Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe
Resource
win10v2004-20230220-en
General
-
Target
f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe
-
Size
643KB
-
MD5
e66e24fbf6a3b19e7a54c7df2575afd4
-
SHA1
44413ba5c768a582a67178eef648deed4cf3b60b
-
SHA256
f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c
-
SHA512
67a0966e0ddef809ccab5e4a8941ed9a9607bcfc93b2c7cea82f5a6b0843aae13e346412edb0a353c867e689b3662cec3321c6613d8c0ef185435c63d0f68a6e
-
SSDEEP
12288:7MrCy90KsVK0tx3SNThtq3TO5XAn/Sl9j/qq601peHugkor9TxaIu:tyRsU0P+WTfal9rqi1pUuloeIu
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3680-148-0x0000000005260000-0x0000000005878000-memory.dmp redline_stealer behavioral2/memory/3680-156-0x0000000005150000-0x00000000051B6000-memory.dmp redline_stealer behavioral2/memory/3680-158-0x00000000067D0000-0x0000000006992000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h3699948.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h3699948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h3699948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h3699948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h3699948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h3699948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i4454047.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2056 x7606645.exe 3680 g9134888.exe 1072 h3699948.exe 2416 i4454047.exe 2100 oneetx.exe 1148 oneetx.exe 4036 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1316 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h3699948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h3699948.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7606645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7606645.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4576 1072 WerFault.exe 85 3928 2416 WerFault.exe 89 3232 2416 WerFault.exe 89 4564 2416 WerFault.exe 89 2596 2416 WerFault.exe 89 2868 2416 WerFault.exe 89 3728 2416 WerFault.exe 89 3424 2416 WerFault.exe 89 716 2416 WerFault.exe 89 3404 2416 WerFault.exe 89 916 2416 WerFault.exe 89 592 2100 WerFault.exe 108 4136 2100 WerFault.exe 108 3248 2100 WerFault.exe 108 4332 2100 WerFault.exe 108 1236 2100 WerFault.exe 108 4500 2100 WerFault.exe 108 3760 2100 WerFault.exe 108 428 2100 WerFault.exe 108 2324 2100 WerFault.exe 108 4552 1148 WerFault.exe 131 4840 2100 WerFault.exe 108 4176 2100 WerFault.exe 108 5016 2100 WerFault.exe 108 2784 2100 WerFault.exe 108 4268 2100 WerFault.exe 108 4976 2100 WerFault.exe 108 1740 4036 WerFault.exe 154 4864 2100 WerFault.exe 108 3728 2100 WerFault.exe 108 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3680 g9134888.exe 3680 g9134888.exe 1072 h3699948.exe 1072 h3699948.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3680 g9134888.exe Token: SeDebugPrivilege 1072 h3699948.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 i4454047.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2056 4032 f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe 83 PID 4032 wrote to memory of 2056 4032 f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe 83 PID 4032 wrote to memory of 2056 4032 f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe 83 PID 2056 wrote to memory of 3680 2056 x7606645.exe 84 PID 2056 wrote to memory of 3680 2056 x7606645.exe 84 PID 2056 wrote to memory of 3680 2056 x7606645.exe 84 PID 2056 wrote to memory of 1072 2056 x7606645.exe 85 PID 2056 wrote to memory of 1072 2056 x7606645.exe 85 PID 2056 wrote to memory of 1072 2056 x7606645.exe 85 PID 4032 wrote to memory of 2416 4032 f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe 89 PID 4032 wrote to memory of 2416 4032 f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe 89 PID 4032 wrote to memory of 2416 4032 f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe 89 PID 2416 wrote to memory of 2100 2416 i4454047.exe 108 PID 2416 wrote to memory of 2100 2416 i4454047.exe 108 PID 2416 wrote to memory of 2100 2416 i4454047.exe 108 PID 2100 wrote to memory of 1376 2100 oneetx.exe 127 PID 2100 wrote to memory of 1376 2100 oneetx.exe 127 PID 2100 wrote to memory of 1376 2100 oneetx.exe 127 PID 2100 wrote to memory of 4536 2100 oneetx.exe 136 PID 2100 wrote to memory of 4536 2100 oneetx.exe 136 PID 2100 wrote to memory of 4536 2100 oneetx.exe 136 PID 4536 wrote to memory of 752 4536 cmd.exe 140 PID 4536 wrote to memory of 752 4536 cmd.exe 140 PID 4536 wrote to memory of 752 4536 cmd.exe 140 PID 4536 wrote to memory of 4524 4536 cmd.exe 141 PID 4536 wrote to memory of 4524 4536 cmd.exe 141 PID 4536 wrote to memory of 4524 4536 cmd.exe 141 PID 4536 wrote to memory of 1068 4536 cmd.exe 142 PID 4536 wrote to memory of 1068 4536 cmd.exe 142 PID 4536 wrote to memory of 1068 4536 cmd.exe 142 PID 4536 wrote to memory of 2688 4536 cmd.exe 143 PID 4536 wrote to memory of 2688 4536 cmd.exe 143 PID 4536 wrote to memory of 2688 4536 cmd.exe 143 PID 4536 wrote to memory of 2556 4536 cmd.exe 144 PID 4536 wrote to memory of 2556 4536 cmd.exe 144 PID 4536 wrote to memory of 2556 4536 cmd.exe 144 PID 4536 wrote to memory of 1672 4536 cmd.exe 145 PID 4536 wrote to memory of 1672 4536 cmd.exe 145 PID 4536 wrote to memory of 1672 4536 cmd.exe 145 PID 2100 wrote to memory of 1316 2100 oneetx.exe 159 PID 2100 wrote to memory of 1316 2100 oneetx.exe 159 PID 2100 wrote to memory of 1316 2100 oneetx.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe"C:\Users\Admin\AppData\Local\Temp\f2591dc3f916aed9224694422f3038809efa12dfeb9dc27d6f519540efc2c61c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7606645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7606645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9134888.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9134888.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3699948.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3699948.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 10644⤵
- Program crash
PID:4576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4454047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4454047.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 6963⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 7803⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 8603⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 9523⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 9923⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 9883⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 12163⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 12563⤵
- Program crash
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 13123⤵
- Program crash
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 6924⤵
- Program crash
PID:592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 8364⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 9124⤵
- Program crash
PID:3248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 9084⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 10524⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 10724⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 10724⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 11084⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 9924⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 7764⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 7804⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 12684⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 13004⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 13124⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 11244⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 15684⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 15844⤵
- Program crash
PID:3728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 8043⤵
- Program crash
PID:916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1072 -ip 10721⤵PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2416 -ip 24161⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2416 -ip 24161⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2416 -ip 24161⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2416 -ip 24161⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2416 -ip 24161⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2416 -ip 24161⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2416 -ip 24161⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2416 -ip 24161⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2416 -ip 24161⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2416 -ip 24161⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2100 -ip 21001⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2100 -ip 21001⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2100 -ip 21001⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2100 -ip 21001⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2100 -ip 21001⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2100 -ip 21001⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2100 -ip 21001⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2100 -ip 21001⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2100 -ip 21001⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 3122⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1148 -ip 11481⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2100 -ip 21001⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2100 -ip 21001⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2100 -ip 21001⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2100 -ip 21001⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2100 -ip 21001⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2100 -ip 21001⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 3202⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4036 -ip 40361⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2100 -ip 21001⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2100 -ip 21001⤵PID:3332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
383KB
MD5aa3595548933dc929e8e4b45f9f90692
SHA1ee37e157379a1193088e1f1cc4a62afb3d61164b
SHA2561ca63c2b3705844cee7d189d0b21b4a3e27ee3e8d70459e7118588a2d48d9acd
SHA512928b9789e384cd36efab9c74508383a8afa788314c393237ed041088abc239614d77d0d6cd7c8e298f2cce03552995f591bfa5e362a38ccf5c5fa5ea7602252a
-
Filesize
383KB
MD5aa3595548933dc929e8e4b45f9f90692
SHA1ee37e157379a1193088e1f1cc4a62afb3d61164b
SHA2561ca63c2b3705844cee7d189d0b21b4a3e27ee3e8d70459e7118588a2d48d9acd
SHA512928b9789e384cd36efab9c74508383a8afa788314c393237ed041088abc239614d77d0d6cd7c8e298f2cce03552995f591bfa5e362a38ccf5c5fa5ea7602252a
-
Filesize
168KB
MD50531fbd740269310cab0874cbee5f7b9
SHA1c5ff300caa98cf84ca100ac8e0ae1bbb9a27b114
SHA256d15bd44b2510401b16805e48f40eca63964ca8c704c935a7bf56ba00c385cd4d
SHA512f77d756e0821ef98150b79a7f68592e033867b7dd3b320f807043cf3a66d2d289d4137119d95edea0d81ba9515ce76f495d5bc297f35683bd8e08a67b3b3bd80
-
Filesize
168KB
MD50531fbd740269310cab0874cbee5f7b9
SHA1c5ff300caa98cf84ca100ac8e0ae1bbb9a27b114
SHA256d15bd44b2510401b16805e48f40eca63964ca8c704c935a7bf56ba00c385cd4d
SHA512f77d756e0821ef98150b79a7f68592e033867b7dd3b320f807043cf3a66d2d289d4137119d95edea0d81ba9515ce76f495d5bc297f35683bd8e08a67b3b3bd80
-
Filesize
292KB
MD5f45fc146c6dd27a1f07521b9d26c2a19
SHA1c22fa02ec01f2d3da413bf0b825d5c2af782a88f
SHA256b0005f2c6ceebeabf82f14961dd710c24190a523d963c8677872320c6637c170
SHA512db5f6bbb326e853b8e1b6e5f7708bcc840cf1c0a4c8bd2b9aa6ceb8998a2a736fa1ba700a8c6832184a7cc8ee9d401e43e5aa35ffc8392b90a0214d0f2aa82e9
-
Filesize
292KB
MD5f45fc146c6dd27a1f07521b9d26c2a19
SHA1c22fa02ec01f2d3da413bf0b825d5c2af782a88f
SHA256b0005f2c6ceebeabf82f14961dd710c24190a523d963c8677872320c6637c170
SHA512db5f6bbb326e853b8e1b6e5f7708bcc840cf1c0a4c8bd2b9aa6ceb8998a2a736fa1ba700a8c6832184a7cc8ee9d401e43e5aa35ffc8392b90a0214d0f2aa82e9
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
271KB
MD5b37be2d59f8fc09da0f8c14861c3d8f4
SHA1f6e59a7e2fc1d6890c32c82a5ffa0b586d220c2f
SHA25644112bdc38695fad34804adf5d823684ba1198509a9769fd3f75bb0389ae5800
SHA512ff0016d16322294f9ecab2010d0567a0a6fe3f0ca9ab7751684fb3e3d9e902d3e57a87fbb0ae8c38a15211f4f9935eac624c5fd7764ba6e09524077320bad3f0
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5