Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe
Resource
win10v2004-20230220-en
General
-
Target
77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe
-
Size
1.2MB
-
MD5
ebbcc3079f189b7c96593dd4217b5e03
-
SHA1
f5be5ba6b78e46e887a38cfdfc6f596c6dc06888
-
SHA256
77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da
-
SHA512
d6f33add0f8d82605ce86e0a201e17882e778442aa99354a7896a804349e8a33deeb4b1c8e6e5ebccb460926b2d6b717f28c8c7d81b3f70e8acf598c7a4a1ca1
-
SSDEEP
24576:RybhNPd/u4laDiNWPEWX2yWdWHzqYlwBMvo7fUs23oHCYHYdj:ElNPdm4laAWPzUgdwBMvefUsOoHRH
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2124-155-0x0000000007F70000-0x0000000008588000-memory.dmp redline_stealer behavioral2/memory/2124-160-0x0000000007D80000-0x0000000007DE6000-memory.dmp redline_stealer behavioral2/memory/2124-166-0x00000000095C0000-0x0000000009782000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1483507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1483507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1483507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1483507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1483507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1483507.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i8936253.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation j2490064.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 4368 x3126316.exe 1796 x2592201.exe 2124 g3795500.exe 4416 h1483507.exe 4604 i8936253.exe 2088 1.exe 508 j2490064.exe 4264 oneetx.exe 4368 oneetx.exe 4428 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3644 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1483507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1483507.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2592201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2592201.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Windows\\Temp\\1.exe" i8936253.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3126316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3126316.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 3664 4416 WerFault.exe 86 1308 4604 WerFault.exe 89 3408 508 WerFault.exe 94 764 508 WerFault.exe 94 2124 508 WerFault.exe 94 3064 508 WerFault.exe 94 4152 508 WerFault.exe 94 4956 508 WerFault.exe 94 2684 508 WerFault.exe 94 908 508 WerFault.exe 94 3880 508 WerFault.exe 94 4696 508 WerFault.exe 94 4456 4264 WerFault.exe 113 2188 4264 WerFault.exe 113 1840 4264 WerFault.exe 113 3272 4264 WerFault.exe 113 3924 4264 WerFault.exe 113 4468 4264 WerFault.exe 113 2212 4264 WerFault.exe 113 4436 4264 WerFault.exe 113 2204 4264 WerFault.exe 113 1328 4264 WerFault.exe 113 3828 4264 WerFault.exe 113 800 4264 WerFault.exe 113 4228 4264 WerFault.exe 113 3544 4264 WerFault.exe 113 2156 4368 WerFault.exe 154 1776 4264 WerFault.exe 113 2856 4264 WerFault.exe 113 4388 4264 WerFault.exe 113 956 4428 WerFault.exe 164 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2124 g3795500.exe 2124 g3795500.exe 4416 h1483507.exe 4416 h1483507.exe 2088 1.exe 2088 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2124 g3795500.exe Token: SeDebugPrivilege 4416 h1483507.exe Token: SeDebugPrivilege 4604 i8936253.exe Token: SeDebugPrivilege 2088 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 508 j2490064.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1716 wrote to memory of 4368 1716 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe 83 PID 1716 wrote to memory of 4368 1716 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe 83 PID 1716 wrote to memory of 4368 1716 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe 83 PID 4368 wrote to memory of 1796 4368 x3126316.exe 84 PID 4368 wrote to memory of 1796 4368 x3126316.exe 84 PID 4368 wrote to memory of 1796 4368 x3126316.exe 84 PID 1796 wrote to memory of 2124 1796 x2592201.exe 85 PID 1796 wrote to memory of 2124 1796 x2592201.exe 85 PID 1796 wrote to memory of 2124 1796 x2592201.exe 85 PID 1796 wrote to memory of 4416 1796 x2592201.exe 86 PID 1796 wrote to memory of 4416 1796 x2592201.exe 86 PID 1796 wrote to memory of 4416 1796 x2592201.exe 86 PID 4368 wrote to memory of 4604 4368 x3126316.exe 89 PID 4368 wrote to memory of 4604 4368 x3126316.exe 89 PID 4368 wrote to memory of 4604 4368 x3126316.exe 89 PID 4604 wrote to memory of 2088 4604 i8936253.exe 91 PID 4604 wrote to memory of 2088 4604 i8936253.exe 91 PID 4604 wrote to memory of 2088 4604 i8936253.exe 91 PID 1716 wrote to memory of 508 1716 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe 94 PID 1716 wrote to memory of 508 1716 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe 94 PID 1716 wrote to memory of 508 1716 77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe 94 PID 508 wrote to memory of 4264 508 j2490064.exe 113 PID 508 wrote to memory of 4264 508 j2490064.exe 113 PID 508 wrote to memory of 4264 508 j2490064.exe 113 PID 4264 wrote to memory of 4820 4264 oneetx.exe 130 PID 4264 wrote to memory of 4820 4264 oneetx.exe 130 PID 4264 wrote to memory of 4820 4264 oneetx.exe 130 PID 4264 wrote to memory of 4156 4264 oneetx.exe 136 PID 4264 wrote to memory of 4156 4264 oneetx.exe 136 PID 4264 wrote to memory of 4156 4264 oneetx.exe 136 PID 4156 wrote to memory of 3048 4156 cmd.exe 139 PID 4156 wrote to memory of 3048 4156 cmd.exe 139 PID 4156 wrote to memory of 3048 4156 cmd.exe 139 PID 4156 wrote to memory of 636 4156 cmd.exe 140 PID 4156 wrote to memory of 636 4156 cmd.exe 140 PID 4156 wrote to memory of 636 4156 cmd.exe 140 PID 4156 wrote to memory of 112 4156 cmd.exe 142 PID 4156 wrote to memory of 112 4156 cmd.exe 142 PID 4156 wrote to memory of 112 4156 cmd.exe 142 PID 4156 wrote to memory of 1820 4156 cmd.exe 144 PID 4156 wrote to memory of 1820 4156 cmd.exe 144 PID 4156 wrote to memory of 1820 4156 cmd.exe 144 PID 4156 wrote to memory of 312 4156 cmd.exe 143 PID 4156 wrote to memory of 312 4156 cmd.exe 143 PID 4156 wrote to memory of 312 4156 cmd.exe 143 PID 4156 wrote to memory of 4624 4156 cmd.exe 145 PID 4156 wrote to memory of 4624 4156 cmd.exe 145 PID 4156 wrote to memory of 4624 4156 cmd.exe 145 PID 4264 wrote to memory of 3644 4264 oneetx.exe 159 PID 4264 wrote to memory of 3644 4264 oneetx.exe 159 PID 4264 wrote to memory of 3644 4264 oneetx.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe"C:\Users\Admin\AppData\Local\Temp\77ee85c342bd8a7dd6dbc8512bbf4a954ddd5f826914b5c8021f0aea250ed5da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3126316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3126316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2592201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2592201.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3795500.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3795500.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1483507.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1483507.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 10805⤵
- Program crash
PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i8936253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i8936253.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 13804⤵
- Program crash
PID:1308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2490064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2490064.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 7003⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 7643⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 8563⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 8643⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 8603⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 9923⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12163⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12283⤵
- Program crash
PID:908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13123⤵
- Program crash
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 6924⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 8164⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 8164⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10524⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10724⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10724⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 11004⤵
- Program crash
PID:2212
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 9924⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 7644⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 13644⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 7644⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 13244⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 7324⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 11084⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 16044⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 14884⤵
- Program crash
PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 16204⤵
- Program crash
PID:4388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13443⤵
- Program crash
PID:4696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4416 -ip 44161⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4604 -ip 46041⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 508 -ip 5081⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 508 -ip 5081⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 508 -ip 5081⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 508 -ip 5081⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 508 -ip 5081⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 508 -ip 5081⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 508 -ip 5081⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 508 -ip 5081⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 508 -ip 5081⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 508 -ip 5081⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4264 -ip 42641⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4264 -ip 42641⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4264 -ip 42641⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4264 -ip 42641⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4264 -ip 42641⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4264 -ip 42641⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4264 -ip 42641⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4264 -ip 42641⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4264 -ip 42641⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4264 -ip 42641⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4264 -ip 42641⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4264 -ip 42641⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4264 -ip 42641⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4264 -ip 42641⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 3242⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4368 -ip 43681⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4264 -ip 42641⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4264 -ip 42641⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4264 -ip 42641⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 3122⤵
- Program crash
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4428 -ip 44281⤵PID:3268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
914KB
MD506a46b67e242ee6486326831f72caa59
SHA1968c7e5c916fc7cf33ec92768121fcf13f51975a
SHA256fba34be3f916054f1578621019ab1f2288a21204a881b2a43f4bc7ef30c007a4
SHA5122ddae38fcc3a1a594af86256f09e3518af134a24c7cae4ea2ca8666b5b071df503d335039c34b0a3e76544f81b5c9a6168d7e484194e2e589887f39871497cb0
-
Filesize
914KB
MD506a46b67e242ee6486326831f72caa59
SHA1968c7e5c916fc7cf33ec92768121fcf13f51975a
SHA256fba34be3f916054f1578621019ab1f2288a21204a881b2a43f4bc7ef30c007a4
SHA5122ddae38fcc3a1a594af86256f09e3518af134a24c7cae4ea2ca8666b5b071df503d335039c34b0a3e76544f81b5c9a6168d7e484194e2e589887f39871497cb0
-
Filesize
547KB
MD53aec1d02aba3d55f8b02bd1a11c4b4ed
SHA1a1bfa06b169e9ef2a5dd064ac3b9fabaae5e7d05
SHA256d39029335760279d6fd1dc0ef3e55ccaed526bb6a5c73fea2e48dc28e03b42ff
SHA512da8144b3b0d960a91fe8ac1aac973a28d59158fe819e059fc0f61094a78ab0b65b9fc55b66925843f117b8e7f4cd61a01cea5ce5c9ba4c41096fc380b81cdcd9
-
Filesize
547KB
MD53aec1d02aba3d55f8b02bd1a11c4b4ed
SHA1a1bfa06b169e9ef2a5dd064ac3b9fabaae5e7d05
SHA256d39029335760279d6fd1dc0ef3e55ccaed526bb6a5c73fea2e48dc28e03b42ff
SHA512da8144b3b0d960a91fe8ac1aac973a28d59158fe819e059fc0f61094a78ab0b65b9fc55b66925843f117b8e7f4cd61a01cea5ce5c9ba4c41096fc380b81cdcd9
-
Filesize
416KB
MD54d5d286458aadc4de17ffcf62df203db
SHA1cd7728c1b817f5227e8ee427628121d671108a5e
SHA256c8b5b326d3b7d9167c8bd86ef6abd68e807f5b4cf975d55a4e57c1eaf825e053
SHA51281182aa6b23a784d5c48ade9464d9593082a0bddc4f1b82e7a1f308942c969c3c00b0266b554814fd67bb96dda890e0a6a7a1c48c275a2542e3a0d066fcc1a37
-
Filesize
416KB
MD54d5d286458aadc4de17ffcf62df203db
SHA1cd7728c1b817f5227e8ee427628121d671108a5e
SHA256c8b5b326d3b7d9167c8bd86ef6abd68e807f5b4cf975d55a4e57c1eaf825e053
SHA51281182aa6b23a784d5c48ade9464d9593082a0bddc4f1b82e7a1f308942c969c3c00b0266b554814fd67bb96dda890e0a6a7a1c48c275a2542e3a0d066fcc1a37
-
Filesize
137KB
MD5bcd1742c363b47e2822cfca7a99c7d0e
SHA1ee38713a77bea5a2e022552278ec1e4395596ffd
SHA2569e44f9d653dfa3cf0d13c00ab801ce1e88b816ec81e7b878e697264a3308c648
SHA5121925af7f9b65cf67ce2f6b7e6a3a7ee25bd2cb0edcce7076ffb7a735b338b6f30dff1fe1197979768a4a15fb1bf07d5f725f00a558615ad7c16e7e1579222c8a
-
Filesize
137KB
MD5bcd1742c363b47e2822cfca7a99c7d0e
SHA1ee38713a77bea5a2e022552278ec1e4395596ffd
SHA2569e44f9d653dfa3cf0d13c00ab801ce1e88b816ec81e7b878e697264a3308c648
SHA5121925af7f9b65cf67ce2f6b7e6a3a7ee25bd2cb0edcce7076ffb7a735b338b6f30dff1fe1197979768a4a15fb1bf07d5f725f00a558615ad7c16e7e1579222c8a
-
Filesize
360KB
MD590683226dc4da0abc9668f41fb4a7e77
SHA1d4daa55c344a5309b1c47a1571d733a2e0e8be51
SHA256391391cd6db6ce5eed67f05ff1614289ca77cd15a30de19e0648103525ea0b37
SHA51222d6501604d37c119fbefaeeaca51157a60228761c8aa03e16a50a39f114b5089046b96e1fb61520f707aad03bbb04eca393a27533f2c7ebc58f609e01d09a3b
-
Filesize
360KB
MD590683226dc4da0abc9668f41fb4a7e77
SHA1d4daa55c344a5309b1c47a1571d733a2e0e8be51
SHA256391391cd6db6ce5eed67f05ff1614289ca77cd15a30de19e0648103525ea0b37
SHA51222d6501604d37c119fbefaeeaca51157a60228761c8aa03e16a50a39f114b5089046b96e1fb61520f707aad03bbb04eca393a27533f2c7ebc58f609e01d09a3b
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
339KB
MD5c68c7cf50021f4d8e34b71e358fa1d73
SHA1e799820a2999c016b192714058a39f1a244f96b2
SHA256a37186b2342069f9be929ac1f6408673cf61da36b565c8f8ab90bcc22024c7b2
SHA5124750a0754e98e2a716e099334635fe05537d086b3338759cb7ed3f9543d3aa4f30d7ed64684b83b60f725e3278136894e24078d75de1c25689180f5ebabec75c
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8