Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 01:13
Static task
static1
General
-
Target
5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe
-
Size
940KB
-
MD5
31b83b7a23cb3be1066c1558ac9aa78c
-
SHA1
ee1528be4b5e9e4717bff5ad9a04ba9b6180ff7f
-
SHA256
5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b
-
SHA512
62a43ffb23b31140087ebdbe2b424003472e3e4c62140ce3ec6966bb45f579f94750d71efc8fc1f4c762339bcba1dcbee71c58717ad6f5b7a25c9ec51358efba
-
SSDEEP
12288:Ey90tgIjkfpjY1Tle4yN09nOQXMeEIJTg75SuFSFRbLBhgrjcvCF4CrULnT:Ey2CKjiWOQce9Bgo4CpLUGGlET
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it506255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it506255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it506255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it506255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it506255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it506255.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lr742851.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2752 ziWx7220.exe 2096 ziTL0734.exe 4792 it506255.exe 216 jr181629.exe 4560 kp995838.exe 3848 lr742851.exe 1276 oneetx.exe 2028 oneetx.exe 3720 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1448 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it506255.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWx7220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWx7220.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTL0734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziTL0734.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 2584 216 WerFault.exe 91 4888 3848 WerFault.exe 98 1296 3848 WerFault.exe 98 3096 3848 WerFault.exe 98 4960 3848 WerFault.exe 98 1332 3848 WerFault.exe 98 1748 3848 WerFault.exe 98 5016 3848 WerFault.exe 98 2976 3848 WerFault.exe 98 3764 3848 WerFault.exe 98 4268 3848 WerFault.exe 98 3936 1276 WerFault.exe 118 224 1276 WerFault.exe 118 4368 1276 WerFault.exe 118 3364 1276 WerFault.exe 118 748 1276 WerFault.exe 118 4852 1276 WerFault.exe 118 4376 1276 WerFault.exe 118 3536 1276 WerFault.exe 118 4632 1276 WerFault.exe 118 3892 1276 WerFault.exe 118 3968 1276 WerFault.exe 118 4484 1276 WerFault.exe 118 2468 1276 WerFault.exe 118 4888 1276 WerFault.exe 118 1348 2028 WerFault.exe 159 1756 1276 WerFault.exe 118 2388 1276 WerFault.exe 118 2216 1276 WerFault.exe 118 4112 3720 WerFault.exe 169 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4792 it506255.exe 4792 it506255.exe 216 jr181629.exe 216 jr181629.exe 4560 kp995838.exe 4560 kp995838.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4792 it506255.exe Token: SeDebugPrivilege 216 jr181629.exe Token: SeDebugPrivilege 4560 kp995838.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3848 lr742851.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 5096 wrote to memory of 2752 5096 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe 84 PID 5096 wrote to memory of 2752 5096 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe 84 PID 5096 wrote to memory of 2752 5096 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe 84 PID 2752 wrote to memory of 2096 2752 ziWx7220.exe 85 PID 2752 wrote to memory of 2096 2752 ziWx7220.exe 85 PID 2752 wrote to memory of 2096 2752 ziWx7220.exe 85 PID 2096 wrote to memory of 4792 2096 ziTL0734.exe 86 PID 2096 wrote to memory of 4792 2096 ziTL0734.exe 86 PID 2096 wrote to memory of 216 2096 ziTL0734.exe 91 PID 2096 wrote to memory of 216 2096 ziTL0734.exe 91 PID 2096 wrote to memory of 216 2096 ziTL0734.exe 91 PID 2752 wrote to memory of 4560 2752 ziWx7220.exe 97 PID 2752 wrote to memory of 4560 2752 ziWx7220.exe 97 PID 2752 wrote to memory of 4560 2752 ziWx7220.exe 97 PID 5096 wrote to memory of 3848 5096 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe 98 PID 5096 wrote to memory of 3848 5096 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe 98 PID 5096 wrote to memory of 3848 5096 5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe 98 PID 3848 wrote to memory of 1276 3848 lr742851.exe 118 PID 3848 wrote to memory of 1276 3848 lr742851.exe 118 PID 3848 wrote to memory of 1276 3848 lr742851.exe 118 PID 1276 wrote to memory of 400 1276 oneetx.exe 135 PID 1276 wrote to memory of 400 1276 oneetx.exe 135 PID 1276 wrote to memory of 400 1276 oneetx.exe 135 PID 1276 wrote to memory of 2060 1276 oneetx.exe 141 PID 1276 wrote to memory of 2060 1276 oneetx.exe 141 PID 1276 wrote to memory of 2060 1276 oneetx.exe 141 PID 2060 wrote to memory of 3976 2060 cmd.exe 146 PID 2060 wrote to memory of 3976 2060 cmd.exe 146 PID 2060 wrote to memory of 3976 2060 cmd.exe 146 PID 2060 wrote to memory of 1112 2060 cmd.exe 145 PID 2060 wrote to memory of 1112 2060 cmd.exe 145 PID 2060 wrote to memory of 1112 2060 cmd.exe 145 PID 2060 wrote to memory of 4892 2060 cmd.exe 147 PID 2060 wrote to memory of 4892 2060 cmd.exe 147 PID 2060 wrote to memory of 4892 2060 cmd.exe 147 PID 2060 wrote to memory of 4452 2060 cmd.exe 149 PID 2060 wrote to memory of 4452 2060 cmd.exe 149 PID 2060 wrote to memory of 4452 2060 cmd.exe 149 PID 2060 wrote to memory of 4548 2060 cmd.exe 148 PID 2060 wrote to memory of 4548 2060 cmd.exe 148 PID 2060 wrote to memory of 4548 2060 cmd.exe 148 PID 2060 wrote to memory of 5100 2060 cmd.exe 150 PID 2060 wrote to memory of 5100 2060 cmd.exe 150 PID 2060 wrote to memory of 5100 2060 cmd.exe 150 PID 1276 wrote to memory of 1448 1276 oneetx.exe 164 PID 1276 wrote to memory of 1448 1276 oneetx.exe 164 PID 1276 wrote to memory of 1448 1276 oneetx.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe"C:\Users\Admin\AppData\Local\Temp\5666ef667ec526f219cd20419462a64ab6c793a76226f17b7c1526b5a14a247b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWx7220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWx7220.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTL0734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTL0734.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it506255.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it506255.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr181629.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr181629.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 15885⤵
- Program crash
PID:2584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp995838.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp995838.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742851.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 6963⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 7723⤵
- Program crash
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 8003⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 9763⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 9683⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 9683⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 12163⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 12323⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 13243⤵
- Program crash
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 6924⤵
- Program crash
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 8844⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 8924⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 10964⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 9364⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 9364⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 11324⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 10204⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 7564⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 7604⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 7284⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 12764⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 9124⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 11004⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 16244⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 15604⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 13524⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 8083⤵
- Program crash
PID:4268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 216 -ip 2161⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3848 -ip 38481⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3848 -ip 38481⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3848 -ip 38481⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3848 -ip 38481⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3848 -ip 38481⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3848 -ip 38481⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3848 -ip 38481⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3848 -ip 38481⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3848 -ip 38481⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3848 -ip 38481⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1276 -ip 12761⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1276 -ip 12761⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1276 -ip 12761⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1276 -ip 12761⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1276 -ip 12761⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1276 -ip 12761⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1276 -ip 12761⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1276 -ip 12761⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1276 -ip 12761⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1276 -ip 12761⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1276 -ip 12761⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1276 -ip 12761⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1276 -ip 12761⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1276 -ip 12761⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 3162⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2028 -ip 20281⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1276 -ip 12761⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1276 -ip 12761⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1276 -ip 12761⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 3242⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3720 -ip 37201⤵PID:3764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
625KB
MD54b5a921d979b9c20924814013a35aba0
SHA1ba5f86a1405fee50f1c7d9def88bbf6e43058565
SHA25648ef366b6d786d947c2a48fcae0e7f393ede32ccc1109a17f5bdcb2a0de55233
SHA512b9c251be55f5a621c8931c62a8a0977c30a1c49dc3f140f403f13a4091b6dbbed967cdf76678279010507da025a296e5db5a4e1c7fd9d7d8548310700878035a
-
Filesize
625KB
MD54b5a921d979b9c20924814013a35aba0
SHA1ba5f86a1405fee50f1c7d9def88bbf6e43058565
SHA25648ef366b6d786d947c2a48fcae0e7f393ede32ccc1109a17f5bdcb2a0de55233
SHA512b9c251be55f5a621c8931c62a8a0977c30a1c49dc3f140f403f13a4091b6dbbed967cdf76678279010507da025a296e5db5a4e1c7fd9d7d8548310700878035a
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
471KB
MD57e69b0a14f731b3f493c83e8183f0bb6
SHA14cbe1082b2d84da013beff1c13c4afa6179b37c0
SHA2567bcfd84aca11e0adf8a8345a3e34e23e401ddd5b5674a3369a1b5242d5cfed62
SHA512f456eebdbde46773f8e1d2815dca4d7b12316dfe0e58a1d2461c8b278340ecc0a3c2b3659a3bb1ff0a10b3e9efe5fbac694eb9c8900a86b1e4eec6d0d46651f8
-
Filesize
471KB
MD57e69b0a14f731b3f493c83e8183f0bb6
SHA14cbe1082b2d84da013beff1c13c4afa6179b37c0
SHA2567bcfd84aca11e0adf8a8345a3e34e23e401ddd5b5674a3369a1b5242d5cfed62
SHA512f456eebdbde46773f8e1d2815dca4d7b12316dfe0e58a1d2461c8b278340ecc0a3c2b3659a3bb1ff0a10b3e9efe5fbac694eb9c8900a86b1e4eec6d0d46651f8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD5156eab3a5d4da9899d5dacde519c7a0d
SHA1e73ee1f6ed1507d9b522fe0cd6d03c7248f10353
SHA25609d88dc2d0ec2de225749b6babac0908b9b7936807f377edb179d0b8c6d8f548
SHA512518004923a9527477fbfb098e1882b38bafbcd71d994573e2c923f2e9dc74057c1566102390d49546f9c0662f5c70e139f9176d093d52f0c9f1c053788a01f82
-
Filesize
486KB
MD5156eab3a5d4da9899d5dacde519c7a0d
SHA1e73ee1f6ed1507d9b522fe0cd6d03c7248f10353
SHA25609d88dc2d0ec2de225749b6babac0908b9b7936807f377edb179d0b8c6d8f548
SHA512518004923a9527477fbfb098e1882b38bafbcd71d994573e2c923f2e9dc74057c1566102390d49546f9c0662f5c70e139f9176d093d52f0c9f1c053788a01f82
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
382KB
MD50ff55d24796530d7e23cb2ad183cbf4c
SHA1da24850c036fda19d90d1820557197cba485196b
SHA2563eeb3ae224ae833aa361df7d5ef2fcf7e851fc523fa0138334c5ad20af5054e3
SHA512982daa29f8a3b561460f5847a524a4549507bc1e0d7bc49fd4fc4119550af69688f3b94bc363e3112260bdcb75458973f8bbbbb77850bb2bb60b3b7a6b76165d
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5