Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 22:41
Static task
static1
General
-
Target
efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe
-
Size
966KB
-
MD5
62bc166a9a092a8e771f75ee3f3f7cbd
-
SHA1
81f60af904fe06dfa117b6289f1b0735499b75a1
-
SHA256
efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675
-
SHA512
7c1b6638cd88ace7df7f6d8520e1c25d8b1ca846ba37f3434cca29d6d23821f4be7e911612e090ddf92c720a4a803c8f9cc2dbf5ee0b2d6a20499d986c88ead8
-
SSDEEP
24576:qy/Vh/R1BxI7q1eCaXjhGgVAC34APjABkXm6FG1HqrL2qszjoZMl:x/VJRrxI7DjV4C34APj26YKrVGjoZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr239631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr239631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr239631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr239631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr239631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr239631.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si773016.exe -
Executes dropped EXE 9 IoCs
pid Process 5032 un267096.exe 1488 un514792.exe 3704 pr239631.exe 1840 qu805426.exe 3492 rk868807.exe 2460 si773016.exe 1268 oneetx.exe 4728 oneetx.exe 636 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4868 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr239631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr239631.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un267096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un267096.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un514792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un514792.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 1096 3704 WerFault.exe 86 1560 1840 WerFault.exe 92 3420 2460 WerFault.exe 97 2736 2460 WerFault.exe 97 452 2460 WerFault.exe 97 1196 2460 WerFault.exe 97 1816 2460 WerFault.exe 97 4868 2460 WerFault.exe 97 3320 2460 WerFault.exe 97 2652 2460 WerFault.exe 97 1228 2460 WerFault.exe 97 372 2460 WerFault.exe 97 4716 1268 WerFault.exe 116 4640 1268 WerFault.exe 116 3760 1268 WerFault.exe 116 4536 1268 WerFault.exe 116 4692 1268 WerFault.exe 116 1764 1268 WerFault.exe 116 2784 1268 WerFault.exe 116 4368 1268 WerFault.exe 116 2720 1268 WerFault.exe 116 2712 1268 WerFault.exe 116 2088 1268 WerFault.exe 116 4708 1268 WerFault.exe 116 4940 1268 WerFault.exe 116 1396 4728 WerFault.exe 159 3724 1268 WerFault.exe 116 2120 1268 WerFault.exe 116 1904 1268 WerFault.exe 116 4824 636 WerFault.exe 169 1688 1268 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3704 pr239631.exe 3704 pr239631.exe 1840 qu805426.exe 1840 qu805426.exe 3492 rk868807.exe 3492 rk868807.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3704 pr239631.exe Token: SeDebugPrivilege 1840 qu805426.exe Token: SeDebugPrivilege 3492 rk868807.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 si773016.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3216 wrote to memory of 5032 3216 efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe 84 PID 3216 wrote to memory of 5032 3216 efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe 84 PID 3216 wrote to memory of 5032 3216 efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe 84 PID 5032 wrote to memory of 1488 5032 un267096.exe 85 PID 5032 wrote to memory of 1488 5032 un267096.exe 85 PID 5032 wrote to memory of 1488 5032 un267096.exe 85 PID 1488 wrote to memory of 3704 1488 un514792.exe 86 PID 1488 wrote to memory of 3704 1488 un514792.exe 86 PID 1488 wrote to memory of 3704 1488 un514792.exe 86 PID 1488 wrote to memory of 1840 1488 un514792.exe 92 PID 1488 wrote to memory of 1840 1488 un514792.exe 92 PID 1488 wrote to memory of 1840 1488 un514792.exe 92 PID 5032 wrote to memory of 3492 5032 un267096.exe 95 PID 5032 wrote to memory of 3492 5032 un267096.exe 95 PID 5032 wrote to memory of 3492 5032 un267096.exe 95 PID 3216 wrote to memory of 2460 3216 efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe 97 PID 3216 wrote to memory of 2460 3216 efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe 97 PID 3216 wrote to memory of 2460 3216 efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe 97 PID 2460 wrote to memory of 1268 2460 si773016.exe 116 PID 2460 wrote to memory of 1268 2460 si773016.exe 116 PID 2460 wrote to memory of 1268 2460 si773016.exe 116 PID 1268 wrote to memory of 4628 1268 oneetx.exe 136 PID 1268 wrote to memory of 4628 1268 oneetx.exe 136 PID 1268 wrote to memory of 4628 1268 oneetx.exe 136 PID 1268 wrote to memory of 3452 1268 oneetx.exe 142 PID 1268 wrote to memory of 3452 1268 oneetx.exe 142 PID 1268 wrote to memory of 3452 1268 oneetx.exe 142 PID 3452 wrote to memory of 1664 3452 cmd.exe 146 PID 3452 wrote to memory of 1664 3452 cmd.exe 146 PID 3452 wrote to memory of 1664 3452 cmd.exe 146 PID 3452 wrote to memory of 3080 3452 cmd.exe 147 PID 3452 wrote to memory of 3080 3452 cmd.exe 147 PID 3452 wrote to memory of 3080 3452 cmd.exe 147 PID 3452 wrote to memory of 1560 3452 cmd.exe 148 PID 3452 wrote to memory of 1560 3452 cmd.exe 148 PID 3452 wrote to memory of 1560 3452 cmd.exe 148 PID 3452 wrote to memory of 4816 3452 cmd.exe 150 PID 3452 wrote to memory of 4816 3452 cmd.exe 150 PID 3452 wrote to memory of 4816 3452 cmd.exe 150 PID 3452 wrote to memory of 3912 3452 cmd.exe 149 PID 3452 wrote to memory of 3912 3452 cmd.exe 149 PID 3452 wrote to memory of 3912 3452 cmd.exe 149 PID 3452 wrote to memory of 5072 3452 cmd.exe 151 PID 3452 wrote to memory of 5072 3452 cmd.exe 151 PID 3452 wrote to memory of 5072 3452 cmd.exe 151 PID 1268 wrote to memory of 4868 1268 oneetx.exe 166 PID 1268 wrote to memory of 4868 1268 oneetx.exe 166 PID 1268 wrote to memory of 4868 1268 oneetx.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe"C:\Users\Admin\AppData\Local\Temp\efeed982e0dc6341fedeb8bb9ea29013cf8136865404119ab248785d77059675.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un267096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un267096.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un514792.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un514792.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr239631.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr239631.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 10845⤵
- Program crash
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu805426.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu805426.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 13365⤵
- Program crash
PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk868807.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk868807.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773016.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 6963⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 7643⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 8563⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 9723⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 9643⤵
- Program crash
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 9643⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 12163⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 12483⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 12523⤵
- Program crash
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 6924⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 8844⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 9284⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 10524⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 10604⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 11084⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 10964⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 9924⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7764⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7564⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7604⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7524⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 9044⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 11164⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 16204⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 11164⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 16284⤵
- Program crash
PID:1688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 13563⤵
- Program crash
PID:372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3704 -ip 37041⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1840 -ip 18401⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2460 -ip 24601⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2460 -ip 24601⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2460 -ip 24601⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2460 -ip 24601⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2460 -ip 24601⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2460 -ip 24601⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2460 -ip 24601⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2460 -ip 24601⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2460 -ip 24601⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2460 -ip 24601⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1268 -ip 12681⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1268 -ip 12681⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1268 -ip 12681⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1268 -ip 12681⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1268 -ip 12681⤵PID:364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1268 -ip 12681⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 1268 -ip 12681⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 1268 -ip 12681⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 1268 -ip 12681⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 1268 -ip 12681⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 1268 -ip 12681⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 1268 -ip 12681⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 1268 -ip 12681⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 3122⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 4728 -ip 47281⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 1268 -ip 12681⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 1268 -ip 12681⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 1268 -ip 12681⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 3162⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 636 -ip 6361⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 1268 -ip 12681⤵PID:2592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
707KB
MD567f210c0174d5a676dc7fee3a040b91a
SHA1c35f17d3021090c6769ff7197a9e9a061c26c739
SHA2564cc31e1f7ac31f0c82322779c06646121ccf3ae289a8ea2f370f415af42858fe
SHA512a0a51fd1b058010b9321db3692517b8f69ff27cb2a9f3d52f68ae595b952ed96a5f262feaa990064fe0021ebbc309822aab6f5a2f2c8cb1c234025fb8aa49c12
-
Filesize
707KB
MD567f210c0174d5a676dc7fee3a040b91a
SHA1c35f17d3021090c6769ff7197a9e9a061c26c739
SHA2564cc31e1f7ac31f0c82322779c06646121ccf3ae289a8ea2f370f415af42858fe
SHA512a0a51fd1b058010b9321db3692517b8f69ff27cb2a9f3d52f68ae595b952ed96a5f262feaa990064fe0021ebbc309822aab6f5a2f2c8cb1c234025fb8aa49c12
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
553KB
MD5d27429fa98fe6d9abbb7e30f04960c48
SHA1630d4fc31232db58a66d33973b78df4a06c0897c
SHA256591d2905949c1cb24f02a1b6734fef2e43e9a08150f0a34e6d73e72e6f0c1f65
SHA5125fd0618307bc2bc7bf4542d8206d9339aa9ab2a1063de43f45365e2d591d0a885a18d2935afa5e5702508582a9fa8faae961eb102b13e4356c7c9c44001bd3d3
-
Filesize
553KB
MD5d27429fa98fe6d9abbb7e30f04960c48
SHA1630d4fc31232db58a66d33973b78df4a06c0897c
SHA256591d2905949c1cb24f02a1b6734fef2e43e9a08150f0a34e6d73e72e6f0c1f65
SHA5125fd0618307bc2bc7bf4542d8206d9339aa9ab2a1063de43f45365e2d591d0a885a18d2935afa5e5702508582a9fa8faae961eb102b13e4356c7c9c44001bd3d3
-
Filesize
278KB
MD54e1f70fa480371c2f40b80f955d71fd3
SHA18bdf1c9b54cfb7d653807a5e9f1788f25d315ad5
SHA2565491d0b4c398f46a6af97d68330fbb266bbd1b8d31f00b7dfbf5a12adbb4b919
SHA512ef7646ab895d43ed9d645cc2defc967168df657a77c584db543afc931723df9e6cdaf2d013b75a6d2deb66ba8b7b258e2b5fb97350c2dec785bac8166764b268
-
Filesize
278KB
MD54e1f70fa480371c2f40b80f955d71fd3
SHA18bdf1c9b54cfb7d653807a5e9f1788f25d315ad5
SHA2565491d0b4c398f46a6af97d68330fbb266bbd1b8d31f00b7dfbf5a12adbb4b919
SHA512ef7646ab895d43ed9d645cc2defc967168df657a77c584db543afc931723df9e6cdaf2d013b75a6d2deb66ba8b7b258e2b5fb97350c2dec785bac8166764b268
-
Filesize
360KB
MD5c67015e632a156452c0ffe1e7bb89d91
SHA184ffea4e9b2bdffb9ec1e82478cca9af0707db8c
SHA2563a768b809f936f19f8c905fbfbf11f506954bddb650c47a4da8dfb60960838ee
SHA5126d81a2fd058ea201494d1ea1e4011ad572aa411cfcbf3a1366cab59643dc77e07e7d80a3e39f4437ab73f4c6bbb2a700aed675bbb7b20ecc4e96fd716f1f6750
-
Filesize
360KB
MD5c67015e632a156452c0ffe1e7bb89d91
SHA184ffea4e9b2bdffb9ec1e82478cca9af0707db8c
SHA2563a768b809f936f19f8c905fbfbf11f506954bddb650c47a4da8dfb60960838ee
SHA5126d81a2fd058ea201494d1ea1e4011ad572aa411cfcbf3a1366cab59643dc77e07e7d80a3e39f4437ab73f4c6bbb2a700aed675bbb7b20ecc4e96fd716f1f6750
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
256KB
MD54e1d8d3f928b0a1e1aead4bd0afcd869
SHA121fb1b08dd52220b4d6cb21fbb7786641ca94b48
SHA256242fa82a8ec9dc760d82cdcfe4f8b04c78a0f2c6ebb369e3b39ecc44025c14e6
SHA512b17266363bc364e210cbc7f96ee2efdd2d240ee944af93d3eb597da9f85a23ddc12b2b65816f5f61c044e891444a556afdf968626f78b4236b1ab89200e547eb
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5