893d2fa959e4ee332562232470e8432d32
-
Filesize
178KB
MD5ae983a2016230fa32e42f3b152c3be51
SHA1adfb82e06cee94ccf6bb4ee0ec0cdcb3c614d7e5
SHA2567f8e7e0034737e8195f96fc2fa09259854e1db90f90253f3b1c307d69fc7dfee
SHA512e3ef0714a1def8b3baa1e30e4e16b5360ad12df25c308947fb1823b986c1791a034737577e9cb7dd8435370365be27893d2fa959e4ee332562232470e8432d32
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
268KB
MD504832bf75e909ba80dde3556901d02a7
SHA13670b40c2f6614f43a643f6bf90ba96d0a1c0f65
SHA256ff5c91cd33b61d663c1c8a40f716bba6146bb1d66e311e539892947985b1c792
SHA512e3313a2e7dfdd3b1a4400a097731f1f9c50618fa39dab462452181660d520541eb2c156e95e3e55a941111667b709e4e3d26d680e19b5c3fc35c4b60cfe1582f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5