Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe
Resource
win10v2004-20230220-en
General
-
Target
49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe
-
Size
643KB
-
MD5
a0e92fd46b46d6f1060d039dce57a4ce
-
SHA1
74936def848766b07dfa6f423787cbf534b22ae6
-
SHA256
49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7
-
SHA512
83ac26c14091ccd456ed64b6c2fd6bc02fd57b932d8019d2231d793bd56c8fbd801ed38d68baf8888413249a366bd9f1b434fb9763bc8a13b8eff35f5165d18f
-
SSDEEP
12288:MMrVy90/0gv7LG6YAHgjqyKAn5RaPVZ/3nFBEy5PaGG9E0zxtpa0JzrPWl:Ryn2GnAHgjnnTatZfnj/1a1hz0CnPWl
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3612-148-0x000000000B1D0000-0x000000000B7E8000-memory.dmp redline_stealer behavioral2/memory/3612-155-0x000000000AFF0000-0x000000000B056000-memory.dmp redline_stealer behavioral2/memory/3612-159-0x000000000C750000-0x000000000C912000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1965203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1965203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1965203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1965203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1965203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1965203.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i7488046.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4400 x0403293.exe 3612 g6589506.exe 4220 h1965203.exe 4232 i7488046.exe 460 oneetx.exe 376 oneetx.exe 4108 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1560 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1965203.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1965203.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0403293.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0403293.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 2372 4220 WerFault.exe 87 4712 4232 WerFault.exe 94 4896 4232 WerFault.exe 94 1956 4232 WerFault.exe 94 4180 4232 WerFault.exe 94 4756 4232 WerFault.exe 94 3268 4232 WerFault.exe 94 4448 4232 WerFault.exe 94 540 4232 WerFault.exe 94 3708 4232 WerFault.exe 94 624 4232 WerFault.exe 94 3576 460 WerFault.exe 115 1868 460 WerFault.exe 115 2912 460 WerFault.exe 115 748 460 WerFault.exe 115 2044 460 WerFault.exe 115 732 460 WerFault.exe 115 1664 460 WerFault.exe 115 2364 460 WerFault.exe 115 4580 460 WerFault.exe 115 4420 460 WerFault.exe 115 3312 460 WerFault.exe 115 4616 460 WerFault.exe 115 4624 460 WerFault.exe 115 4220 460 WerFault.exe 115 5020 376 WerFault.exe 156 2964 460 WerFault.exe 115 4756 460 WerFault.exe 115 4552 460 WerFault.exe 115 2120 4108 WerFault.exe 167 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3612 g6589506.exe 3612 g6589506.exe 4220 h1965203.exe 4220 h1965203.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3612 g6589506.exe Token: SeDebugPrivilege 4220 h1965203.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4232 i7488046.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4400 5052 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe 82 PID 5052 wrote to memory of 4400 5052 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe 82 PID 5052 wrote to memory of 4400 5052 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe 82 PID 4400 wrote to memory of 3612 4400 x0403293.exe 83 PID 4400 wrote to memory of 3612 4400 x0403293.exe 83 PID 4400 wrote to memory of 3612 4400 x0403293.exe 83 PID 4400 wrote to memory of 4220 4400 x0403293.exe 87 PID 4400 wrote to memory of 4220 4400 x0403293.exe 87 PID 4400 wrote to memory of 4220 4400 x0403293.exe 87 PID 5052 wrote to memory of 4232 5052 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe 94 PID 5052 wrote to memory of 4232 5052 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe 94 PID 5052 wrote to memory of 4232 5052 49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe 94 PID 4232 wrote to memory of 460 4232 i7488046.exe 115 PID 4232 wrote to memory of 460 4232 i7488046.exe 115 PID 4232 wrote to memory of 460 4232 i7488046.exe 115 PID 460 wrote to memory of 3264 460 oneetx.exe 132 PID 460 wrote to memory of 3264 460 oneetx.exe 132 PID 460 wrote to memory of 3264 460 oneetx.exe 132 PID 460 wrote to memory of 4276 460 oneetx.exe 138 PID 460 wrote to memory of 4276 460 oneetx.exe 138 PID 460 wrote to memory of 4276 460 oneetx.exe 138 PID 4276 wrote to memory of 5076 4276 cmd.exe 142 PID 4276 wrote to memory of 5076 4276 cmd.exe 142 PID 4276 wrote to memory of 5076 4276 cmd.exe 142 PID 4276 wrote to memory of 448 4276 cmd.exe 143 PID 4276 wrote to memory of 448 4276 cmd.exe 143 PID 4276 wrote to memory of 448 4276 cmd.exe 143 PID 4276 wrote to memory of 2012 4276 cmd.exe 144 PID 4276 wrote to memory of 2012 4276 cmd.exe 144 PID 4276 wrote to memory of 2012 4276 cmd.exe 144 PID 4276 wrote to memory of 3168 4276 cmd.exe 145 PID 4276 wrote to memory of 3168 4276 cmd.exe 145 PID 4276 wrote to memory of 3168 4276 cmd.exe 145 PID 4276 wrote to memory of 2224 4276 cmd.exe 146 PID 4276 wrote to memory of 2224 4276 cmd.exe 146 PID 4276 wrote to memory of 2224 4276 cmd.exe 146 PID 4276 wrote to memory of 996 4276 cmd.exe 147 PID 4276 wrote to memory of 996 4276 cmd.exe 147 PID 4276 wrote to memory of 996 4276 cmd.exe 147 PID 460 wrote to memory of 1560 460 oneetx.exe 161 PID 460 wrote to memory of 1560 460 oneetx.exe 161 PID 460 wrote to memory of 1560 460 oneetx.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe"C:\Users\Admin\AppData\Local\Temp\49ecba691e1eb8df99b908e43bf471ee51a90180e6714ef8ba1924f58f34c1f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0403293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0403293.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6589506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6589506.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1965203.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1965203.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 10044⤵
- Program crash
PID:2372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7488046.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7488046.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 6963⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 7723⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 8123⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 8683⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9963⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 8723⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 12203⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 12523⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 13163⤵
- Program crash
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 6924⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7884⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 8964⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10604⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10724⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10724⤵
- Program crash
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 11284⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 8884⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 12884⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7444⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13004⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13084⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13004⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 11244⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 16204⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 15724⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 16644⤵
- Program crash
PID:4552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9523⤵
- Program crash
PID:624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4220 -ip 42201⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4232 -ip 42321⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4232 -ip 42321⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4232 -ip 42321⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4232 -ip 42321⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4232 -ip 42321⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4232 -ip 42321⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4232 -ip 42321⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4232 -ip 42321⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4232 -ip 42321⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4232 -ip 42321⤵PID:3772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 460 -ip 4601⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 460 -ip 4601⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 460 -ip 4601⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 460 -ip 4601⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 460 -ip 4601⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 460 -ip 4601⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 460 -ip 4601⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 460 -ip 4601⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 460 -ip 4601⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 460 -ip 4601⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 460 -ip 4601⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 460 -ip 4601⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 460 -ip 4601⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 460 -ip 4601⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 3202⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 376 -ip 3761⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 460 -ip 4601⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 460 -ip 4601⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 460 -ip 4601⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 3202⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4108 -ip 41081⤵PID:4284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
384KB
MD5fb7e9e66e4cb5820bdf2e200aea037ee
SHA12dbe556981627d5f72ade53b97e620eb6c9d6ff7
SHA25622c0f3604d43dcd9ea0707836105e89131c488e23ec729271011fe57ca599ce8
SHA512b2779cd318dbefe697e5dc8fc78430b1c9ca9c3d551ec162b2fa5e0ab8ac4d0c507bfd05e811ccf70c91889461ecb54a945551756a04e6421a5d359688210216
-
Filesize
384KB
MD5fb7e9e66e4cb5820bdf2e200aea037ee
SHA12dbe556981627d5f72ade53b97e620eb6c9d6ff7
SHA25622c0f3604d43dcd9ea0707836105e89131c488e23ec729271011fe57ca599ce8
SHA512b2779cd318dbefe697e5dc8fc78430b1c9ca9c3d551ec162b2fa5e0ab8ac4d0c507bfd05e811ccf70c91889461ecb54a945551756a04e6421a5d359688210216
-
Filesize
168KB
MD5a21438dbf06b12b3209ef10151beb51c
SHA11ad979964d637451d4f3dbdb921e63fc9cc90b6d
SHA2567dad23b0d0cf79b5198c41d4e4e4b0173ea4440953df8e64c7b4ee8152a17a3b
SHA51278bd18a37706481a54fb7869476e9e1bdcdd3f0da7f7e86ea6ee0d9733287480751e1705c7d023ea90c5e3f143790faac35773954757591a7fedf1578d7ab3d4
-
Filesize
168KB
MD5a21438dbf06b12b3209ef10151beb51c
SHA11ad979964d637451d4f3dbdb921e63fc9cc90b6d
SHA2567dad23b0d0cf79b5198c41d4e4e4b0173ea4440953df8e64c7b4ee8152a17a3b
SHA51278bd18a37706481a54fb7869476e9e1bdcdd3f0da7f7e86ea6ee0d9733287480751e1705c7d023ea90c5e3f143790faac35773954757591a7fedf1578d7ab3d4
-
Filesize
292KB
MD5bbe937125dd28b317584e714c500f4e4
SHA13e0ea36568d1f7291e5e7b9bf4c48019def1405d
SHA256099a72842cbafc8b8c2e4ce9f5e45be1ec1b8f52667bc5249671e1354d078e99
SHA512a981acd3354fc56386e5175141b91232e7ca903326b48682736b2c087f4808cb2443b696d9e1a62b28b07b2c47341d8f94a4de3f19ce07afeaeb36ed97338b19
-
Filesize
292KB
MD5bbe937125dd28b317584e714c500f4e4
SHA13e0ea36568d1f7291e5e7b9bf4c48019def1405d
SHA256099a72842cbafc8b8c2e4ce9f5e45be1ec1b8f52667bc5249671e1354d078e99
SHA512a981acd3354fc56386e5175141b91232e7ca903326b48682736b2c087f4808cb2443b696d9e1a62b28b07b2c47341d8f94a4de3f19ce07afeaeb36ed97338b19
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
271KB
MD5540852a87963a43979129a3a9e88fc14
SHA148b42daafa40c83a51d505a5951f21ef2585b8eb
SHA256ad73f656af6511b7d2ca457941ede5304dabb400639586952b1d45db77e6c4d0
SHA51281f060fce972c8eac96266f61a0a98db997594c82ce79e8206a0537e9009ccdfeca24dded2a4accb13e45502d1367b959aaa95aceccb03b4c9f8edd4ffcfdb57
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5