Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe
Resource
win10v2004-20230220-en
General
-
Target
182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe
-
Size
1.2MB
-
MD5
4db79e92ce0ad57440fcd54c6da2a8f1
-
SHA1
9927dbd1e8b47725ab0b3ceb8f41cc845627a49e
-
SHA256
182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b
-
SHA512
444ff5a1aac771a31dea3bdb749664e6d39215933c07933d54b66a64162ed7f4766e0156a19b42c2d2477ffe8fd44d7ff4abb8e83227e7c8709dec1699c1b9f0
-
SSDEEP
24576:ByMXIFME02NGs3yjr/WArfjT+zAei22YbyBD42gCl0whcHgLW3jM:0MXaMEHN1AjjqAeiWyBD4rCmweHgL+j
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4440-155-0x00000000075A0000-0x0000000007BB8000-memory.dmp redline_stealer behavioral2/memory/4440-161-0x0000000007DD0000-0x0000000007E36000-memory.dmp redline_stealer behavioral2/memory/4440-166-0x0000000008BA0000-0x0000000008D62000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1627731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1627731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1627731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1627731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1627731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1627731.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation i0751411.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation j8549508.exe -
Executes dropped EXE 9 IoCs
pid Process 2136 x6230605.exe 4500 x6019604.exe 4440 g6960692.exe 3588 h1627731.exe 4200 i0751411.exe 4568 1.exe 1120 j8549508.exe 4948 oneetx.exe 3336 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1627731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1627731.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6230605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6230605.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6019604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6019604.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Windows\\Temp\\1.exe" i0751411.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
pid pid_target Process procid_target 4616 3588 WerFault.exe 93 4088 4200 WerFault.exe 96 3588 1120 WerFault.exe 100 1308 1120 WerFault.exe 100 3164 1120 WerFault.exe 100 316 1120 WerFault.exe 100 368 1120 WerFault.exe 100 3812 1120 WerFault.exe 100 912 1120 WerFault.exe 100 5112 1120 WerFault.exe 100 2492 1120 WerFault.exe 100 4592 1120 WerFault.exe 100 1944 4948 WerFault.exe 119 1004 4948 WerFault.exe 119 4352 4948 WerFault.exe 119 624 4948 WerFault.exe 119 1052 4948 WerFault.exe 119 3380 4948 WerFault.exe 119 3488 4948 WerFault.exe 119 4280 4948 WerFault.exe 119 4960 4948 WerFault.exe 119 3508 4948 WerFault.exe 119 3340 4948 WerFault.exe 119 4128 4948 WerFault.exe 119 1112 4948 WerFault.exe 119 4228 3336 WerFault.exe 158 3796 4948 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4440 g6960692.exe 4440 g6960692.exe 3588 h1627731.exe 3588 h1627731.exe 4568 1.exe 4568 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4440 g6960692.exe Token: SeDebugPrivilege 3588 h1627731.exe Token: SeDebugPrivilege 4200 i0751411.exe Token: SeDebugPrivilege 4568 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 j8549508.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2136 2132 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe 83 PID 2132 wrote to memory of 2136 2132 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe 83 PID 2132 wrote to memory of 2136 2132 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe 83 PID 2136 wrote to memory of 4500 2136 x6230605.exe 84 PID 2136 wrote to memory of 4500 2136 x6230605.exe 84 PID 2136 wrote to memory of 4500 2136 x6230605.exe 84 PID 4500 wrote to memory of 4440 4500 x6019604.exe 85 PID 4500 wrote to memory of 4440 4500 x6019604.exe 85 PID 4500 wrote to memory of 4440 4500 x6019604.exe 85 PID 4500 wrote to memory of 3588 4500 x6019604.exe 93 PID 4500 wrote to memory of 3588 4500 x6019604.exe 93 PID 4500 wrote to memory of 3588 4500 x6019604.exe 93 PID 2136 wrote to memory of 4200 2136 x6230605.exe 96 PID 2136 wrote to memory of 4200 2136 x6230605.exe 96 PID 2136 wrote to memory of 4200 2136 x6230605.exe 96 PID 4200 wrote to memory of 4568 4200 i0751411.exe 97 PID 4200 wrote to memory of 4568 4200 i0751411.exe 97 PID 4200 wrote to memory of 4568 4200 i0751411.exe 97 PID 2132 wrote to memory of 1120 2132 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe 100 PID 2132 wrote to memory of 1120 2132 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe 100 PID 2132 wrote to memory of 1120 2132 182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe 100 PID 1120 wrote to memory of 4948 1120 j8549508.exe 119 PID 1120 wrote to memory of 4948 1120 j8549508.exe 119 PID 1120 wrote to memory of 4948 1120 j8549508.exe 119 PID 4948 wrote to memory of 532 4948 oneetx.exe 136 PID 4948 wrote to memory of 532 4948 oneetx.exe 136 PID 4948 wrote to memory of 532 4948 oneetx.exe 136 PID 4948 wrote to memory of 4440 4948 oneetx.exe 144 PID 4948 wrote to memory of 4440 4948 oneetx.exe 144 PID 4948 wrote to memory of 4440 4948 oneetx.exe 144 PID 4440 wrote to memory of 5116 4440 cmd.exe 146 PID 4440 wrote to memory of 5116 4440 cmd.exe 146 PID 4440 wrote to memory of 5116 4440 cmd.exe 146 PID 4440 wrote to memory of 4300 4440 cmd.exe 147 PID 4440 wrote to memory of 4300 4440 cmd.exe 147 PID 4440 wrote to memory of 4300 4440 cmd.exe 147 PID 4440 wrote to memory of 1124 4440 cmd.exe 148 PID 4440 wrote to memory of 1124 4440 cmd.exe 148 PID 4440 wrote to memory of 1124 4440 cmd.exe 148 PID 4440 wrote to memory of 792 4440 cmd.exe 149 PID 4440 wrote to memory of 792 4440 cmd.exe 149 PID 4440 wrote to memory of 792 4440 cmd.exe 149 PID 4440 wrote to memory of 628 4440 cmd.exe 150 PID 4440 wrote to memory of 628 4440 cmd.exe 150 PID 4440 wrote to memory of 628 4440 cmd.exe 150 PID 4440 wrote to memory of 548 4440 cmd.exe 151 PID 4440 wrote to memory of 548 4440 cmd.exe 151 PID 4440 wrote to memory of 548 4440 cmd.exe 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe"C:\Users\Admin\AppData\Local\Temp\182be8be9c525edb273ef4b2cec4b9cda6eb50e1a574b2ccaf93c2df95355d3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6230605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6230605.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6019604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6019604.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6960692.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6960692.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1627731.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1627731.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 10805⤵
- Program crash
PID:4616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0751411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0751411.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 13724⤵
- Program crash
PID:4088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8549508.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8549508.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 6963⤵
- Program crash
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 7083⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 7963⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9683⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9883⤵
- Program crash
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9883⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 12163⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 12483⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 13163⤵
- Program crash
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 6924⤵
- Program crash
PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 8364⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9124⤵
- Program crash
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 10524⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 10924⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 11164⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 10684⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9924⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 13004⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9044⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 12924⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 7924⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 8044⤵
- Program crash
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 11204⤵
- Program crash
PID:3796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 13883⤵
- Program crash
PID:4592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3588 -ip 35881⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4200 -ip 42001⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1120 -ip 11201⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1120 -ip 11201⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1120 -ip 11201⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1120 -ip 11201⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1120 -ip 11201⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1120 -ip 11201⤵PID:420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1120 -ip 11201⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1120 -ip 11201⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1120 -ip 11201⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1120 -ip 11201⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4948 -ip 49481⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4948 -ip 49481⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4948 -ip 49481⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4948 -ip 49481⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4948 -ip 49481⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4948 -ip 49481⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4948 -ip 49481⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4948 -ip 49481⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4948 -ip 49481⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4948 -ip 49481⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4948 -ip 49481⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4948 -ip 49481⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4948 -ip 49481⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 3122⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3336 -ip 33361⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4948 -ip 49481⤵PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD5e2094071bc51633b6dc4a9b3e141a531
SHA149e25e6c4c75c1088e44174e98455e45db6f5aee
SHA256119bb8518b796e30b28974eeebf504de7f592fea9326c0498dccee95c98ff8ed
SHA5128f7a20c37b73da9e713250469979e1c2cce88f3c4ec533052abd71df6adee6336acb80c29424b1cf6a4fd09c0d58e9411be11df7d2ce6fe55d1f6c87dc9190d1
-
Filesize
339KB
MD5e2094071bc51633b6dc4a9b3e141a531
SHA149e25e6c4c75c1088e44174e98455e45db6f5aee
SHA256119bb8518b796e30b28974eeebf504de7f592fea9326c0498dccee95c98ff8ed
SHA5128f7a20c37b73da9e713250469979e1c2cce88f3c4ec533052abd71df6adee6336acb80c29424b1cf6a4fd09c0d58e9411be11df7d2ce6fe55d1f6c87dc9190d1
-
Filesize
914KB
MD5d960f6e7892a1ebb893e5270e1703a8a
SHA15075d2288a3dd16bf1e0ea1665c3b95d8dfd09ed
SHA25645410da8c1fd69babb37756ad61ba599510f5a6611cb47fd24bf053f2cb5894a
SHA512c88b00134f6dd8bffe2e87feb7afe247a25d48b6b12847b915720fc3f6409c5910b6dde5287be3feb45944d442a654f0c0246c1fe1416f1d2bb983074eccccac
-
Filesize
914KB
MD5d960f6e7892a1ebb893e5270e1703a8a
SHA15075d2288a3dd16bf1e0ea1665c3b95d8dfd09ed
SHA25645410da8c1fd69babb37756ad61ba599510f5a6611cb47fd24bf053f2cb5894a
SHA512c88b00134f6dd8bffe2e87feb7afe247a25d48b6b12847b915720fc3f6409c5910b6dde5287be3feb45944d442a654f0c0246c1fe1416f1d2bb983074eccccac
-
Filesize
547KB
MD524bd0e92931e4b091940c6f3aecf96f2
SHA11e333ac6accf3e96bbb5cbd680b442fb53bb2e73
SHA2567bb4f311f6ab710f81ffece9473fb487fb1b0654c439b760442974343a027bc3
SHA512dee791cc3d334983c4d8b87c0d77974820bd27869f3e19ce48c17313a75d108ad255f52877cabddd3f0c77adf109decc7462f2e88fb6773c6bf6f41d31cb7a27
-
Filesize
547KB
MD524bd0e92931e4b091940c6f3aecf96f2
SHA11e333ac6accf3e96bbb5cbd680b442fb53bb2e73
SHA2567bb4f311f6ab710f81ffece9473fb487fb1b0654c439b760442974343a027bc3
SHA512dee791cc3d334983c4d8b87c0d77974820bd27869f3e19ce48c17313a75d108ad255f52877cabddd3f0c77adf109decc7462f2e88fb6773c6bf6f41d31cb7a27
-
Filesize
416KB
MD5b1c257311a6a4d2661974abd907644b3
SHA1c033b5e32a4946a9f059955f23c0d260b65f184b
SHA256019a0614078a8fe24220885dc9aea97776e6cf10521aa098e505a8629007b46c
SHA512831375b4c957c0f603a44dce51d691cd8a81d7317251802c817a215bceeb0d6b760586dc088639d17f0d4d6f013ac09dfa890ad9fe020fa0c77cbdc5c212d42a
-
Filesize
416KB
MD5b1c257311a6a4d2661974abd907644b3
SHA1c033b5e32a4946a9f059955f23c0d260b65f184b
SHA256019a0614078a8fe24220885dc9aea97776e6cf10521aa098e505a8629007b46c
SHA512831375b4c957c0f603a44dce51d691cd8a81d7317251802c817a215bceeb0d6b760586dc088639d17f0d4d6f013ac09dfa890ad9fe020fa0c77cbdc5c212d42a
-
Filesize
136KB
MD5428633935f35b956fa7264075864e0fe
SHA103ef9ea3f5c361a77452e80add4540023c7aad20
SHA256c192c6e3a99d905e9515aff735b31274c9f992a70afc918b00b08ba78894244a
SHA51248a0073c485154b99c36a2fe5f081a2fd9bcffd577ef9deb8ee618e22428c64ce9824158f47d546b6fb90e892346638c49a1783b3329376518008417228c9094
-
Filesize
136KB
MD5428633935f35b956fa7264075864e0fe
SHA103ef9ea3f5c361a77452e80add4540023c7aad20
SHA256c192c6e3a99d905e9515aff735b31274c9f992a70afc918b00b08ba78894244a
SHA51248a0073c485154b99c36a2fe5f081a2fd9bcffd577ef9deb8ee618e22428c64ce9824158f47d546b6fb90e892346638c49a1783b3329376518008417228c9094
-
Filesize
360KB
MD5f7e44bbb47ce449076708defaff2bd20
SHA1d9586fd5c7b861537ef3b48e69871aa2e88d0ce0
SHA25650c56e4890a2f03761e77bb82d5c94caab76ce80714867ed54933496c4f66f7a
SHA512c46c466552a44077b69804356644990bcd1184e1eff2af64f446f65978e9ffc4e6e82fbd30dc11d04fdebcd3ff310334e18d296cea7e727dfc62b74084f477d7
-
Filesize
360KB
MD5f7e44bbb47ce449076708defaff2bd20
SHA1d9586fd5c7b861537ef3b48e69871aa2e88d0ce0
SHA25650c56e4890a2f03761e77bb82d5c94caab76ce80714867ed54933496c4f66f7a
SHA512c46c466552a44077b69804356644990bcd1184e1eff2af64f446f65978e9ffc4e6e82fbd30dc11d04fdebcd3ff310334e18d296cea7e727dfc62b74084f477d7
-
Filesize
339KB
MD5e2094071bc51633b6dc4a9b3e141a531
SHA149e25e6c4c75c1088e44174e98455e45db6f5aee
SHA256119bb8518b796e30b28974eeebf504de7f592fea9326c0498dccee95c98ff8ed
SHA5128f7a20c37b73da9e713250469979e1c2cce88f3c4ec533052abd71df6adee6336acb80c29424b1cf6a4fd09c0d58e9411be11df7d2ce6fe55d1f6c87dc9190d1
-
Filesize
339KB
MD5e2094071bc51633b6dc4a9b3e141a531
SHA149e25e6c4c75c1088e44174e98455e45db6f5aee
SHA256119bb8518b796e30b28974eeebf504de7f592fea9326c0498dccee95c98ff8ed
SHA5128f7a20c37b73da9e713250469979e1c2cce88f3c4ec533052abd71df6adee6336acb80c29424b1cf6a4fd09c0d58e9411be11df7d2ce6fe55d1f6c87dc9190d1
-
Filesize
339KB
MD5e2094071bc51633b6dc4a9b3e141a531
SHA149e25e6c4c75c1088e44174e98455e45db6f5aee
SHA256119bb8518b796e30b28974eeebf504de7f592fea9326c0498dccee95c98ff8ed
SHA5128f7a20c37b73da9e713250469979e1c2cce88f3c4ec533052abd71df6adee6336acb80c29424b1cf6a4fd09c0d58e9411be11df7d2ce6fe55d1f6c87dc9190d1
-
Filesize
339KB
MD5e2094071bc51633b6dc4a9b3e141a531
SHA149e25e6c4c75c1088e44174e98455e45db6f5aee
SHA256119bb8518b796e30b28974eeebf504de7f592fea9326c0498dccee95c98ff8ed
SHA5128f7a20c37b73da9e713250469979e1c2cce88f3c4ec533052abd71df6adee6336acb80c29424b1cf6a4fd09c0d58e9411be11df7d2ce6fe55d1f6c87dc9190d1
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8