Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 14:03
Static task
static1
General
-
Target
cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe
-
Size
1.1MB
-
MD5
e8d3a0a91d1a74b78c7d372f500c3533
-
SHA1
2554be5b6ec707e04e531b094cb54ebfc7fa23fc
-
SHA256
cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523
-
SHA512
30eb1e44ea92e631cd427d837055ce06f2e0514f274ffa14b86b3bc0ba754195755adf34eba89b14e5fde464fb24fa3821ece2f2f592974b33d9843517573856
-
SSDEEP
24576:6yfNDmKbXlN2H9W4qR5YIwxxUrprjsGGxCg3WRnRMaTp0H:BVDmKD72HagxUJ5GxdGRnWN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr449324.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr449324.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr449324.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr449324.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr449324.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr449324.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si846044.exe -
Executes dropped EXE 6 IoCs
pid Process 684 un049933.exe 1300 un377168.exe 1148 pr449324.exe 3536 qu192329.exe 4920 rk706544.exe 4892 si846044.exe -
Loads dropped DLL 1 IoCs
pid Process 3376 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr449324.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr449324.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un049933.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un049933.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un377168.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un377168.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 32 IoCs
pid pid_target Process procid_target 3948 1148 WerFault.exe 84 2224 3536 WerFault.exe 91 1004 4892 WerFault.exe 96 2112 4892 WerFault.exe 96 2604 4892 WerFault.exe 96 4944 4892 WerFault.exe 96 2968 4892 WerFault.exe 96 5100 4892 WerFault.exe 96 4788 4892 WerFault.exe 96 1088 4892 WerFault.exe 96 660 4892 WerFault.exe 96 4896 4892 WerFault.exe 96 316 2380 WerFault.exe 116 3532 2380 WerFault.exe 116 3148 2380 WerFault.exe 116 4280 2380 WerFault.exe 116 4964 2380 WerFault.exe 116 3152 2380 WerFault.exe 116 4144 2380 WerFault.exe 116 4948 2380 WerFault.exe 116 2880 2380 WerFault.exe 116 1644 2380 WerFault.exe 116 4708 2380 WerFault.exe 116 2012 2380 WerFault.exe 116 4344 2380 WerFault.exe 116 1972 2380 WerFault.exe 116 452 2372 WerFault.exe 161 4600 2380 WerFault.exe 116 2280 2380 WerFault.exe 116 4340 2380 WerFault.exe 116 4332 1044 WerFault.exe 171 4596 2380 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1148 pr449324.exe 1148 pr449324.exe 3536 qu192329.exe 3536 qu192329.exe 4920 rk706544.exe 4920 rk706544.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1148 pr449324.exe Token: SeDebugPrivilege 3536 qu192329.exe Token: SeDebugPrivilege 4920 rk706544.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1836 wrote to memory of 684 1836 cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe 82 PID 1836 wrote to memory of 684 1836 cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe 82 PID 1836 wrote to memory of 684 1836 cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe 82 PID 684 wrote to memory of 1300 684 un049933.exe 83 PID 684 wrote to memory of 1300 684 un049933.exe 83 PID 684 wrote to memory of 1300 684 un049933.exe 83 PID 1300 wrote to memory of 1148 1300 un377168.exe 84 PID 1300 wrote to memory of 1148 1300 un377168.exe 84 PID 1300 wrote to memory of 1148 1300 un377168.exe 84 PID 1300 wrote to memory of 3536 1300 un377168.exe 91 PID 1300 wrote to memory of 3536 1300 un377168.exe 91 PID 1300 wrote to memory of 3536 1300 un377168.exe 91 PID 684 wrote to memory of 4920 684 un049933.exe 94 PID 684 wrote to memory of 4920 684 un049933.exe 94 PID 684 wrote to memory of 4920 684 un049933.exe 94 PID 1836 wrote to memory of 4892 1836 cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe 96 PID 1836 wrote to memory of 4892 1836 cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe 96 PID 1836 wrote to memory of 4892 1836 cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe 96 PID 2380 wrote to memory of 4632 2380 oneetx.exe 134 PID 2380 wrote to memory of 4632 2380 oneetx.exe 134 PID 2380 wrote to memory of 4632 2380 oneetx.exe 134 PID 2380 wrote to memory of 1212 2380 oneetx.exe 142 PID 2380 wrote to memory of 1212 2380 oneetx.exe 142 PID 2380 wrote to memory of 1212 2380 oneetx.exe 142 PID 1212 wrote to memory of 1712 1212 cmd.exe 146 PID 1212 wrote to memory of 1712 1212 cmd.exe 146 PID 1212 wrote to memory of 1712 1212 cmd.exe 146 PID 1212 wrote to memory of 1268 1212 cmd.exe 147 PID 1212 wrote to memory of 1268 1212 cmd.exe 147 PID 1212 wrote to memory of 1268 1212 cmd.exe 147 PID 1212 wrote to memory of 4888 1212 cmd.exe 148 PID 1212 wrote to memory of 4888 1212 cmd.exe 148 PID 1212 wrote to memory of 4888 1212 cmd.exe 148 PID 1212 wrote to memory of 4728 1212 cmd.exe 149 PID 1212 wrote to memory of 4728 1212 cmd.exe 149 PID 1212 wrote to memory of 4728 1212 cmd.exe 149 PID 1212 wrote to memory of 956 1212 cmd.exe 150 PID 1212 wrote to memory of 956 1212 cmd.exe 150 PID 1212 wrote to memory of 956 1212 cmd.exe 150 PID 1212 wrote to memory of 816 1212 cmd.exe 151 PID 1212 wrote to memory of 816 1212 cmd.exe 151 PID 1212 wrote to memory of 816 1212 cmd.exe 151 PID 2380 wrote to memory of 3376 2380 oneetx.exe 168 PID 2380 wrote to memory of 3376 2380 oneetx.exe 168 PID 2380 wrote to memory of 3376 2380 oneetx.exe 168
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe"C:\Users\Admin\AppData\Local\Temp\cb0ddd5775cff1c3a8cfd3912e5bc60e5c9a156cedb00a7f2132824e37599523.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un049933.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un049933.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un377168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un377168.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr449324.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr449324.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 10845⤵
- Program crash
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu192329.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu192329.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 19125⤵
- Program crash
PID:2224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk706544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk706544.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si846044.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si846044.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 6963⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 7803⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 8563⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 9523⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 8603⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 8603⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12163⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12603⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 13243⤵
- Program crash
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 6924⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 8364⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 9124⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10524⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10724⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10724⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 10964⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 9924⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 9244⤵
- Program crash
PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 13044⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 7644⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 7764⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 8364⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 14604⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 11044⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 16324⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 11044⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 16524⤵
- Program crash
PID:4596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 13643⤵
- Program crash
PID:4896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1148 -ip 11481⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3536 -ip 35361⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4892 -ip 48921⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4892 -ip 48921⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4892 -ip 48921⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4892 -ip 48921⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4892 -ip 48921⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4892 -ip 48921⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4892 -ip 48921⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4892 -ip 48921⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4892 -ip 48921⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4892 -ip 48921⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2380 -ip 23801⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2380 -ip 23801⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2380 -ip 23801⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2380 -ip 23801⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2380 -ip 23801⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2380 -ip 23801⤵PID:616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2380 -ip 23801⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2380 -ip 23801⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2380 -ip 23801⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2380 -ip 23801⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2380 -ip 23801⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2380 -ip 23801⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2380 -ip 23801⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2380 -ip 23801⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 3122⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2372 -ip 23721⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2380 -ip 23801⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2380 -ip 23801⤵PID:3756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2380 -ip 23801⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 3122⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1044 -ip 10441⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2380 -ip 23801⤵PID:2044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD53e530e673db591c189b1cd85031e348d
SHA143785739a819c9b94e6e24efbbe1203215e0dbb0
SHA2563800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501
SHA5125a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b
-
Filesize
764KB
MD54ab59f49c2fa568d06bba0c06bfbe0ae
SHA1e9efbcd59184111efa6ef70f5aa0e426060b8ac3
SHA2568a521d4f339375155acb6cb87f83ffb8666d77a469a9e07c073c39a622767041
SHA5129befd2cbb8a30654aab99c8884e79d3374ecc3a8788b242d76d96615f15a7ffa0c9eb93e76932cc8b12e2649c577755c07583141ffea381c737f5b4d046e8e29
-
Filesize
764KB
MD54ab59f49c2fa568d06bba0c06bfbe0ae
SHA1e9efbcd59184111efa6ef70f5aa0e426060b8ac3
SHA2568a521d4f339375155acb6cb87f83ffb8666d77a469a9e07c073c39a622767041
SHA5129befd2cbb8a30654aab99c8884e79d3374ecc3a8788b242d76d96615f15a7ffa0c9eb93e76932cc8b12e2649c577755c07583141ffea381c737f5b4d046e8e29
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
610KB
MD58ba79e06c3796d0625e0a68dc68cc9f4
SHA1727f77473dde60cbb1fb4d6b2dcc589f7b64f4be
SHA25654edf1552bbeb7b2aa8ba7dc63572db8dda28fb9d05344afd7ad33b1bdbdae7f
SHA512d8ce73c0526f829af52112b9cf57ef447188b3750f4cfaf66cf88496500f93a814f4a511afabeabdf78ea67b56f344c45e64615e89d5bc8002dd3896423b6822
-
Filesize
610KB
MD58ba79e06c3796d0625e0a68dc68cc9f4
SHA1727f77473dde60cbb1fb4d6b2dcc589f7b64f4be
SHA25654edf1552bbeb7b2aa8ba7dc63572db8dda28fb9d05344afd7ad33b1bdbdae7f
SHA512d8ce73c0526f829af52112b9cf57ef447188b3750f4cfaf66cf88496500f93a814f4a511afabeabdf78ea67b56f344c45e64615e89d5bc8002dd3896423b6822
-
Filesize
403KB
MD51362b992db8f3f5b0ae3ef8bd4e6b109
SHA18a750403630da9464ae7369d4d1d79671d9b97f9
SHA2560292c61a96888a1af70a75d8d666d7840863fb5b92e1d090e9b36addbc4eea60
SHA512c6072c6b74d1dee593b00555f7d9b1016b7798cc01c578386828c8c4579ede22d32f58f0584a2a165592445f1059924c1313dd808ae8e34c50ed453722fbac26
-
Filesize
403KB
MD51362b992db8f3f5b0ae3ef8bd4e6b109
SHA18a750403630da9464ae7369d4d1d79671d9b97f9
SHA2560292c61a96888a1af70a75d8d666d7840863fb5b92e1d090e9b36addbc4eea60
SHA512c6072c6b74d1dee593b00555f7d9b1016b7798cc01c578386828c8c4579ede22d32f58f0584a2a165592445f1059924c1313dd808ae8e34c50ed453722fbac26
-
Filesize
486KB
MD5a7d443249a3f113efbc438eb54fe7dcb
SHA19fe032a9176bb1c353efe7ad4d4f943fa1969aea
SHA2560ec5621de9a722aaaaede8538bd58eac256ee45528deb4d0723127df5124c409
SHA5120cd39ab700c0bb55d6f9daa50d2a28f25b2cdae188183084007713d6e73e4eb1c87ccd8a7dd1d86d108541bc7a01c7e5c9c819d06f46de389d42e779abd8599c
-
Filesize
486KB
MD5a7d443249a3f113efbc438eb54fe7dcb
SHA19fe032a9176bb1c353efe7ad4d4f943fa1969aea
SHA2560ec5621de9a722aaaaede8538bd58eac256ee45528deb4d0723127df5124c409
SHA5120cd39ab700c0bb55d6f9daa50d2a28f25b2cdae188183084007713d6e73e4eb1c87ccd8a7dd1d86d108541bc7a01c7e5c9c819d06f46de389d42e779abd8599c
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5