Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe
Resource
win10v2004-20230220-en
General
-
Target
70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe
-
Size
642KB
-
MD5
8e170bde7becd01f452fd96b04bf89da
-
SHA1
ada784cde4db381c4831bfdc05ea49223f4f72ed
-
SHA256
70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea
-
SHA512
7d180b99b8e342bdc1f594a95715afe362471f4d58165e987ee59dabda57af109fb60d3a8fc6b596385cd85ad6db16139d984b03cb2b84c1ab91bf90a8eb30cf
-
SSDEEP
12288:JMryy90wvJwpDsL6umBBfB3jhUt8kQZ+0Y4waixk1G2zIL:XyEgL1OfpjhzkvBbx64
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4112-148-0x000000000ABA0000-0x000000000B1B8000-memory.dmp redline_stealer behavioral2/memory/4112-156-0x000000000B1C0000-0x000000000B226000-memory.dmp redline_stealer behavioral2/memory/4112-159-0x000000000BEF0000-0x000000000C0B2000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2286987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2286987.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h2286987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2286987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2286987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2286987.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation i6456212.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3228 x3991764.exe 4112 g9035505.exe 4372 h2286987.exe 3424 i6456212.exe 3644 oneetx.exe 4036 oneetx.exe 3936 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4976 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2286987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2286987.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3991764.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3991764.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 3476 4372 WerFault.exe 96 3264 3424 WerFault.exe 100 4780 3424 WerFault.exe 100 1096 3424 WerFault.exe 100 1540 3424 WerFault.exe 100 420 3424 WerFault.exe 100 388 3424 WerFault.exe 100 3524 3424 WerFault.exe 100 5020 3424 WerFault.exe 100 4820 3424 WerFault.exe 100 4752 3424 WerFault.exe 100 3764 3644 WerFault.exe 119 4704 3644 WerFault.exe 119 3116 3644 WerFault.exe 119 2696 3644 WerFault.exe 119 2376 3644 WerFault.exe 119 4924 3644 WerFault.exe 119 2744 3644 WerFault.exe 119 2244 3644 WerFault.exe 119 3844 3644 WerFault.exe 119 3684 3644 WerFault.exe 119 1348 3644 WerFault.exe 119 4384 3644 WerFault.exe 119 4856 3644 WerFault.exe 119 2356 3644 WerFault.exe 119 2948 4036 WerFault.exe 160 3872 3644 WerFault.exe 119 388 3644 WerFault.exe 119 3096 3644 WerFault.exe 119 240 3936 WerFault.exe 170 1864 3644 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 g9035505.exe 4112 g9035505.exe 4372 h2286987.exe 4372 h2286987.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4112 g9035505.exe Token: SeDebugPrivilege 4372 h2286987.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3424 i6456212.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3228 1888 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe 88 PID 1888 wrote to memory of 3228 1888 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe 88 PID 1888 wrote to memory of 3228 1888 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe 88 PID 3228 wrote to memory of 4112 3228 x3991764.exe 89 PID 3228 wrote to memory of 4112 3228 x3991764.exe 89 PID 3228 wrote to memory of 4112 3228 x3991764.exe 89 PID 3228 wrote to memory of 4372 3228 x3991764.exe 96 PID 3228 wrote to memory of 4372 3228 x3991764.exe 96 PID 3228 wrote to memory of 4372 3228 x3991764.exe 96 PID 1888 wrote to memory of 3424 1888 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe 100 PID 1888 wrote to memory of 3424 1888 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe 100 PID 1888 wrote to memory of 3424 1888 70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe 100 PID 3424 wrote to memory of 3644 3424 i6456212.exe 119 PID 3424 wrote to memory of 3644 3424 i6456212.exe 119 PID 3424 wrote to memory of 3644 3424 i6456212.exe 119 PID 3644 wrote to memory of 1784 3644 oneetx.exe 136 PID 3644 wrote to memory of 1784 3644 oneetx.exe 136 PID 3644 wrote to memory of 1784 3644 oneetx.exe 136 PID 3644 wrote to memory of 3012 3644 oneetx.exe 142 PID 3644 wrote to memory of 3012 3644 oneetx.exe 142 PID 3644 wrote to memory of 3012 3644 oneetx.exe 142 PID 3012 wrote to memory of 4128 3012 cmd.exe 146 PID 3012 wrote to memory of 4128 3012 cmd.exe 146 PID 3012 wrote to memory of 4128 3012 cmd.exe 146 PID 3012 wrote to memory of 1108 3012 cmd.exe 147 PID 3012 wrote to memory of 1108 3012 cmd.exe 147 PID 3012 wrote to memory of 1108 3012 cmd.exe 147 PID 3012 wrote to memory of 2004 3012 cmd.exe 148 PID 3012 wrote to memory of 2004 3012 cmd.exe 148 PID 3012 wrote to memory of 2004 3012 cmd.exe 148 PID 3012 wrote to memory of 3544 3012 cmd.exe 149 PID 3012 wrote to memory of 3544 3012 cmd.exe 149 PID 3012 wrote to memory of 3544 3012 cmd.exe 149 PID 3012 wrote to memory of 1800 3012 cmd.exe 150 PID 3012 wrote to memory of 1800 3012 cmd.exe 150 PID 3012 wrote to memory of 1800 3012 cmd.exe 150 PID 3012 wrote to memory of 1012 3012 cmd.exe 151 PID 3012 wrote to memory of 1012 3012 cmd.exe 151 PID 3012 wrote to memory of 1012 3012 cmd.exe 151 PID 3644 wrote to memory of 4976 3644 oneetx.exe 167 PID 3644 wrote to memory of 4976 3644 oneetx.exe 167 PID 3644 wrote to memory of 4976 3644 oneetx.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe"C:\Users\Admin\AppData\Local\Temp\70af2f55006a0ebc31cd2e605ebe0133bee27721600b259ebc73683b7fb5c1ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3991764.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3991764.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9035505.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9035505.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2286987.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2286987.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 10884⤵
- Program crash
PID:3476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6456212.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6456212.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6963⤵
- Program crash
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 7803⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 7963⤵
- Program crash
PID:1096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9803⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10043⤵
- Program crash
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10043⤵
- Program crash
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 12163⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 12363⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 13123⤵
- Program crash
PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 6924⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8844⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 9484⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 10844⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11004⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11244⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11444⤵
- Program crash
PID:2744
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 10204⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 7284⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 13004⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 10164⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 13004⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 7564⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 14404⤵
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11284⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 16204⤵
- Program crash
PID:388
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 14444⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 16444⤵
- Program crash
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 13443⤵
- Program crash
PID:4752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4372 -ip 43721⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3424 -ip 34241⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3424 -ip 34241⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3424 -ip 34241⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3424 -ip 34241⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3424 -ip 34241⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3424 -ip 34241⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3424 -ip 34241⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3424 -ip 34241⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3424 -ip 34241⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3424 -ip 34241⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3644 -ip 36441⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3644 -ip 36441⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3644 -ip 36441⤵PID:236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3644 -ip 36441⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3644 -ip 36441⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3644 -ip 36441⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3644 -ip 36441⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3644 -ip 36441⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3644 -ip 36441⤵PID:472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3644 -ip 36441⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3644 -ip 36441⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3644 -ip 36441⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3644 -ip 36441⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3644 -ip 36441⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 3162⤵
- Program crash
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4036 -ip 40361⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3644 -ip 36441⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3644 -ip 36441⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3644 -ip 36441⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 3162⤵
- Program crash
PID:240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3936 -ip 39361⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3644 -ip 36441⤵PID:1228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
384KB
MD5a8b9eb1233000cb777d9cddffd535135
SHA1a6af866824cf1b46e4b4fafeb14b220c32c0ea17
SHA25619e7bfad23f4b2b7027e12c23812d4cb5778c1605517e2bc4785aec63eaa044a
SHA512ed29be6106f19f242ac63eece810bd543f5f11b127f4a6048bb0241867152fa098bd8a2048b2b5f2d0b6c28a7b67830eeaead32adab5eee11f325640b213312b
-
Filesize
384KB
MD5a8b9eb1233000cb777d9cddffd535135
SHA1a6af866824cf1b46e4b4fafeb14b220c32c0ea17
SHA25619e7bfad23f4b2b7027e12c23812d4cb5778c1605517e2bc4785aec63eaa044a
SHA512ed29be6106f19f242ac63eece810bd543f5f11b127f4a6048bb0241867152fa098bd8a2048b2b5f2d0b6c28a7b67830eeaead32adab5eee11f325640b213312b
-
Filesize
168KB
MD521b7a85d668856f6099e1616fb7e16b4
SHA189bb3ee5c53ab8ecefc0b9f0d096c2f33f9a3980
SHA2569b0e44666f2aab2abd78e3d5ba9ccdab05bd227d2cbe29459da0f5b4d3821d37
SHA512bda0fee0aa1e75732a868bba40d624e0a800e27d3aa7f2219c5bb4bdcaafce79c7c1ee592b6645c79f45db5579d12744d44129f4c5760419097101d7f45e45ed
-
Filesize
168KB
MD521b7a85d668856f6099e1616fb7e16b4
SHA189bb3ee5c53ab8ecefc0b9f0d096c2f33f9a3980
SHA2569b0e44666f2aab2abd78e3d5ba9ccdab05bd227d2cbe29459da0f5b4d3821d37
SHA512bda0fee0aa1e75732a868bba40d624e0a800e27d3aa7f2219c5bb4bdcaafce79c7c1ee592b6645c79f45db5579d12744d44129f4c5760419097101d7f45e45ed
-
Filesize
289KB
MD5b51b94ca9ce1d8fe5af1eedf31a6c539
SHA11cd3c22a0fe6e7c02f12f9c762f590f8915dac41
SHA2560f78a9fe159cd1ca7d371795455f918620a6c87e5f3b1ccef0905bd109ecbb5c
SHA5125866ec23f116c29eafc3fa3689ec84741943b49757a49c93034d319f98e1573848774045bd970e1c270d810ff0c94fd1d0e2c5155938e03a59069db8d68317f3
-
Filesize
289KB
MD5b51b94ca9ce1d8fe5af1eedf31a6c539
SHA11cd3c22a0fe6e7c02f12f9c762f590f8915dac41
SHA2560f78a9fe159cd1ca7d371795455f918620a6c87e5f3b1ccef0905bd109ecbb5c
SHA5125866ec23f116c29eafc3fa3689ec84741943b49757a49c93034d319f98e1573848774045bd970e1c270d810ff0c94fd1d0e2c5155938e03a59069db8d68317f3
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
268KB
MD56fa21538ff38e6cf196b108cf07a7826
SHA1ea7fa468cb2b685e6826d2cce991badc2a158b54
SHA2561e04fdd446ae3209b3dde68ee2ed51a6250044bc6fd138ba5315989bc6fe61f1
SHA512dc497b98783e7c35e2659be27b0702871bb5d4c02df31fdbff2e1f8ebc6be649746a820388e42403c330fcc00c2911744bc710022f1e37af77b52e0fabe961fd
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5