Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 03:11
Static task
static1
General
-
Target
8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe
-
Size
1.1MB
-
MD5
73df230095ef21ee8de620d87a692a57
-
SHA1
a7cb0e86b7734a84c58b395b4f98d68a400e654a
-
SHA256
8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687
-
SHA512
42c252c737618aacbb1ad2a7b498f96c8a4c4e4565174bf353c1eb945c7e0ef70c9ddcb45097be27618e4f9e95cc316db9f11eaffcbaffecf6afacd0e7003b0e
-
SSDEEP
24576:dy64jW9Mbb/hRcjFmOadUtp40KWsXFOgaH2rddF/h7HlTRHxc:4ZW96sZnwMK1OgkOdF5R1H
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr268611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr268611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr268611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr268611.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr268611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr268611.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si006915.exe -
Executes dropped EXE 9 IoCs
pid Process 4596 un525888.exe 2036 un901592.exe 1164 pr268611.exe 4336 qu880595.exe 4136 rk416503.exe 3388 si006915.exe 2124 oneetx.exe 4992 oneetx.exe 1768 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4004 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr268611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr268611.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un525888.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un525888.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un901592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un901592.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 3512 1164 WerFault.exe 87 512 4336 WerFault.exe 93 5044 3388 WerFault.exe 97 2968 3388 WerFault.exe 97 2020 3388 WerFault.exe 97 1264 3388 WerFault.exe 97 1944 3388 WerFault.exe 97 2672 3388 WerFault.exe 97 1576 3388 WerFault.exe 97 2696 3388 WerFault.exe 97 3308 3388 WerFault.exe 97 3812 3388 WerFault.exe 97 4200 2124 WerFault.exe 117 3704 2124 WerFault.exe 117 4492 2124 WerFault.exe 117 624 2124 WerFault.exe 117 1476 2124 WerFault.exe 117 1892 2124 WerFault.exe 117 4708 2124 WerFault.exe 117 4176 2124 WerFault.exe 117 2812 2124 WerFault.exe 117 5080 2124 WerFault.exe 117 4532 2124 WerFault.exe 117 4504 2124 WerFault.exe 117 4388 2124 WerFault.exe 117 640 4992 WerFault.exe 160 1396 2124 WerFault.exe 117 4108 2124 WerFault.exe 117 1148 2124 WerFault.exe 117 4852 1768 WerFault.exe 170 4952 2124 WerFault.exe 117 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1164 pr268611.exe 1164 pr268611.exe 4336 qu880595.exe 4336 qu880595.exe 4136 rk416503.exe 4136 rk416503.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1164 pr268611.exe Token: SeDebugPrivilege 4336 qu880595.exe Token: SeDebugPrivilege 4136 rk416503.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3388 si006915.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4596 2516 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe 85 PID 2516 wrote to memory of 4596 2516 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe 85 PID 2516 wrote to memory of 4596 2516 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe 85 PID 4596 wrote to memory of 2036 4596 un525888.exe 86 PID 4596 wrote to memory of 2036 4596 un525888.exe 86 PID 4596 wrote to memory of 2036 4596 un525888.exe 86 PID 2036 wrote to memory of 1164 2036 un901592.exe 87 PID 2036 wrote to memory of 1164 2036 un901592.exe 87 PID 2036 wrote to memory of 1164 2036 un901592.exe 87 PID 2036 wrote to memory of 4336 2036 un901592.exe 93 PID 2036 wrote to memory of 4336 2036 un901592.exe 93 PID 2036 wrote to memory of 4336 2036 un901592.exe 93 PID 4596 wrote to memory of 4136 4596 un525888.exe 96 PID 4596 wrote to memory of 4136 4596 un525888.exe 96 PID 4596 wrote to memory of 4136 4596 un525888.exe 96 PID 2516 wrote to memory of 3388 2516 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe 97 PID 2516 wrote to memory of 3388 2516 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe 97 PID 2516 wrote to memory of 3388 2516 8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe 97 PID 3388 wrote to memory of 2124 3388 si006915.exe 117 PID 3388 wrote to memory of 2124 3388 si006915.exe 117 PID 3388 wrote to memory of 2124 3388 si006915.exe 117 PID 2124 wrote to memory of 2796 2124 oneetx.exe 135 PID 2124 wrote to memory of 2796 2124 oneetx.exe 135 PID 2124 wrote to memory of 2796 2124 oneetx.exe 135 PID 2124 wrote to memory of 764 2124 oneetx.exe 141 PID 2124 wrote to memory of 764 2124 oneetx.exe 141 PID 2124 wrote to memory of 764 2124 oneetx.exe 141 PID 764 wrote to memory of 3652 764 cmd.exe 146 PID 764 wrote to memory of 3652 764 cmd.exe 146 PID 764 wrote to memory of 3652 764 cmd.exe 146 PID 764 wrote to memory of 2252 764 cmd.exe 147 PID 764 wrote to memory of 2252 764 cmd.exe 147 PID 764 wrote to memory of 2252 764 cmd.exe 147 PID 764 wrote to memory of 4944 764 cmd.exe 148 PID 764 wrote to memory of 4944 764 cmd.exe 148 PID 764 wrote to memory of 4944 764 cmd.exe 148 PID 764 wrote to memory of 4676 764 cmd.exe 150 PID 764 wrote to memory of 4676 764 cmd.exe 150 PID 764 wrote to memory of 4676 764 cmd.exe 150 PID 764 wrote to memory of 1668 764 cmd.exe 151 PID 764 wrote to memory of 1668 764 cmd.exe 151 PID 764 wrote to memory of 1668 764 cmd.exe 151 PID 764 wrote to memory of 2036 764 cmd.exe 152 PID 764 wrote to memory of 2036 764 cmd.exe 152 PID 764 wrote to memory of 2036 764 cmd.exe 152 PID 2124 wrote to memory of 4004 2124 oneetx.exe 167 PID 2124 wrote to memory of 4004 2124 oneetx.exe 167 PID 2124 wrote to memory of 4004 2124 oneetx.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe"C:\Users\Admin\AppData\Local\Temp\8f8ea83bc9158fd5cb09b360de9bfa51566b5fe0d67449ca3e98f88689901687.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un525888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un525888.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un901592.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un901592.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr268611.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr268611.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 10805⤵
- Program crash
PID:3512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu880595.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu880595.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 10365⤵
- Program crash
PID:512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk416503.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk416503.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si006915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si006915.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 6963⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 7563⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 7963⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 9523⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 9563⤵
- Program crash
PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 9563⤵
- Program crash
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 12163⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 12323⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 13123⤵
- Program crash
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6924⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8404⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 9044⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 10604⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 10644⤵
- Program crash
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 10644⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 11084⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 9964⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 7764⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 7564⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 12844⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 13284⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 13364⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 11324⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 16044⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 15644⤵
- Program crash
PID:1148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 16204⤵
- Program crash
PID:4952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 13563⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1164 -ip 11641⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4336 -ip 43361⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3388 -ip 33881⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3388 -ip 33881⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3388 -ip 33881⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3388 -ip 33881⤵PID:664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3388 -ip 33881⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3388 -ip 33881⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3388 -ip 33881⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3388 -ip 33881⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3388 -ip 33881⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3388 -ip 33881⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2124 -ip 21241⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2124 -ip 21241⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2124 -ip 21241⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2124 -ip 21241⤵PID:1712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2124 -ip 21241⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2124 -ip 21241⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2124 -ip 21241⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2124 -ip 21241⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2124 -ip 21241⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2124 -ip 21241⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2124 -ip 21241⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2124 -ip 21241⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2124 -ip 21241⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3122⤵
- Program crash
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4992 -ip 49921⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2124 -ip 21241⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2124 -ip 21241⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2124 -ip 21241⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 3122⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1768 -ip 17681⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2124 -ip 21241⤵PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
764KB
MD5fdf43d66778778802b5f7e4780b41e3a
SHA1ba30b06557c3af1ae0c5dbc20302e70c1db4fbf8
SHA256b44fcb61c963e1bb8ba4f02565f17401f33ca0e4f47fef2e0f96dcd75ac57053
SHA51271315aa85dc8c1a986a0b454705359f0017bbbc3d30ed69d5416f9e123110c8b5c2bf15d39c1910f6232ef6a844fcd672b811bd898e79a2a6abdd9033733e7c1
-
Filesize
764KB
MD5fdf43d66778778802b5f7e4780b41e3a
SHA1ba30b06557c3af1ae0c5dbc20302e70c1db4fbf8
SHA256b44fcb61c963e1bb8ba4f02565f17401f33ca0e4f47fef2e0f96dcd75ac57053
SHA51271315aa85dc8c1a986a0b454705359f0017bbbc3d30ed69d5416f9e123110c8b5c2bf15d39c1910f6232ef6a844fcd672b811bd898e79a2a6abdd9033733e7c1
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
610KB
MD54c3ed70752796d130fa77db1e40204db
SHA1a16d4dadbf32ef5efa6eae62254425dfed2b586d
SHA25669b75dd8ed9df3bfb94189a9ec7c993d46f365ad4784d84544fcfd704af52df3
SHA512e548111e357795be0dfae024f30e223d909995a1e178f46265352aabba0ae1177b585ff49956f246e7a0ff47b32dd3907aadca839bc69a69d73042240c429a6f
-
Filesize
610KB
MD54c3ed70752796d130fa77db1e40204db
SHA1a16d4dadbf32ef5efa6eae62254425dfed2b586d
SHA25669b75dd8ed9df3bfb94189a9ec7c993d46f365ad4784d84544fcfd704af52df3
SHA512e548111e357795be0dfae024f30e223d909995a1e178f46265352aabba0ae1177b585ff49956f246e7a0ff47b32dd3907aadca839bc69a69d73042240c429a6f
-
Filesize
403KB
MD55b0686a8cccaab4d6db8a371c8a26a6a
SHA13acd81222e8ffa2917997f2b0da2f1115263bf21
SHA256cf3e8bdc5d255035c5bb37b079c5c7591d16664b3e773548a6b537fafb00a194
SHA512a75e3e3b0a338a5bdd9eb206c183885d2ffee112c763320cdb873094b6a507c1c342c7ad76166af74b4a002aa9043f347f9eb1d7a4ea02d354a5b33493ef8731
-
Filesize
403KB
MD55b0686a8cccaab4d6db8a371c8a26a6a
SHA13acd81222e8ffa2917997f2b0da2f1115263bf21
SHA256cf3e8bdc5d255035c5bb37b079c5c7591d16664b3e773548a6b537fafb00a194
SHA512a75e3e3b0a338a5bdd9eb206c183885d2ffee112c763320cdb873094b6a507c1c342c7ad76166af74b4a002aa9043f347f9eb1d7a4ea02d354a5b33493ef8731
-
Filesize
486KB
MD5594f090e804d4393df3afe23617ff678
SHA1dacb341b29552bd30ee84c97df212fdd03ae23a6
SHA256fa5c57603e2a764030aa978c5c3a15be2e9210feb0b53a2085eed8c034bf968c
SHA5128952c4102f019d29c2a9867affa67a4eb07fa0ce7ca8be13e7f3667ee9e75d0a9d25c6591be087b2126981241a10a90654a576cbf81e767d74f44ea0c35c53fa
-
Filesize
486KB
MD5594f090e804d4393df3afe23617ff678
SHA1dacb341b29552bd30ee84c97df212fdd03ae23a6
SHA256fa5c57603e2a764030aa978c5c3a15be2e9210feb0b53a2085eed8c034bf968c
SHA5128952c4102f019d29c2a9867affa67a4eb07fa0ce7ca8be13e7f3667ee9e75d0a9d25c6591be087b2126981241a10a90654a576cbf81e767d74f44ea0c35c53fa
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5