Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 21:23
Static task
static1
General
-
Target
1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe
-
Size
937KB
-
MD5
4c937e9f0c2dc5b26c92c17b79593f4e
-
SHA1
443028e7cca692cd1e158ee9669752c204f4bb63
-
SHA256
1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36
-
SHA512
7aff88bf06e8683a1a6f89743303a71b47d68de1766b59d099926cc017a2d17e6571f49ce20ce38c5f5bfc0eee977ac40615dc97ec87e751cdb367c761377f4f
-
SSDEEP
24576:hyjeVkkmMXIvkdDpXfbxLtB/dwOA3Za+y6:U6VkkDXIyXfbxJB/dxsZxy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it860853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it860853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it860853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it860853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it860853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it860853.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr838869.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 536 ziWR9343.exe 4632 ziPf7295.exe 2648 it860853.exe 2444 jr267477.exe 3952 kp111378.exe 4236 lr838869.exe 676 oneetx.exe 1136 oneetx.exe 1052 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1808 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it860853.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWR9343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWR9343.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPf7295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziPf7295.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 2888 2444 WerFault.exe 88 488 4236 WerFault.exe 92 4820 4236 WerFault.exe 92 3916 4236 WerFault.exe 92 4800 4236 WerFault.exe 92 4940 4236 WerFault.exe 92 3364 4236 WerFault.exe 92 2528 4236 WerFault.exe 92 1704 4236 WerFault.exe 92 952 4236 WerFault.exe 92 3688 4236 WerFault.exe 92 5028 676 WerFault.exe 112 3440 676 WerFault.exe 112 4316 676 WerFault.exe 112 4692 676 WerFault.exe 112 2256 676 WerFault.exe 112 2076 676 WerFault.exe 112 4644 676 WerFault.exe 112 4148 676 WerFault.exe 112 660 676 WerFault.exe 112 4532 676 WerFault.exe 112 1524 676 WerFault.exe 112 4056 676 WerFault.exe 112 1940 676 WerFault.exe 112 1864 1136 WerFault.exe 151 1600 676 WerFault.exe 112 1840 676 WerFault.exe 112 3928 676 WerFault.exe 112 2800 676 WerFault.exe 112 4964 1052 WerFault.exe 163 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2648 it860853.exe 2648 it860853.exe 2444 jr267477.exe 2444 jr267477.exe 3952 kp111378.exe 3952 kp111378.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2648 it860853.exe Token: SeDebugPrivilege 2444 jr267477.exe Token: SeDebugPrivilege 3952 kp111378.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4236 lr838869.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3076 wrote to memory of 536 3076 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe 83 PID 3076 wrote to memory of 536 3076 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe 83 PID 3076 wrote to memory of 536 3076 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe 83 PID 536 wrote to memory of 4632 536 ziWR9343.exe 84 PID 536 wrote to memory of 4632 536 ziWR9343.exe 84 PID 536 wrote to memory of 4632 536 ziWR9343.exe 84 PID 4632 wrote to memory of 2648 4632 ziPf7295.exe 85 PID 4632 wrote to memory of 2648 4632 ziPf7295.exe 85 PID 4632 wrote to memory of 2444 4632 ziPf7295.exe 88 PID 4632 wrote to memory of 2444 4632 ziPf7295.exe 88 PID 4632 wrote to memory of 2444 4632 ziPf7295.exe 88 PID 536 wrote to memory of 3952 536 ziWR9343.exe 91 PID 536 wrote to memory of 3952 536 ziWR9343.exe 91 PID 536 wrote to memory of 3952 536 ziWR9343.exe 91 PID 3076 wrote to memory of 4236 3076 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe 92 PID 3076 wrote to memory of 4236 3076 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe 92 PID 3076 wrote to memory of 4236 3076 1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe 92 PID 4236 wrote to memory of 676 4236 lr838869.exe 112 PID 4236 wrote to memory of 676 4236 lr838869.exe 112 PID 4236 wrote to memory of 676 4236 lr838869.exe 112 PID 676 wrote to memory of 3300 676 oneetx.exe 129 PID 676 wrote to memory of 3300 676 oneetx.exe 129 PID 676 wrote to memory of 3300 676 oneetx.exe 129 PID 676 wrote to memory of 1368 676 oneetx.exe 135 PID 676 wrote to memory of 1368 676 oneetx.exe 135 PID 676 wrote to memory of 1368 676 oneetx.exe 135 PID 1368 wrote to memory of 5084 1368 cmd.exe 138 PID 1368 wrote to memory of 5084 1368 cmd.exe 138 PID 1368 wrote to memory of 5084 1368 cmd.exe 138 PID 1368 wrote to memory of 832 1368 cmd.exe 140 PID 1368 wrote to memory of 832 1368 cmd.exe 140 PID 1368 wrote to memory of 832 1368 cmd.exe 140 PID 1368 wrote to memory of 464 1368 cmd.exe 141 PID 1368 wrote to memory of 464 1368 cmd.exe 141 PID 1368 wrote to memory of 464 1368 cmd.exe 141 PID 1368 wrote to memory of 1792 1368 cmd.exe 143 PID 1368 wrote to memory of 1792 1368 cmd.exe 143 PID 1368 wrote to memory of 1792 1368 cmd.exe 143 PID 1368 wrote to memory of 4380 1368 cmd.exe 142 PID 1368 wrote to memory of 4380 1368 cmd.exe 142 PID 1368 wrote to memory of 4380 1368 cmd.exe 142 PID 1368 wrote to memory of 1924 1368 cmd.exe 144 PID 1368 wrote to memory of 1924 1368 cmd.exe 144 PID 1368 wrote to memory of 1924 1368 cmd.exe 144 PID 676 wrote to memory of 1808 676 oneetx.exe 158 PID 676 wrote to memory of 1808 676 oneetx.exe 158 PID 676 wrote to memory of 1808 676 oneetx.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe"C:\Users\Admin\AppData\Local\Temp\1fea959d1482edc54e1794273a5f416d9c4847c12026e089ca85d1475e689c36.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWR9343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWR9343.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPf7295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPf7295.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it860853.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it860853.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267477.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267477.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 13405⤵
- Program crash
PID:2888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp111378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp111378.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838869.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 6963⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 7803⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 8123⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 9803⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 10003⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 9483⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 12163⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 12083⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 13203⤵
- Program crash
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 6924⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 8444⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 8604⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 10524⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 10964⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 10684⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 10764⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 9924⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 7604⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 7684⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 12524⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 12804⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 7724⤵
- Program crash
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 11364⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 16404⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 15604⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 16564⤵
- Program crash
PID:2800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 7643⤵
- Program crash
PID:3688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2444 -ip 24441⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4236 -ip 42361⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4236 -ip 42361⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4236 -ip 42361⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4236 -ip 42361⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4236 -ip 42361⤵PID:112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4236 -ip 42361⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4236 -ip 42361⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4236 -ip 42361⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4236 -ip 42361⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4236 -ip 42361⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 676 -ip 6761⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 676 -ip 6761⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 676 -ip 6761⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 676 -ip 6761⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 676 -ip 6761⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 676 -ip 6761⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 676 -ip 6761⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 676 -ip 6761⤵PID:764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 676 -ip 6761⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 676 -ip 6761⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 676 -ip 6761⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 676 -ip 6761⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 676 -ip 6761⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 3122⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1136 -ip 11361⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 676 -ip 6761⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 676 -ip 6761⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 676 -ip 6761⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 676 -ip 6761⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 3122⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1052 -ip 10521⤵PID:232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
623KB
MD59cef472d23b63b44f5bb02002ec7885c
SHA1b4fb1e270a9d1a52f53529848c81e8837617c9f5
SHA25652c62e31ea006f257eba6ed69fb4c7edbce12773c0664510fd0fd36408463b3f
SHA5123e02e45064283bcb2f981ec39fe9bf03c1faae7dde4fcc7549b01895efda2a0b4ae92c82535e037d696649b50e3998637cb76fd94abf4057b1887223272ecc12
-
Filesize
623KB
MD59cef472d23b63b44f5bb02002ec7885c
SHA1b4fb1e270a9d1a52f53529848c81e8837617c9f5
SHA25652c62e31ea006f257eba6ed69fb4c7edbce12773c0664510fd0fd36408463b3f
SHA5123e02e45064283bcb2f981ec39fe9bf03c1faae7dde4fcc7549b01895efda2a0b4ae92c82535e037d696649b50e3998637cb76fd94abf4057b1887223272ecc12
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
469KB
MD54bd2ca582ea0f239a473cfac2522caa9
SHA10d1cc6a648131b03f22e8e1af79c2152389312c2
SHA25611261be1afb930ec05272f3c35705a5fd4d8f8964b30db3985fecbd0d19d5aa8
SHA512dd287161744dd8a4ea013aac0bfd12acc4789d12fce2419b705ed26d8061cd114d49515e6662244173f635e4a31d6987282140390e6bf5d03745e8e071048f7c
-
Filesize
469KB
MD54bd2ca582ea0f239a473cfac2522caa9
SHA10d1cc6a648131b03f22e8e1af79c2152389312c2
SHA25611261be1afb930ec05272f3c35705a5fd4d8f8964b30db3985fecbd0d19d5aa8
SHA512dd287161744dd8a4ea013aac0bfd12acc4789d12fce2419b705ed26d8061cd114d49515e6662244173f635e4a31d6987282140390e6bf5d03745e8e071048f7c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
487KB
MD54752ba9aa38234087a56e279984ef40c
SHA135d14fc58b7c904660ebdb9e3ed0de325161fa05
SHA256ced8c9ff60ac45ddaa6c1380db54eb76ab35ca2ef7680f28e4ec09207db49e6e
SHA51253c7f4ce69d3f66fe0f4ee404f1bda9f659542a1a6908e38f90978fb92b513edab2549da602e1c7209329360ea13c8fe8c2c7572475125e7c65e4f6cc25f3dde
-
Filesize
487KB
MD54752ba9aa38234087a56e279984ef40c
SHA135d14fc58b7c904660ebdb9e3ed0de325161fa05
SHA256ced8c9ff60ac45ddaa6c1380db54eb76ab35ca2ef7680f28e4ec09207db49e6e
SHA51253c7f4ce69d3f66fe0f4ee404f1bda9f659542a1a6908e38f90978fb92b513edab2549da602e1c7209329360ea13c8fe8c2c7572475125e7c65e4f6cc25f3dde
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
383KB
MD52f48eceffa84683ff4b8ccdebef8faff
SHA1ea4bb2eda1e80107e9747fffbf241ae08ef51940
SHA25616aa08f548c2563ea6569e3c23213e34dea6ef04289e96d7ebb0178cb4614af7
SHA512e97983cb5af6a7c314de180a3a1e642a467406e476d6c60486e4764e1d7f3af6fa7c02fa04bfbd14cc89b4b976e1332e4a94c50a854bbab94f3a46b6e1e62696
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5