Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe
Resource
win10v2004-20230220-en
General
-
Target
797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe
-
Size
567KB
-
MD5
a157fe746b8c15a8bd7fb48c9b5fbd15
-
SHA1
92daa1783007bd8a92bce910b3efeeb1b6236bc2
-
SHA256
797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6
-
SHA512
a4ec5a08d0ef7d1849ad7b76af5d2c892baa76071eef9bf9efb03bdac98974afb20933d7206525d6b1daec0d31b42218631e21d24e86aac5ca64d1eb8b6041a7
-
SSDEEP
12288:ZMr1y90nxSG3iHbnfRHlgkFYEJqQZZxXL7ajaoktxOR:Iys3WjNlXxq0L7maTk
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4704-148-0x000000000ACF0000-0x000000000B308000-memory.dmp redline_stealer behavioral2/memory/4704-156-0x000000000B410000-0x000000000B476000-memory.dmp redline_stealer behavioral2/memory/4704-158-0x000000000C070000-0x000000000C232000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l9667374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l9667374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l9667374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l9667374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l9667374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l9667374.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m4053398.exe -
Executes dropped EXE 7 IoCs
pid Process 4404 y4026749.exe 4704 k5351311.exe 2136 l9667374.exe 2672 m4053398.exe 5004 oneetx.exe 844 oneetx.exe 2944 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3712 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l9667374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l9667374.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4026749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4026749.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 3432 2672 WerFault.exe 93 3020 2672 WerFault.exe 93 1680 2672 WerFault.exe 93 2364 2672 WerFault.exe 93 1656 2672 WerFault.exe 93 4260 2672 WerFault.exe 93 1696 2672 WerFault.exe 93 3788 2672 WerFault.exe 93 3380 2672 WerFault.exe 93 2376 2672 WerFault.exe 93 5032 2672 WerFault.exe 93 1440 5004 WerFault.exe 114 1436 5004 WerFault.exe 114 4284 5004 WerFault.exe 114 1732 5004 WerFault.exe 114 1632 5004 WerFault.exe 114 4140 5004 WerFault.exe 114 632 5004 WerFault.exe 114 620 5004 WerFault.exe 114 4976 5004 WerFault.exe 114 2340 5004 WerFault.exe 114 5044 5004 WerFault.exe 114 3480 5004 WerFault.exe 114 3304 5004 WerFault.exe 114 3744 5004 WerFault.exe 114 4820 844 WerFault.exe 155 3956 5004 WerFault.exe 114 2232 5004 WerFault.exe 114 332 5004 WerFault.exe 114 3972 2944 WerFault.exe 165 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2244 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4704 k5351311.exe 4704 k5351311.exe 2136 l9667374.exe 2136 l9667374.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4704 k5351311.exe Token: SeDebugPrivilege 2136 l9667374.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 m4053398.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4404 4968 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe 83 PID 4968 wrote to memory of 4404 4968 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe 83 PID 4968 wrote to memory of 4404 4968 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe 83 PID 4404 wrote to memory of 4704 4404 y4026749.exe 84 PID 4404 wrote to memory of 4704 4404 y4026749.exe 84 PID 4404 wrote to memory of 4704 4404 y4026749.exe 84 PID 4404 wrote to memory of 2136 4404 y4026749.exe 91 PID 4404 wrote to memory of 2136 4404 y4026749.exe 91 PID 4404 wrote to memory of 2136 4404 y4026749.exe 91 PID 4968 wrote to memory of 2672 4968 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe 93 PID 4968 wrote to memory of 2672 4968 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe 93 PID 4968 wrote to memory of 2672 4968 797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe 93 PID 2672 wrote to memory of 5004 2672 m4053398.exe 114 PID 2672 wrote to memory of 5004 2672 m4053398.exe 114 PID 2672 wrote to memory of 5004 2672 m4053398.exe 114 PID 5004 wrote to memory of 2244 5004 oneetx.exe 131 PID 5004 wrote to memory of 2244 5004 oneetx.exe 131 PID 5004 wrote to memory of 2244 5004 oneetx.exe 131 PID 5004 wrote to memory of 932 5004 oneetx.exe 137 PID 5004 wrote to memory of 932 5004 oneetx.exe 137 PID 5004 wrote to memory of 932 5004 oneetx.exe 137 PID 932 wrote to memory of 3384 932 cmd.exe 141 PID 932 wrote to memory of 3384 932 cmd.exe 141 PID 932 wrote to memory of 3384 932 cmd.exe 141 PID 932 wrote to memory of 1264 932 cmd.exe 142 PID 932 wrote to memory of 1264 932 cmd.exe 142 PID 932 wrote to memory of 1264 932 cmd.exe 142 PID 932 wrote to memory of 1640 932 cmd.exe 143 PID 932 wrote to memory of 1640 932 cmd.exe 143 PID 932 wrote to memory of 1640 932 cmd.exe 143 PID 932 wrote to memory of 2180 932 cmd.exe 144 PID 932 wrote to memory of 2180 932 cmd.exe 144 PID 932 wrote to memory of 2180 932 cmd.exe 144 PID 932 wrote to memory of 396 932 cmd.exe 145 PID 932 wrote to memory of 396 932 cmd.exe 145 PID 932 wrote to memory of 396 932 cmd.exe 145 PID 932 wrote to memory of 2832 932 cmd.exe 146 PID 932 wrote to memory of 2832 932 cmd.exe 146 PID 932 wrote to memory of 2832 932 cmd.exe 146 PID 5004 wrote to memory of 3712 5004 oneetx.exe 160 PID 5004 wrote to memory of 3712 5004 oneetx.exe 160 PID 5004 wrote to memory of 3712 5004 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe"C:\Users\Admin\AppData\Local\Temp\797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4026749.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4026749.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5351311.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5351311.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9667374.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9667374.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4053398.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4053398.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 6963⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 7243⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 8603⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 8643⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 9603⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 9883⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 11963⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 11963⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 13083⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 13043⤵
- Program crash
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 6924⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 8284⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 8564⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10524⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10884⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10804⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10924⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10124⤵
- Program crash
PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 13044⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 7724⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 7604⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 13564⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 7284⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 11124⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 16164⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 11124⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 16324⤵
- Program crash
PID:332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 14083⤵
- Program crash
PID:5032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2672 -ip 26721⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2672 -ip 26721⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2672 -ip 26721⤵PID:688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2672 -ip 26721⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2672 -ip 26721⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2672 -ip 26721⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2672 -ip 26721⤵PID:332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2672 -ip 26721⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2672 -ip 26721⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2672 -ip 26721⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2672 -ip 26721⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5004 -ip 50041⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5004 -ip 50041⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5004 -ip 50041⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5004 -ip 50041⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5004 -ip 50041⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5004 -ip 50041⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5004 -ip 50041⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 5004 -ip 50041⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5004 -ip 50041⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5004 -ip 50041⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5004 -ip 50041⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 5004 -ip 50041⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5004 -ip 50041⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5004 -ip 50041⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 3202⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 844 -ip 8441⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5004 -ip 50041⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5004 -ip 50041⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5004 -ip 50041⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 3122⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2944 -ip 29441⤵PID:3796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
307KB
MD53a08f9a33773d2e61e23a0bdbf9b6ad2
SHA1341cbc79957a71d403c33a86a2d3ef03e2680325
SHA25647a80ed0039b5d8f3387e436b69f94539027fba8a9669996037c8b361063ed4a
SHA51295281871aeb4fda5453d60242b63bfc4d603bc0efcb213ffb4ad76c3284a9f85a7dfc99d3ce317cd3a62f51c723b2c3dd9109517c35449491bf3d8af6c52f796
-
Filesize
307KB
MD53a08f9a33773d2e61e23a0bdbf9b6ad2
SHA1341cbc79957a71d403c33a86a2d3ef03e2680325
SHA25647a80ed0039b5d8f3387e436b69f94539027fba8a9669996037c8b361063ed4a
SHA51295281871aeb4fda5453d60242b63bfc4d603bc0efcb213ffb4ad76c3284a9f85a7dfc99d3ce317cd3a62f51c723b2c3dd9109517c35449491bf3d8af6c52f796
-
Filesize
168KB
MD50a0b0619ea656beb91fadbff37bf0228
SHA12a3162201db6cf42c420bc48de6a356a5d47f053
SHA25698271fdaf78c5959dca1f8595e1d72a19cabccf1857bad94ff2152ac73d3c120
SHA5125859aa49387727194a76f1577e55703f024e877b69af70bbf1f123711cdc6c6a31283a9208e5d024b19f3c27de68c5ae316338cc10e8846fb4b019742b09fa38
-
Filesize
168KB
MD50a0b0619ea656beb91fadbff37bf0228
SHA12a3162201db6cf42c420bc48de6a356a5d47f053
SHA25698271fdaf78c5959dca1f8595e1d72a19cabccf1857bad94ff2152ac73d3c120
SHA5125859aa49387727194a76f1577e55703f024e877b69af70bbf1f123711cdc6c6a31283a9208e5d024b19f3c27de68c5ae316338cc10e8846fb4b019742b09fa38
-
Filesize
177KB
MD57e895b278b023ca641f1be4a9fb03eb4
SHA1af034a685f9429b856b7d9c522ed64492f223056
SHA25634f358c7f1eed189532b128e78bfc23c168ff5af7c1e79ad4b745ee9a797e3d8
SHA5127ba7a48b62acd01d4980ea7293d82fd877d7d023fe044f0017c7ce6f6ca2983196ff2cacef8567d02650e8682ddb474be457694459e7de2e577b80480d5bd5c0
-
Filesize
177KB
MD57e895b278b023ca641f1be4a9fb03eb4
SHA1af034a685f9429b856b7d9c522ed64492f223056
SHA25634f358c7f1eed189532b128e78bfc23c168ff5af7c1e79ad4b745ee9a797e3d8
SHA5127ba7a48b62acd01d4980ea7293d82fd877d7d023fe044f0017c7ce6f6ca2983196ff2cacef8567d02650e8682ddb474be457694459e7de2e577b80480d5bd5c0
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
271KB
MD5ea81ffd06d78d0ffea188d86bb4798dc
SHA1f5b30996a0f0b97aa28637e41b96eba26b1f13be
SHA256dc41d7a0a8fa2634218f8193632e305e7389f4e59f6a0773d54c0088462f5aa8
SHA512efaac4480ec3f6392cef599563ea3e69c790885f41c65d447c077fee758bc582cc4b1161cbb753bd75f5a2735081a59be53839884e3ba5a72c5c0a5b03e1b335
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5