Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 21:09
Static task
static1
Behavioral task
behavioral1
Sample
49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe
Resource
win10v2004-20230220-en
General
-
Target
49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe
-
Size
565KB
-
MD5
0444613f17ad54074c3aebf52f893bc1
-
SHA1
c1fd55a296347501b2afc1190e8bd9ff5ba9f170
-
SHA256
49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47
-
SHA512
27abb7c35c6ea54874e435684dbeafb9e13a663e76b0206964901f2516af5734db44c36f3a48dfc6a2b92c44d815ba72aebaa61c38406427376702c61451dbd0
-
SSDEEP
12288:9Mrny90houLOo6x+ReoG3lUzHkZxi3ql04KH:qyk9Lyxaua3AlKH
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l8477823.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l8477823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l8477823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l8477823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l8477823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l8477823.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m9585391.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4620 y3291743.exe 4604 k7800583.exe 1340 l8477823.exe 2708 m9585391.exe 4364 oneetx.exe 1176 oneetx.exe 4244 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1332 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l8477823.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l8477823.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3291743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3291743.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4556 2708 WerFault.exe 93 3552 2708 WerFault.exe 93 3952 2708 WerFault.exe 93 2788 2708 WerFault.exe 93 4520 2708 WerFault.exe 93 1436 2708 WerFault.exe 93 1628 2708 WerFault.exe 93 768 2708 WerFault.exe 93 3772 2708 WerFault.exe 93 2140 2708 WerFault.exe 93 660 4364 WerFault.exe 113 4864 4364 WerFault.exe 113 3188 4364 WerFault.exe 113 1444 4364 WerFault.exe 113 844 4364 WerFault.exe 113 3492 4364 WerFault.exe 113 228 4364 WerFault.exe 113 4280 4364 WerFault.exe 113 1008 4364 WerFault.exe 113 1144 4364 WerFault.exe 113 3560 4364 WerFault.exe 113 2640 4364 WerFault.exe 113 4780 4364 WerFault.exe 113 2496 4364 WerFault.exe 113 1244 1176 WerFault.exe 154 3968 4364 WerFault.exe 113 4876 4364 WerFault.exe 113 1952 4364 WerFault.exe 113 4444 4244 WerFault.exe 164 1380 4364 WerFault.exe 113 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4604 k7800583.exe 4604 k7800583.exe 1340 l8477823.exe 1340 l8477823.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4604 k7800583.exe Token: SeDebugPrivilege 1340 l8477823.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 m9585391.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4620 4112 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe 84 PID 4112 wrote to memory of 4620 4112 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe 84 PID 4112 wrote to memory of 4620 4112 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe 84 PID 4620 wrote to memory of 4604 4620 y3291743.exe 85 PID 4620 wrote to memory of 4604 4620 y3291743.exe 85 PID 4620 wrote to memory of 4604 4620 y3291743.exe 85 PID 4620 wrote to memory of 1340 4620 y3291743.exe 92 PID 4620 wrote to memory of 1340 4620 y3291743.exe 92 PID 4620 wrote to memory of 1340 4620 y3291743.exe 92 PID 4112 wrote to memory of 2708 4112 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe 93 PID 4112 wrote to memory of 2708 4112 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe 93 PID 4112 wrote to memory of 2708 4112 49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe 93 PID 2708 wrote to memory of 4364 2708 m9585391.exe 113 PID 2708 wrote to memory of 4364 2708 m9585391.exe 113 PID 2708 wrote to memory of 4364 2708 m9585391.exe 113 PID 4364 wrote to memory of 708 4364 oneetx.exe 132 PID 4364 wrote to memory of 708 4364 oneetx.exe 132 PID 4364 wrote to memory of 708 4364 oneetx.exe 132 PID 4364 wrote to memory of 1416 4364 oneetx.exe 138 PID 4364 wrote to memory of 1416 4364 oneetx.exe 138 PID 4364 wrote to memory of 1416 4364 oneetx.exe 138 PID 1416 wrote to memory of 3736 1416 cmd.exe 142 PID 1416 wrote to memory of 3736 1416 cmd.exe 142 PID 1416 wrote to memory of 3736 1416 cmd.exe 142 PID 1416 wrote to memory of 732 1416 cmd.exe 143 PID 1416 wrote to memory of 732 1416 cmd.exe 143 PID 1416 wrote to memory of 732 1416 cmd.exe 143 PID 1416 wrote to memory of 5108 1416 cmd.exe 144 PID 1416 wrote to memory of 5108 1416 cmd.exe 144 PID 1416 wrote to memory of 5108 1416 cmd.exe 144 PID 1416 wrote to memory of 4964 1416 cmd.exe 146 PID 1416 wrote to memory of 4964 1416 cmd.exe 146 PID 1416 wrote to memory of 4964 1416 cmd.exe 146 PID 1416 wrote to memory of 5100 1416 cmd.exe 145 PID 1416 wrote to memory of 5100 1416 cmd.exe 145 PID 1416 wrote to memory of 5100 1416 cmd.exe 145 PID 1416 wrote to memory of 2720 1416 cmd.exe 147 PID 1416 wrote to memory of 2720 1416 cmd.exe 147 PID 1416 wrote to memory of 2720 1416 cmd.exe 147 PID 4364 wrote to memory of 1332 4364 oneetx.exe 161 PID 4364 wrote to memory of 1332 4364 oneetx.exe 161 PID 4364 wrote to memory of 1332 4364 oneetx.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe"C:\Users\Admin\AppData\Local\Temp\49122b7da10cfe4c67d28e1665436e0ed01e1e14be178cdbb4d8725fcb575b47.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3291743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3291743.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7800583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7800583.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8477823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8477823.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9585391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9585391.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 6963⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 7523⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 8563⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 8643⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 8603⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 8603⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 12203⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 12083⤵
- Program crash
PID:768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 13203⤵
- Program crash
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 6924⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 8364⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 8564⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 9004⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 10604⤵
- Program crash
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 10684⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 10924⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 11004⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 9924⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 9164⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:5100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 7684⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 7844⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 12604⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 7684⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 10604⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 16124⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 11164⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 16284⤵
- Program crash
PID:1380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 13643⤵
- Program crash
PID:2140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2708 -ip 27081⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2708 -ip 27081⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2708 -ip 27081⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2708 -ip 27081⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2708 -ip 27081⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2708 -ip 27081⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2708 -ip 27081⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2708 -ip 27081⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2708 -ip 27081⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2708 -ip 27081⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4364 -ip 43641⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4364 -ip 43641⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4364 -ip 43641⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4364 -ip 43641⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4364 -ip 43641⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4364 -ip 43641⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4364 -ip 43641⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4364 -ip 43641⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4364 -ip 43641⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4364 -ip 43641⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4364 -ip 43641⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4364 -ip 43641⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4364 -ip 43641⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4364 -ip 43641⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 3162⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1176 -ip 11761⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4364 -ip 43641⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4364 -ip 43641⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4364 -ip 43641⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 3122⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4244 -ip 42441⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4364 -ip 43641⤵PID:1188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
307KB
MD5cd72d5ca8ab6e244463b3999e99f0f0e
SHA11efd5c3d2178215fc8795948dc3755decfe28b21
SHA256431c9504575c2987a662fd70bd5babbeb6f4bc37e7aa66c5d8f2b2c239972932
SHA512333c5b10a5aa95b0ce5744f0e12b51e066266dbb82f5ad53f525b23dbb7e7ad4c5053410ead3de1deec060703d1777eee4eaceb65b4ec71a51699e8fda2d6b2e
-
Filesize
307KB
MD5cd72d5ca8ab6e244463b3999e99f0f0e
SHA11efd5c3d2178215fc8795948dc3755decfe28b21
SHA256431c9504575c2987a662fd70bd5babbeb6f4bc37e7aa66c5d8f2b2c239972932
SHA512333c5b10a5aa95b0ce5744f0e12b51e066266dbb82f5ad53f525b23dbb7e7ad4c5053410ead3de1deec060703d1777eee4eaceb65b4ec71a51699e8fda2d6b2e
-
Filesize
168KB
MD59bec4c4f0abdf3bd3f3275dec556f12a
SHA14bac9d221039dbbf83654e5f8a3eea2ae2045a75
SHA256652768502c029f5319ba7625a6d7dc5c8ddf27843c3ecef605e8a0c773830920
SHA512e44ef13658fa9b744dd5a70e5e8dbb694338e18fd19f40e19297b5342f2b4ea636b3c80e185955ed33443e9ad07b5dded955ba0e357dd2a8f4a1979d0afdf20b
-
Filesize
168KB
MD59bec4c4f0abdf3bd3f3275dec556f12a
SHA14bac9d221039dbbf83654e5f8a3eea2ae2045a75
SHA256652768502c029f5319ba7625a6d7dc5c8ddf27843c3ecef605e8a0c773830920
SHA512e44ef13658fa9b744dd5a70e5e8dbb694338e18fd19f40e19297b5342f2b4ea636b3c80e185955ed33443e9ad07b5dded955ba0e357dd2a8f4a1979d0afdf20b
-
Filesize
178KB
MD5bb1c072ebfe7c94acc56491ca2b8373d
SHA15079e1c1ee476d11c4e649ac9c317575467d32f7
SHA2566cda5825e616b7388c7f54f4acf68c23844af95c3c33602499365eeb86f0184b
SHA512171e319a7a18201e51b04f263fc6024be997151c246ed307a1af2654ec9607427f537410a61cf4599f9dcf5607dda39fe272c95e54c8bd5e19651467c31251dd
-
Filesize
178KB
MD5bb1c072ebfe7c94acc56491ca2b8373d
SHA15079e1c1ee476d11c4e649ac9c317575467d32f7
SHA2566cda5825e616b7388c7f54f4acf68c23844af95c3c33602499365eeb86f0184b
SHA512171e319a7a18201e51b04f263fc6024be997151c246ed307a1af2654ec9607427f537410a61cf4599f9dcf5607dda39fe272c95e54c8bd5e19651467c31251dd
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
268KB
MD599ddab2ebdd49c95b8f5a2cef9b31efb
SHA1bdfc72e666960cd1363981a6091be108f4237ae4
SHA2569f88068656cf25338c9d4011a37880054cfaab3ece3c22660359ee7299157a3c
SHA51251b49c727ce6612a368d0b5e7f953143b72420d10eb511e69306305dbff90462377cb1f0e15f77559cccabb20a0013b2cb5cdfb338292058b3df05f02c9843ac
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5