Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 16:58
Static task
static1
General
-
Target
f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe
-
Size
939KB
-
MD5
2b04a6943214ef9b5b62ed2d40cb464c
-
SHA1
81c9c4db66aa51a413ce8c3bda39ac568e9e3661
-
SHA256
f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9
-
SHA512
8992fee1dbea3df5e2d27c09887be5124db5d103114280a9640dc89077de2874674195db76e1ef30dc44fa46dcbe98c6186f5c4f77ad9844fdc165e86b2dcc3b
-
SSDEEP
24576:cy9cMvZQcZ1kIGmErJVIdOOmEN/pdv4GMj88:L9JBlmIGFf+hzNvgGMw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it805045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it805045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it805045.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it805045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it805045.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it805045.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr487361.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1324 ziHb2391.exe 972 ziVb2564.exe 1320 it805045.exe 1912 jr602802.exe 1952 kp046104.exe 376 lr487361.exe 3116 oneetx.exe 2576 oneetx.exe 4436 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4528 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it805045.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziVb2564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziVb2564.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHb2391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHb2391.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 2684 376 WerFault.exe 98 2688 376 WerFault.exe 98 2200 376 WerFault.exe 98 4568 376 WerFault.exe 98 1948 376 WerFault.exe 98 1332 376 WerFault.exe 98 1972 376 WerFault.exe 98 4528 376 WerFault.exe 98 4468 376 WerFault.exe 98 4364 376 WerFault.exe 98 5048 3116 WerFault.exe 118 2312 3116 WerFault.exe 118 2572 3116 WerFault.exe 118 3920 3116 WerFault.exe 118 2420 3116 WerFault.exe 118 448 3116 WerFault.exe 118 2612 3116 WerFault.exe 118 2796 3116 WerFault.exe 118 4692 3116 WerFault.exe 118 1912 3116 WerFault.exe 118 4240 3116 WerFault.exe 118 2252 3116 WerFault.exe 118 2936 3116 WerFault.exe 118 3740 3116 WerFault.exe 118 2452 2576 WerFault.exe 159 4184 3116 WerFault.exe 118 3808 3116 WerFault.exe 118 4288 3116 WerFault.exe 118 2776 4436 WerFault.exe 169 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1320 it805045.exe 1320 it805045.exe 1912 jr602802.exe 1912 jr602802.exe 1952 kp046104.exe 1952 kp046104.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1320 it805045.exe Token: SeDebugPrivilege 1912 jr602802.exe Token: SeDebugPrivilege 1952 kp046104.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 376 lr487361.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1324 3344 f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe 84 PID 3344 wrote to memory of 1324 3344 f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe 84 PID 3344 wrote to memory of 1324 3344 f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe 84 PID 1324 wrote to memory of 972 1324 ziHb2391.exe 85 PID 1324 wrote to memory of 972 1324 ziHb2391.exe 85 PID 1324 wrote to memory of 972 1324 ziHb2391.exe 85 PID 972 wrote to memory of 1320 972 ziVb2564.exe 86 PID 972 wrote to memory of 1320 972 ziVb2564.exe 86 PID 972 wrote to memory of 1912 972 ziVb2564.exe 93 PID 972 wrote to memory of 1912 972 ziVb2564.exe 93 PID 972 wrote to memory of 1912 972 ziVb2564.exe 93 PID 1324 wrote to memory of 1952 1324 ziHb2391.exe 97 PID 1324 wrote to memory of 1952 1324 ziHb2391.exe 97 PID 1324 wrote to memory of 1952 1324 ziHb2391.exe 97 PID 3344 wrote to memory of 376 3344 f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe 98 PID 3344 wrote to memory of 376 3344 f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe 98 PID 3344 wrote to memory of 376 3344 f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe 98 PID 376 wrote to memory of 3116 376 lr487361.exe 118 PID 376 wrote to memory of 3116 376 lr487361.exe 118 PID 376 wrote to memory of 3116 376 lr487361.exe 118 PID 3116 wrote to memory of 4516 3116 oneetx.exe 135 PID 3116 wrote to memory of 4516 3116 oneetx.exe 135 PID 3116 wrote to memory of 4516 3116 oneetx.exe 135 PID 3116 wrote to memory of 4368 3116 oneetx.exe 141 PID 3116 wrote to memory of 4368 3116 oneetx.exe 141 PID 3116 wrote to memory of 4368 3116 oneetx.exe 141 PID 4368 wrote to memory of 1468 4368 cmd.exe 145 PID 4368 wrote to memory of 1468 4368 cmd.exe 145 PID 4368 wrote to memory of 1468 4368 cmd.exe 145 PID 4368 wrote to memory of 3500 4368 cmd.exe 146 PID 4368 wrote to memory of 3500 4368 cmd.exe 146 PID 4368 wrote to memory of 3500 4368 cmd.exe 146 PID 4368 wrote to memory of 4424 4368 cmd.exe 147 PID 4368 wrote to memory of 4424 4368 cmd.exe 147 PID 4368 wrote to memory of 4424 4368 cmd.exe 147 PID 4368 wrote to memory of 960 4368 cmd.exe 149 PID 4368 wrote to memory of 960 4368 cmd.exe 149 PID 4368 wrote to memory of 960 4368 cmd.exe 149 PID 4368 wrote to memory of 1440 4368 cmd.exe 148 PID 4368 wrote to memory of 1440 4368 cmd.exe 148 PID 4368 wrote to memory of 1440 4368 cmd.exe 148 PID 4368 wrote to memory of 3572 4368 cmd.exe 150 PID 4368 wrote to memory of 3572 4368 cmd.exe 150 PID 4368 wrote to memory of 3572 4368 cmd.exe 150 PID 3116 wrote to memory of 4528 3116 oneetx.exe 164 PID 3116 wrote to memory of 4528 3116 oneetx.exe 164 PID 3116 wrote to memory of 4528 3116 oneetx.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe"C:\Users\Admin\AppData\Local\Temp\f203f275f3c202be797131723d9a6fcd0dbde8a61f8f80808c8cc96b4c21e2a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHb2391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHb2391.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziVb2564.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziVb2564.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it805045.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it805045.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr602802.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr602802.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp046104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp046104.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr487361.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr487361.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 6963⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 7803⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 7963⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 8003⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 9683⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 9523⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 12163⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 12163⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 13163⤵
- Program crash
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 6924⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 8644⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 8924⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 10524⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 10884⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 10884⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 11204⤵
- Program crash
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 9924⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 7804⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 12964⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 9004⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 7604⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 12484⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 11124⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 13524⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 15724⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 10764⤵
- Program crash
PID:4288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 13563⤵
- Program crash
PID:4364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 376 -ip 3761⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 376 -ip 3761⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 376 -ip 3761⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 376 -ip 3761⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 376 -ip 3761⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 376 -ip 3761⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 376 -ip 3761⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 376 -ip 3761⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 376 -ip 3761⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 376 -ip 3761⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3116 -ip 31161⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3116 -ip 31161⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3116 -ip 31161⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3116 -ip 31161⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3116 -ip 31161⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3116 -ip 31161⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3116 -ip 31161⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3116 -ip 31161⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3116 -ip 31161⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3116 -ip 31161⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 3116 -ip 31161⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3116 -ip 31161⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3116 -ip 31161⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3116 -ip 31161⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 3162⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2576 -ip 25761⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3116 -ip 31161⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3116 -ip 31161⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3116 -ip 31161⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 3122⤵
- Program crash
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4436 -ip 44361⤵PID:5008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
624KB
MD56ffb9b1027843429a3a4d7338984d9fa
SHA104129bebfadbd71630f2cacda943b99844712042
SHA256c643f72bc698e2018a0d0660ec6f5fd5a004fdfb71fffb0cc166c217116a803c
SHA51203a91cefa835d6ed7ad74ccf85ed5b8db0e615129b1621cc4e82c78b0e835d2e00e15515a9e1a215a57061ba256da144320c727a7549abc96425bd58f0b45545
-
Filesize
624KB
MD56ffb9b1027843429a3a4d7338984d9fa
SHA104129bebfadbd71630f2cacda943b99844712042
SHA256c643f72bc698e2018a0d0660ec6f5fd5a004fdfb71fffb0cc166c217116a803c
SHA51203a91cefa835d6ed7ad74ccf85ed5b8db0e615129b1621cc4e82c78b0e835d2e00e15515a9e1a215a57061ba256da144320c727a7549abc96425bd58f0b45545
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
470KB
MD5ff9d1bf0cb4d02ade5aec27da25fb61f
SHA157ba8cd1170f90c07160e05fab81e8d7c260e8b6
SHA256ee7ada3a1f04f9a4349bf54a3b17b89c464a2d642a5aebd176afb0c8f0860f68
SHA512e7f92938b35537ca4b6b29077395580a18fb338c58aacffa1732c5a535a82318938222ecfb7ad301c04002b44390edbe0fdc07a8baf03410e70df0b28b598abc
-
Filesize
470KB
MD5ff9d1bf0cb4d02ade5aec27da25fb61f
SHA157ba8cd1170f90c07160e05fab81e8d7c260e8b6
SHA256ee7ada3a1f04f9a4349bf54a3b17b89c464a2d642a5aebd176afb0c8f0860f68
SHA512e7f92938b35537ca4b6b29077395580a18fb338c58aacffa1732c5a535a82318938222ecfb7ad301c04002b44390edbe0fdc07a8baf03410e70df0b28b598abc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD522b14000f57a393ab91a7ba21713fe77
SHA13d709fb03ec8ccc41f2d3a7c5d2d5f7f166a6efb
SHA256af1a1b246ba5365ed3f74371f6214aa4b4f3c958a039ba6b37a5f04b56680fdc
SHA5129db05083e13107eb057461516f144b4cd8ade0b27103ca9dc51c46cd5b16ba4d4e39f0792e6e3e255eaeeeca9ca9fd397a6239eff068d2d434283fab87b99bb6
-
Filesize
486KB
MD522b14000f57a393ab91a7ba21713fe77
SHA13d709fb03ec8ccc41f2d3a7c5d2d5f7f166a6efb
SHA256af1a1b246ba5365ed3f74371f6214aa4b4f3c958a039ba6b37a5f04b56680fdc
SHA5129db05083e13107eb057461516f144b4cd8ade0b27103ca9dc51c46cd5b16ba4d4e39f0792e6e3e255eaeeeca9ca9fd397a6239eff068d2d434283fab87b99bb6
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
382KB
MD505f827f19259ec6cfa97bf5039451da7
SHA13623e1e80b525a335469784e311c3b6620da8269
SHA256ad50da96cb67488a5aa59c830e0f70df5621e698b52737367bd70e6107ea6283
SHA51231cbaa64ace7b1b791641bf8734c752d1800b50344e9ec96f9122b08c962b7484fae28b4ad96dcdbd933b1a891e643019470c8d0b74166d4e9275277e55602b5
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5