Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 03:59
Static task
static1
General
-
Target
43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe
-
Size
939KB
-
MD5
6ee3c0815786632c0ef14c77bf451e3e
-
SHA1
bfee233a8c22df5b8cea200b5d29b4ed956b83af
-
SHA256
43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506
-
SHA512
4599bb68d6c444c6ea499a476dabe472751d61f582db5b2354e98768734635b69ae6cd0a4bb783325eb0a5cfbe89fbe4995798e026797892f3795137915165af
-
SSDEEP
12288:vy90oOwpQu8nuxlJ6dsUBosij8OynxICpAglzLHPyVdU5tdy7WhWcuYuOA+:vyUw788lJEs5sFxfqgtKVdU5zAsuYdH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it603936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it603936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it603936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it603936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it603936.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it603936.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr036017.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4512 ziYS5006.exe 3080 ziEy1425.exe 5104 it603936.exe 4548 jr777246.exe 324 kp205303.exe 1124 lr036017.exe 1552 oneetx.exe 3268 oneetx.exe 2064 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3584 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it603936.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYS5006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYS5006.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEy1425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziEy1425.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 1612 4548 WerFault.exe 88 3856 1124 WerFault.exe 92 3732 1124 WerFault.exe 92 4068 1124 WerFault.exe 92 764 1124 WerFault.exe 92 3728 1124 WerFault.exe 92 2780 1124 WerFault.exe 92 3132 1124 WerFault.exe 92 2396 1124 WerFault.exe 92 2944 1124 WerFault.exe 92 1368 1124 WerFault.exe 92 4492 1552 WerFault.exe 112 5036 1552 WerFault.exe 112 5060 1552 WerFault.exe 112 3340 1552 WerFault.exe 112 2328 1552 WerFault.exe 112 3920 1552 WerFault.exe 112 4468 1552 WerFault.exe 112 396 1552 WerFault.exe 112 468 1552 WerFault.exe 112 2032 1552 WerFault.exe 112 3388 1552 WerFault.exe 112 3156 1552 WerFault.exe 112 5116 1552 WerFault.exe 112 2608 1552 WerFault.exe 112 352 3268 WerFault.exe 153 8 1552 WerFault.exe 112 3408 1552 WerFault.exe 112 2416 1552 WerFault.exe 112 1640 1552 WerFault.exe 112 2964 2064 WerFault.exe 165 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5104 it603936.exe 5104 it603936.exe 4548 jr777246.exe 4548 jr777246.exe 324 kp205303.exe 324 kp205303.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5104 it603936.exe Token: SeDebugPrivilege 4548 jr777246.exe Token: SeDebugPrivilege 324 kp205303.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1124 lr036017.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4512 3824 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe 85 PID 3824 wrote to memory of 4512 3824 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe 85 PID 3824 wrote to memory of 4512 3824 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe 85 PID 4512 wrote to memory of 3080 4512 ziYS5006.exe 86 PID 4512 wrote to memory of 3080 4512 ziYS5006.exe 86 PID 4512 wrote to memory of 3080 4512 ziYS5006.exe 86 PID 3080 wrote to memory of 5104 3080 ziEy1425.exe 87 PID 3080 wrote to memory of 5104 3080 ziEy1425.exe 87 PID 3080 wrote to memory of 4548 3080 ziEy1425.exe 88 PID 3080 wrote to memory of 4548 3080 ziEy1425.exe 88 PID 3080 wrote to memory of 4548 3080 ziEy1425.exe 88 PID 4512 wrote to memory of 324 4512 ziYS5006.exe 91 PID 4512 wrote to memory of 324 4512 ziYS5006.exe 91 PID 4512 wrote to memory of 324 4512 ziYS5006.exe 91 PID 3824 wrote to memory of 1124 3824 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe 92 PID 3824 wrote to memory of 1124 3824 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe 92 PID 3824 wrote to memory of 1124 3824 43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe 92 PID 1124 wrote to memory of 1552 1124 lr036017.exe 112 PID 1124 wrote to memory of 1552 1124 lr036017.exe 112 PID 1124 wrote to memory of 1552 1124 lr036017.exe 112 PID 1552 wrote to memory of 2476 1552 oneetx.exe 131 PID 1552 wrote to memory of 2476 1552 oneetx.exe 131 PID 1552 wrote to memory of 2476 1552 oneetx.exe 131 PID 1552 wrote to memory of 2580 1552 oneetx.exe 137 PID 1552 wrote to memory of 2580 1552 oneetx.exe 137 PID 1552 wrote to memory of 2580 1552 oneetx.exe 137 PID 2580 wrote to memory of 3472 2580 cmd.exe 142 PID 2580 wrote to memory of 3472 2580 cmd.exe 142 PID 2580 wrote to memory of 3472 2580 cmd.exe 142 PID 2580 wrote to memory of 4236 2580 cmd.exe 141 PID 2580 wrote to memory of 4236 2580 cmd.exe 141 PID 2580 wrote to memory of 4236 2580 cmd.exe 141 PID 2580 wrote to memory of 3384 2580 cmd.exe 143 PID 2580 wrote to memory of 3384 2580 cmd.exe 143 PID 2580 wrote to memory of 3384 2580 cmd.exe 143 PID 2580 wrote to memory of 3284 2580 cmd.exe 144 PID 2580 wrote to memory of 3284 2580 cmd.exe 144 PID 2580 wrote to memory of 3284 2580 cmd.exe 144 PID 2580 wrote to memory of 3088 2580 cmd.exe 145 PID 2580 wrote to memory of 3088 2580 cmd.exe 145 PID 2580 wrote to memory of 3088 2580 cmd.exe 145 PID 2580 wrote to memory of 2896 2580 cmd.exe 146 PID 2580 wrote to memory of 2896 2580 cmd.exe 146 PID 2580 wrote to memory of 2896 2580 cmd.exe 146 PID 1552 wrote to memory of 3584 1552 oneetx.exe 160 PID 1552 wrote to memory of 3584 1552 oneetx.exe 160 PID 1552 wrote to memory of 3584 1552 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe"C:\Users\Admin\AppData\Local\Temp\43b3e52d38e88c5bb07555ae690110d04b1d44d4d76433a3fd370e36d2850506.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYS5006.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYS5006.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEy1425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEy1425.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it603936.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it603936.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr777246.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr777246.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 13285⤵
- Program crash
PID:1612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp205303.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp205303.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr036017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr036017.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 6963⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 7803⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 7963⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 9683⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 9643⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 7963⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 12083⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 12283⤵
- Program crash
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 13123⤵
- Program crash
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 6924⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 10044⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 11004⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 11364⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 10964⤵
- Program crash
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 11204⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 11684⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 12044⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 9924⤵
- Program crash
PID:468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 7444⤵
- Program crash
PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 7644⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 12924⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 9924⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 12524⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 10804⤵
- Program crash
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 10804⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 15884⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 15684⤵
- Program crash
PID:1640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 7483⤵
- Program crash
PID:1368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4548 -ip 45481⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1124 -ip 11241⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1124 -ip 11241⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1124 -ip 11241⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1124 -ip 11241⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1124 -ip 11241⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1124 -ip 11241⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1124 -ip 11241⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1124 -ip 11241⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1124 -ip 11241⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1124 -ip 11241⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1552 -ip 15521⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1552 -ip 15521⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1552 -ip 15521⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1552 -ip 15521⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1552 -ip 15521⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1552 -ip 15521⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1552 -ip 15521⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1552 -ip 15521⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1552 -ip 15521⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1552 -ip 15521⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1552 -ip 15521⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1552 -ip 15521⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1552 -ip 15521⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1552 -ip 15521⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 3162⤵
- Program crash
PID:352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3268 -ip 32681⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1552 -ip 15521⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1552 -ip 15521⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1552 -ip 15521⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1552 -ip 15521⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 3202⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2064 -ip 20641⤵PID:456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
624KB
MD519ed33f57dcf44251c498c98df8490ba
SHA1d842bf18ea23f7e856f1a418bb428ab6a046aa50
SHA2565d94635b332131f559c06e739eaa1809a2770686e0ef3db894b0492283c88678
SHA51288bbdc6f8e248e802257509c0de931d579ba1e663513ae7c2af5c07fb6178863a7c64e4cc9f801ad783e438ad6bbb49616f0426d5ffc1a7d2530861ec39b40f3
-
Filesize
624KB
MD519ed33f57dcf44251c498c98df8490ba
SHA1d842bf18ea23f7e856f1a418bb428ab6a046aa50
SHA2565d94635b332131f559c06e739eaa1809a2770686e0ef3db894b0492283c88678
SHA51288bbdc6f8e248e802257509c0de931d579ba1e663513ae7c2af5c07fb6178863a7c64e4cc9f801ad783e438ad6bbb49616f0426d5ffc1a7d2530861ec39b40f3
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
470KB
MD54f528560242787af89e2d83ee6339eec
SHA180648876c42de56fa5e86a3ec966a00bb218a68e
SHA25630fd0e4816afcb3f86c7a188df75621f75bf37f5ff7471c663890d23b2b82d5e
SHA512d309726eeb66cae0b398e7bc1902e3e00d7216b34e6e9dccf14d4731e9bccaeff6d33a7724e435d85ea8fd5ca00ca8cd48431000885367dad3e0a987ebeb2516
-
Filesize
470KB
MD54f528560242787af89e2d83ee6339eec
SHA180648876c42de56fa5e86a3ec966a00bb218a68e
SHA25630fd0e4816afcb3f86c7a188df75621f75bf37f5ff7471c663890d23b2b82d5e
SHA512d309726eeb66cae0b398e7bc1902e3e00d7216b34e6e9dccf14d4731e9bccaeff6d33a7724e435d85ea8fd5ca00ca8cd48431000885367dad3e0a987ebeb2516
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD5ccdb589bcb06e5626c98f1f232a582e9
SHA184c9fcf5d9489f576c6fb715d8b04bf7b9d275f4
SHA256b58399f8b06a545df53bfca6c0f6545bf97dbd530ec6b2fe982baa28b323131d
SHA512250600cd0149186f793152ad9512f669ed6d1bba0034146453fa5e91ab90f5948b0295ef04624f7ffcfd0e47dc81ec86739a9bfc4dc60ee376a30076744f9b9d
-
Filesize
486KB
MD5ccdb589bcb06e5626c98f1f232a582e9
SHA184c9fcf5d9489f576c6fb715d8b04bf7b9d275f4
SHA256b58399f8b06a545df53bfca6c0f6545bf97dbd530ec6b2fe982baa28b323131d
SHA512250600cd0149186f793152ad9512f669ed6d1bba0034146453fa5e91ab90f5948b0295ef04624f7ffcfd0e47dc81ec86739a9bfc4dc60ee376a30076744f9b9d
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
382KB
MD5586c2c3c387038a375a60ed9253a87fc
SHA11c00f420f326a095a41ed7321cc7ddff83b18d07
SHA256ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c
SHA5124652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5