Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:34
Static task
static1
Behavioral task
behavioral1
Sample
81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe
Resource
win10v2004-20230220-en
General
-
Target
81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe
-
Size
643KB
-
MD5
2cc7aa7e0168eb2592a7a8def853bfd0
-
SHA1
a24ea40f7af17ad880bb435787f2ad638f10fb0b
-
SHA256
81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1
-
SHA512
8979348294d0f81fc7c650b29b2fd3a729c9106ab2a49671b4d02784b5c6711d26f7e67d9720f5265bbecbc46e86b8f701fef53c98bd3c15ccab6688243ad25c
-
SSDEEP
12288:9MrAy90hHOH8MDk19op7shYB+R8ZJHft0NdOggdOxXBCSltLA:1yfvk1OecI8r2Xy4RCSvLA
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3236-148-0x000000000A520000-0x000000000AB38000-memory.dmp redline_stealer behavioral2/memory/3236-155-0x000000000A300000-0x000000000A366000-memory.dmp redline_stealer behavioral2/memory/3236-157-0x000000000B190000-0x000000000B352000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2967069.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2967069.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2967069.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2967069.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h2967069.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2967069.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation i0007897.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
pid Process 4692 x4650495.exe 3236 g8171069.exe 4180 h2967069.exe 4948 i0007897.exe 620 oneetx.exe 3312 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2967069.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2967069.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4650495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4650495.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
pid pid_target Process procid_target 1132 4180 WerFault.exe 84 3188 4948 WerFault.exe 93 2612 4948 WerFault.exe 93 4448 4948 WerFault.exe 93 3376 4948 WerFault.exe 93 4560 4948 WerFault.exe 93 3232 4948 WerFault.exe 93 3872 4948 WerFault.exe 93 3600 4948 WerFault.exe 93 1768 4948 WerFault.exe 93 4908 4948 WerFault.exe 93 2448 620 WerFault.exe 113 1068 620 WerFault.exe 113 4848 620 WerFault.exe 113 3432 620 WerFault.exe 113 4172 620 WerFault.exe 113 1848 620 WerFault.exe 113 652 620 WerFault.exe 113 1220 620 WerFault.exe 113 3044 620 WerFault.exe 113 400 620 WerFault.exe 113 4200 620 WerFault.exe 113 1300 620 WerFault.exe 113 1476 620 WerFault.exe 113 4692 620 WerFault.exe 113 1356 620 WerFault.exe 113 4888 3312 WerFault.exe 157 4560 620 WerFault.exe 113 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3236 g8171069.exe 3236 g8171069.exe 4180 h2967069.exe 4180 h2967069.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3236 g8171069.exe Token: SeDebugPrivilege 4180 h2967069.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4948 i0007897.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4692 4708 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe 82 PID 4708 wrote to memory of 4692 4708 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe 82 PID 4708 wrote to memory of 4692 4708 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe 82 PID 4692 wrote to memory of 3236 4692 x4650495.exe 83 PID 4692 wrote to memory of 3236 4692 x4650495.exe 83 PID 4692 wrote to memory of 3236 4692 x4650495.exe 83 PID 4692 wrote to memory of 4180 4692 x4650495.exe 84 PID 4692 wrote to memory of 4180 4692 x4650495.exe 84 PID 4692 wrote to memory of 4180 4692 x4650495.exe 84 PID 4708 wrote to memory of 4948 4708 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe 93 PID 4708 wrote to memory of 4948 4708 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe 93 PID 4708 wrote to memory of 4948 4708 81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe 93 PID 4948 wrote to memory of 620 4948 i0007897.exe 113 PID 4948 wrote to memory of 620 4948 i0007897.exe 113 PID 4948 wrote to memory of 620 4948 i0007897.exe 113 PID 620 wrote to memory of 3964 620 oneetx.exe 130 PID 620 wrote to memory of 3964 620 oneetx.exe 130 PID 620 wrote to memory of 3964 620 oneetx.exe 130 PID 620 wrote to memory of 3104 620 oneetx.exe 136 PID 620 wrote to memory of 3104 620 oneetx.exe 136 PID 620 wrote to memory of 3104 620 oneetx.exe 136 PID 3104 wrote to memory of 552 3104 cmd.exe 140 PID 3104 wrote to memory of 552 3104 cmd.exe 140 PID 3104 wrote to memory of 552 3104 cmd.exe 140 PID 3104 wrote to memory of 1628 3104 cmd.exe 141 PID 3104 wrote to memory of 1628 3104 cmd.exe 141 PID 3104 wrote to memory of 1628 3104 cmd.exe 141 PID 3104 wrote to memory of 1996 3104 cmd.exe 142 PID 3104 wrote to memory of 1996 3104 cmd.exe 142 PID 3104 wrote to memory of 1996 3104 cmd.exe 142 PID 3104 wrote to memory of 4876 3104 cmd.exe 143 PID 3104 wrote to memory of 4876 3104 cmd.exe 143 PID 3104 wrote to memory of 4876 3104 cmd.exe 143 PID 3104 wrote to memory of 3336 3104 cmd.exe 144 PID 3104 wrote to memory of 3336 3104 cmd.exe 144 PID 3104 wrote to memory of 3336 3104 cmd.exe 144 PID 3104 wrote to memory of 1020 3104 cmd.exe 145 PID 3104 wrote to memory of 1020 3104 cmd.exe 145 PID 3104 wrote to memory of 1020 3104 cmd.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe"C:\Users\Admin\AppData\Local\Temp\81ffeaf62fc612b4cc4bae5ba7b6de526fd7c3b27f6507311dfeadefc63cdad1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4650495.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4650495.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8171069.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8171069.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2967069.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2967069.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 10804⤵
- Program crash
PID:1132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0007897.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0007897.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 6963⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 7803⤵
- Program crash
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 8603⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9083⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9763⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9883⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 12163⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 12443⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 13163⤵
- Program crash
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 6364⤵
- Program crash
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 8484⤵
- Program crash
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 8964⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 10524⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 10724⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 10724⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 11004⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 9924⤵
- Program crash
PID:1220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 7284⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 9044⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 7564⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 9884⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 12524⤵
- Program crash
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 14764⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 11404⤵
- Program crash
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 15924⤵
- Program crash
PID:4560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 15203⤵
- Program crash
PID:4908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4180 -ip 41801⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4948 -ip 49481⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4948 -ip 49481⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4948 -ip 49481⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4948 -ip 49481⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4948 -ip 49481⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4948 -ip 49481⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4948 -ip 49481⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4948 -ip 49481⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4948 -ip 49481⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4948 -ip 49481⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 620 -ip 6201⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 620 -ip 6201⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 620 -ip 6201⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 620 -ip 6201⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 620 -ip 6201⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 620 -ip 6201⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 620 -ip 6201⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 620 -ip 6201⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 620 -ip 6201⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 620 -ip 6201⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 620 -ip 6201⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 620 -ip 6201⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 620 -ip 6201⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 620 -ip 6201⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 620 -ip 6201⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 3162⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3312 -ip 33121⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 620 -ip 6201⤵PID:3648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD568ff21d4ec600b08e4019bf10b1d2564
SHA1f5f5b0c024d78ebfc4835ec0b62b1ff1692403b8
SHA2561f7789b2c1937d951892e4f1a9752e8096a32f83ba94b4f2d4d51211e4f97940
SHA51208d66797f82d1b8cbc4da671f2f0ef38c4dbd5a1f86b89fda804da7245e84fd799be749a6808cbb6c3ac75a27a373c025b0b3864ab77fd5d0c516f00c9bb07f6
-
Filesize
271KB
MD568ff21d4ec600b08e4019bf10b1d2564
SHA1f5f5b0c024d78ebfc4835ec0b62b1ff1692403b8
SHA2561f7789b2c1937d951892e4f1a9752e8096a32f83ba94b4f2d4d51211e4f97940
SHA51208d66797f82d1b8cbc4da671f2f0ef38c4dbd5a1f86b89fda804da7245e84fd799be749a6808cbb6c3ac75a27a373c025b0b3864ab77fd5d0c516f00c9bb07f6
-
Filesize
383KB
MD5930f6e954544f7ac916362ca9a9787c3
SHA1943426c57e58d5ab5bbc117dae1d1c1dd1cfd204
SHA25650d47002f49c61f2daa1f0ded055103133036f2cea34d8472fd24d779c31b0a4
SHA5124e1c3e4c4b3ea5a409c443000eb74d4377353c0c17659a89544f44ff8e2874d2a0a798bb2411e8ec572c3c8771386eb89497533b542071519d48ab7c44bd1de8
-
Filesize
383KB
MD5930f6e954544f7ac916362ca9a9787c3
SHA1943426c57e58d5ab5bbc117dae1d1c1dd1cfd204
SHA25650d47002f49c61f2daa1f0ded055103133036f2cea34d8472fd24d779c31b0a4
SHA5124e1c3e4c4b3ea5a409c443000eb74d4377353c0c17659a89544f44ff8e2874d2a0a798bb2411e8ec572c3c8771386eb89497533b542071519d48ab7c44bd1de8
-
Filesize
168KB
MD534d3bfe4c1167d21827e58bdba64606b
SHA1130bdb8fa745d2065177e1e4d4dbab15a8a82c53
SHA25641a0c6130165020b5ae1a684dc457554ccedbc89295705fac6bcb8bd37dcae03
SHA512a0c842162a00b6a914861f7acdf91896e07d2ff027fe26b71a0a832abc0de007beb459671aca8da7fac056bcab9c2ca6b0e9e69fa73cb65b9683fe317997a99a
-
Filesize
168KB
MD534d3bfe4c1167d21827e58bdba64606b
SHA1130bdb8fa745d2065177e1e4d4dbab15a8a82c53
SHA25641a0c6130165020b5ae1a684dc457554ccedbc89295705fac6bcb8bd37dcae03
SHA512a0c842162a00b6a914861f7acdf91896e07d2ff027fe26b71a0a832abc0de007beb459671aca8da7fac056bcab9c2ca6b0e9e69fa73cb65b9683fe317997a99a
-
Filesize
291KB
MD590094a968d4d505bdb4c087c5c279fdb
SHA12442fe8d999b4d3026bcc210e73f657839976404
SHA256eb3b9e39bea094a5564c23b19dde04e6788b54e1133589ad9053eb19fa080c35
SHA512772b8dbf05226128d11936ed9dd8b6d50278cc863666331f83aaa7b03e3ff09c2c196bdd8efe514437334c755ab17e61ee49b6b785b2bd76fed1e9d08b39097b
-
Filesize
291KB
MD590094a968d4d505bdb4c087c5c279fdb
SHA12442fe8d999b4d3026bcc210e73f657839976404
SHA256eb3b9e39bea094a5564c23b19dde04e6788b54e1133589ad9053eb19fa080c35
SHA512772b8dbf05226128d11936ed9dd8b6d50278cc863666331f83aaa7b03e3ff09c2c196bdd8efe514437334c755ab17e61ee49b6b785b2bd76fed1e9d08b39097b
-
Filesize
271KB
MD568ff21d4ec600b08e4019bf10b1d2564
SHA1f5f5b0c024d78ebfc4835ec0b62b1ff1692403b8
SHA2561f7789b2c1937d951892e4f1a9752e8096a32f83ba94b4f2d4d51211e4f97940
SHA51208d66797f82d1b8cbc4da671f2f0ef38c4dbd5a1f86b89fda804da7245e84fd799be749a6808cbb6c3ac75a27a373c025b0b3864ab77fd5d0c516f00c9bb07f6
-
Filesize
271KB
MD568ff21d4ec600b08e4019bf10b1d2564
SHA1f5f5b0c024d78ebfc4835ec0b62b1ff1692403b8
SHA2561f7789b2c1937d951892e4f1a9752e8096a32f83ba94b4f2d4d51211e4f97940
SHA51208d66797f82d1b8cbc4da671f2f0ef38c4dbd5a1f86b89fda804da7245e84fd799be749a6808cbb6c3ac75a27a373c025b0b3864ab77fd5d0c516f00c9bb07f6
-
Filesize
271KB
MD568ff21d4ec600b08e4019bf10b1d2564
SHA1f5f5b0c024d78ebfc4835ec0b62b1ff1692403b8
SHA2561f7789b2c1937d951892e4f1a9752e8096a32f83ba94b4f2d4d51211e4f97940
SHA51208d66797f82d1b8cbc4da671f2f0ef38c4dbd5a1f86b89fda804da7245e84fd799be749a6808cbb6c3ac75a27a373c025b0b3864ab77fd5d0c516f00c9bb07f6
-
Filesize
271KB
MD568ff21d4ec600b08e4019bf10b1d2564
SHA1f5f5b0c024d78ebfc4835ec0b62b1ff1692403b8
SHA2561f7789b2c1937d951892e4f1a9752e8096a32f83ba94b4f2d4d51211e4f97940
SHA51208d66797f82d1b8cbc4da671f2f0ef38c4dbd5a1f86b89fda804da7245e84fd799be749a6808cbb6c3ac75a27a373c025b0b3864ab77fd5d0c516f00c9bb07f6
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5