Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 18:26
Static task
static1
General
-
Target
ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe
-
Size
1.1MB
-
MD5
ee4c7c61731dbfc73f678eed5b114f18
-
SHA1
e3ca1b46f7606091eb86ea455668764bbe40938b
-
SHA256
ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5
-
SHA512
6738dc06c4590309ab0ed3dcf2898119259d01fa569f7420ccefd09378905f407dcafd4542a7fc03f3b2796f107c29602f8bcc62c756eee6f1ee5bbd25904e1a
-
SSDEEP
24576:2yzxFX+MPYBPNs7C6aEW5kB7hIrp7axuDBLSPvBDC:Fz6MPsNs7dalCphUU+BLYv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr064745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr064745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr064745.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr064745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr064745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr064745.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si104085.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4672 un513354.exe 4504 un178379.exe 548 pr064745.exe 2464 qu037304.exe 460 rk441228.exe 4924 si104085.exe 4980 oneetx.exe 4656 oneetx.exe 4536 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4256 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr064745.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr064745.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un178379.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un513354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un513354.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un178379.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 2020 4924 WerFault.exe 92 1436 4924 WerFault.exe 92 4404 4924 WerFault.exe 92 1240 4924 WerFault.exe 92 2748 4924 WerFault.exe 92 4880 4924 WerFault.exe 92 4248 4924 WerFault.exe 92 4272 4924 WerFault.exe 92 3332 4924 WerFault.exe 92 4492 4924 WerFault.exe 92 4376 4980 WerFault.exe 113 4328 4980 WerFault.exe 113 4624 4980 WerFault.exe 113 4312 4980 WerFault.exe 113 1696 4980 WerFault.exe 113 1544 4980 WerFault.exe 113 400 4980 WerFault.exe 113 2472 4980 WerFault.exe 113 2980 4980 WerFault.exe 113 3292 4980 WerFault.exe 113 1372 4980 WerFault.exe 113 2452 4980 WerFault.exe 113 548 4980 WerFault.exe 113 3836 4980 WerFault.exe 113 2900 4656 WerFault.exe 157 3712 4980 WerFault.exe 113 4148 4980 WerFault.exe 113 3444 4980 WerFault.exe 113 2852 4536 WerFault.exe 167 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 548 pr064745.exe 548 pr064745.exe 2464 qu037304.exe 2464 qu037304.exe 460 rk441228.exe 460 rk441228.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 548 pr064745.exe Token: SeDebugPrivilege 2464 qu037304.exe Token: SeDebugPrivilege 460 rk441228.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4924 si104085.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4672 4636 ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe 84 PID 4636 wrote to memory of 4672 4636 ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe 84 PID 4636 wrote to memory of 4672 4636 ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe 84 PID 4672 wrote to memory of 4504 4672 un513354.exe 85 PID 4672 wrote to memory of 4504 4672 un513354.exe 85 PID 4672 wrote to memory of 4504 4672 un513354.exe 85 PID 4504 wrote to memory of 548 4504 un178379.exe 86 PID 4504 wrote to memory of 548 4504 un178379.exe 86 PID 4504 wrote to memory of 548 4504 un178379.exe 86 PID 4504 wrote to memory of 2464 4504 un178379.exe 90 PID 4504 wrote to memory of 2464 4504 un178379.exe 90 PID 4504 wrote to memory of 2464 4504 un178379.exe 90 PID 4672 wrote to memory of 460 4672 un513354.exe 91 PID 4672 wrote to memory of 460 4672 un513354.exe 91 PID 4672 wrote to memory of 460 4672 un513354.exe 91 PID 4636 wrote to memory of 4924 4636 ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe 92 PID 4636 wrote to memory of 4924 4636 ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe 92 PID 4636 wrote to memory of 4924 4636 ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe 92 PID 4924 wrote to memory of 4980 4924 si104085.exe 113 PID 4924 wrote to memory of 4980 4924 si104085.exe 113 PID 4924 wrote to memory of 4980 4924 si104085.exe 113 PID 4980 wrote to memory of 2968 4980 oneetx.exe 130 PID 4980 wrote to memory of 2968 4980 oneetx.exe 130 PID 4980 wrote to memory of 2968 4980 oneetx.exe 130 PID 4980 wrote to memory of 3800 4980 oneetx.exe 136 PID 4980 wrote to memory of 3800 4980 oneetx.exe 136 PID 4980 wrote to memory of 3800 4980 oneetx.exe 136 PID 3800 wrote to memory of 232 3800 cmd.exe 140 PID 3800 wrote to memory of 232 3800 cmd.exe 140 PID 3800 wrote to memory of 232 3800 cmd.exe 140 PID 3800 wrote to memory of 408 3800 cmd.exe 141 PID 3800 wrote to memory of 408 3800 cmd.exe 141 PID 3800 wrote to memory of 408 3800 cmd.exe 141 PID 3800 wrote to memory of 2444 3800 cmd.exe 142 PID 3800 wrote to memory of 2444 3800 cmd.exe 142 PID 3800 wrote to memory of 2444 3800 cmd.exe 142 PID 3800 wrote to memory of 2304 3800 cmd.exe 143 PID 3800 wrote to memory of 2304 3800 cmd.exe 143 PID 3800 wrote to memory of 2304 3800 cmd.exe 143 PID 3800 wrote to memory of 4628 3800 cmd.exe 145 PID 3800 wrote to memory of 4628 3800 cmd.exe 145 PID 3800 wrote to memory of 4628 3800 cmd.exe 145 PID 3800 wrote to memory of 4432 3800 cmd.exe 146 PID 3800 wrote to memory of 4432 3800 cmd.exe 146 PID 3800 wrote to memory of 4432 3800 cmd.exe 146 PID 4980 wrote to memory of 4256 4980 oneetx.exe 162 PID 4980 wrote to memory of 4256 4980 oneetx.exe 162 PID 4980 wrote to memory of 4256 4980 oneetx.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe"C:\Users\Admin\AppData\Local\Temp\ca39f89251b271bb6ffdca38b81f7eca21b1a431f855e57ce1f19f447ad640b5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un513354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un513354.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un178379.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un178379.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr064745.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr064745.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu037304.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu037304.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk441228.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk441228.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104085.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104085.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 6963⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7723⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8003⤵
- Program crash
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9723⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9403⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9843⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 12123⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 12123⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 13203⤵
- Program crash
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 6924⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 8364⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 8324⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10524⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10884⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10804⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10924⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10004⤵
- Program crash
PID:2472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 7764⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 9044⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 12924⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 12764⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 7444⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 11084⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 10884⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 16124⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 16764⤵
- Program crash
PID:3444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 14323⤵
- Program crash
PID:4492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4924 -ip 49241⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4924 -ip 49241⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4924 -ip 49241⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4924 -ip 49241⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4924 -ip 49241⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4924 -ip 49241⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4924 -ip 49241⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4924 -ip 49241⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4924 -ip 49241⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4924 -ip 49241⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4980 -ip 49801⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4980 -ip 49801⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4980 -ip 49801⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4980 -ip 49801⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4980 -ip 49801⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4980 -ip 49801⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4980 -ip 49801⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4980 -ip 49801⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4980 -ip 49801⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4980 -ip 49801⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4980 -ip 49801⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4980 -ip 49801⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4980 -ip 49801⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4980 -ip 49801⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 3162⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4656 -ip 46561⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4980 -ip 49801⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4980 -ip 49801⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4980 -ip 49801⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 3122⤵
- Program crash
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4536 -ip 45361⤵PID:796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
764KB
MD59ee518e5b4ae55b23d5aa23112610dfa
SHA16fe90e9a96ab12961ceefd42405a801f40e69ccb
SHA2569adafade7597e4cc72c02f3cc891f7b6ccbdd96f637053a7693488dd982713ac
SHA5129daa98927386a526706fd0ca6ae33b4465c1ca05ddc78c55df1c9248b98192d522211ea850b0d0426dd25fafefac30a110e86cf6590fe17e40b78ba0520178aa
-
Filesize
764KB
MD59ee518e5b4ae55b23d5aa23112610dfa
SHA16fe90e9a96ab12961ceefd42405a801f40e69ccb
SHA2569adafade7597e4cc72c02f3cc891f7b6ccbdd96f637053a7693488dd982713ac
SHA5129daa98927386a526706fd0ca6ae33b4465c1ca05ddc78c55df1c9248b98192d522211ea850b0d0426dd25fafefac30a110e86cf6590fe17e40b78ba0520178aa
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
609KB
MD5d61b12d9ba11b3af186aff38669f3c86
SHA1b82eb8b0bb827f87ffde1e2017bba9fdd3c57be9
SHA256a978ffc974867022de67527d2034dae326e28e04b3fd2cec629b0d9e03922063
SHA51289c093fd6d8e095bcf26c6950fe36671e8bf082c458bbbd59b4e3f62d51221df94455316fe7ebfcc93782ae744af4a95aa287be668a603d7bbd78211005d9054
-
Filesize
609KB
MD5d61b12d9ba11b3af186aff38669f3c86
SHA1b82eb8b0bb827f87ffde1e2017bba9fdd3c57be9
SHA256a978ffc974867022de67527d2034dae326e28e04b3fd2cec629b0d9e03922063
SHA51289c093fd6d8e095bcf26c6950fe36671e8bf082c458bbbd59b4e3f62d51221df94455316fe7ebfcc93782ae744af4a95aa287be668a603d7bbd78211005d9054
-
Filesize
402KB
MD5de57ed60cedb616f20db8a8666aecd30
SHA16d265caad1353d023f2f314c3dcd759449e90235
SHA256afebd9eb18d202985918a79348e1e4f549a6bd9effabc7ac1d8082a6081b9632
SHA5125689e75b68e22dbd8858d0473749eb8c414bdf4b32dec6fccafbc57505f7674685a55d546b7f52887d1f2b467eb6e62b23b18fd913333fd38c5181fe99bb349c
-
Filesize
402KB
MD5de57ed60cedb616f20db8a8666aecd30
SHA16d265caad1353d023f2f314c3dcd759449e90235
SHA256afebd9eb18d202985918a79348e1e4f549a6bd9effabc7ac1d8082a6081b9632
SHA5125689e75b68e22dbd8858d0473749eb8c414bdf4b32dec6fccafbc57505f7674685a55d546b7f52887d1f2b467eb6e62b23b18fd913333fd38c5181fe99bb349c
-
Filesize
485KB
MD5c3676fda1d19df4cf94e5306e1746b24
SHA1a87cd3ee35de4dfb36838dd6637de0eb5a6e0a9d
SHA256070d9c70503d99b89b11658cce05b8f693f771e16696d46a6effb73c3a5a253c
SHA51267c5919e7ed94582552bdf0c9dfd0879235bacc17c311fa4557c1ecfe09b22408c99c9629ace76914c07c86b61ef18927eb6379f65c4e7bd09a730c092c8dd0c
-
Filesize
485KB
MD5c3676fda1d19df4cf94e5306e1746b24
SHA1a87cd3ee35de4dfb36838dd6637de0eb5a6e0a9d
SHA256070d9c70503d99b89b11658cce05b8f693f771e16696d46a6effb73c3a5a253c
SHA51267c5919e7ed94582552bdf0c9dfd0879235bacc17c311fa4557c1ecfe09b22408c99c9629ace76914c07c86b61ef18927eb6379f65c4e7bd09a730c092c8dd0c
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
382KB
MD568fef23b69b71a8eea7e7fdc11d859ec
SHA103c5d3ce3c6a7c87d490deaac0cef3229430b818
SHA256efccc1f4d10fc8260295ab2593396cdd1ddaf3a90254d94107e4fe8c90c6f2c6
SHA51246196397db247e461a7fe7e61a97f0c5c18d38bc473e5ee68208a08286e0fcd934a147537a80e4602b793d5c5c9d3424b73b5e45202ec7c0d682798bf9584893
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5