Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 05:26
Static task
static1
General
-
Target
4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe
-
Size
964KB
-
MD5
4fecf9f235069597c9e0eecdd5130199
-
SHA1
2d3a95c6a59c8adf955084b7d061fbb564ba05e0
-
SHA256
4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1
-
SHA512
9c8676fd9f9573ecabec0e962e267e96b20f529bc1b1dc787f670467b8b8b59bce8f6ce0f2466e093374cafee130c1e780ae28553f094e7f7ca765d60a177ffb
-
SSDEEP
24576:0yqpXrX7/WTw2Lkoy9NzVFJrUCzcHejIJVT7Ig:DwOC9NhFJrUtHJVf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr865514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr865514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr865514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr865514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr865514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr865514.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si235033.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 864 un000077.exe 2960 un438519.exe 1984 pr865514.exe 1104 qu967623.exe 1232 rk501438.exe 4692 si235033.exe 640 oneetx.exe 5008 oneetx.exe 2064 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 824 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr865514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr865514.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un438519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un438519.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un000077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un000077.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 408 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 4716 1984 WerFault.exe 87 2988 1104 WerFault.exe 93 1400 4692 WerFault.exe 97 1260 4692 WerFault.exe 97 4128 4692 WerFault.exe 97 4860 4692 WerFault.exe 97 2448 4692 WerFault.exe 97 4220 4692 WerFault.exe 97 1756 4692 WerFault.exe 97 3484 4692 WerFault.exe 97 396 4692 WerFault.exe 97 3556 4692 WerFault.exe 97 2416 640 WerFault.exe 117 564 640 WerFault.exe 117 2256 640 WerFault.exe 117 4572 640 WerFault.exe 117 1972 640 WerFault.exe 117 1100 640 WerFault.exe 117 3020 640 WerFault.exe 117 3736 640 WerFault.exe 117 4984 640 WerFault.exe 117 2408 640 WerFault.exe 117 4892 640 WerFault.exe 117 2660 640 WerFault.exe 117 3364 640 WerFault.exe 117 4920 640 WerFault.exe 117 952 5008 WerFault.exe 162 2084 640 WerFault.exe 117 1392 640 WerFault.exe 117 548 640 WerFault.exe 117 2872 2064 WerFault.exe 174 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1984 pr865514.exe 1984 pr865514.exe 1104 qu967623.exe 1104 qu967623.exe 1232 rk501438.exe 1232 rk501438.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1984 pr865514.exe Token: SeDebugPrivilege 1104 qu967623.exe Token: SeDebugPrivilege 1232 rk501438.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4692 si235033.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4508 wrote to memory of 864 4508 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe 85 PID 4508 wrote to memory of 864 4508 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe 85 PID 4508 wrote to memory of 864 4508 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe 85 PID 864 wrote to memory of 2960 864 un000077.exe 86 PID 864 wrote to memory of 2960 864 un000077.exe 86 PID 864 wrote to memory of 2960 864 un000077.exe 86 PID 2960 wrote to memory of 1984 2960 un438519.exe 87 PID 2960 wrote to memory of 1984 2960 un438519.exe 87 PID 2960 wrote to memory of 1984 2960 un438519.exe 87 PID 2960 wrote to memory of 1104 2960 un438519.exe 93 PID 2960 wrote to memory of 1104 2960 un438519.exe 93 PID 2960 wrote to memory of 1104 2960 un438519.exe 93 PID 864 wrote to memory of 1232 864 un000077.exe 96 PID 864 wrote to memory of 1232 864 un000077.exe 96 PID 864 wrote to memory of 1232 864 un000077.exe 96 PID 4508 wrote to memory of 4692 4508 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe 97 PID 4508 wrote to memory of 4692 4508 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe 97 PID 4508 wrote to memory of 4692 4508 4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe 97 PID 4692 wrote to memory of 640 4692 si235033.exe 117 PID 4692 wrote to memory of 640 4692 si235033.exe 117 PID 4692 wrote to memory of 640 4692 si235033.exe 117 PID 640 wrote to memory of 5100 640 oneetx.exe 136 PID 640 wrote to memory of 5100 640 oneetx.exe 136 PID 640 wrote to memory of 5100 640 oneetx.exe 136 PID 640 wrote to memory of 2044 640 oneetx.exe 143 PID 640 wrote to memory of 2044 640 oneetx.exe 143 PID 640 wrote to memory of 2044 640 oneetx.exe 143 PID 2044 wrote to memory of 3108 2044 cmd.exe 147 PID 2044 wrote to memory of 3108 2044 cmd.exe 147 PID 2044 wrote to memory of 3108 2044 cmd.exe 147 PID 2044 wrote to memory of 4340 2044 cmd.exe 148 PID 2044 wrote to memory of 4340 2044 cmd.exe 148 PID 2044 wrote to memory of 4340 2044 cmd.exe 148 PID 2044 wrote to memory of 2328 2044 cmd.exe 149 PID 2044 wrote to memory of 2328 2044 cmd.exe 149 PID 2044 wrote to memory of 2328 2044 cmd.exe 149 PID 2044 wrote to memory of 1192 2044 cmd.exe 150 PID 2044 wrote to memory of 1192 2044 cmd.exe 150 PID 2044 wrote to memory of 1192 2044 cmd.exe 150 PID 2044 wrote to memory of 4356 2044 cmd.exe 151 PID 2044 wrote to memory of 4356 2044 cmd.exe 151 PID 2044 wrote to memory of 4356 2044 cmd.exe 151 PID 2044 wrote to memory of 1440 2044 cmd.exe 152 PID 2044 wrote to memory of 1440 2044 cmd.exe 152 PID 2044 wrote to memory of 1440 2044 cmd.exe 152 PID 640 wrote to memory of 824 640 oneetx.exe 167 PID 640 wrote to memory of 824 640 oneetx.exe 167 PID 640 wrote to memory of 824 640 oneetx.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe"C:\Users\Admin\AppData\Local\Temp\4ee0d35574259cf2d8dfcb5b712ecce2f3f4069e7f6c4aec27d23c08304c29e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un000077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un000077.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un438519.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un438519.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr865514.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr865514.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 10845⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu967623.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu967623.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 19925⤵
- Program crash
PID:2988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk501438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk501438.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235033.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7123⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7883⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 8243⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 9563⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 9803⤵
- Program crash
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 9803⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 12203⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 12043⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 13203⤵
- Program crash
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7084⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 8484⤵
- Program crash
PID:564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 9204⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 10564⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 10964⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 11164⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 11244⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 9964⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7844⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 9044⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7444⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7124⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7644⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 13964⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 16044⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 13964⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 16204⤵
- Program crash
PID:548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 14283⤵
- Program crash
PID:3556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1984 -ip 19841⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1104 -ip 11041⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4692 -ip 46921⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4692 -ip 46921⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4692 -ip 46921⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4692 -ip 46921⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4692 -ip 46921⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4692 -ip 46921⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4692 -ip 46921⤵PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4692 -ip 46921⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4692 -ip 46921⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4692 -ip 46921⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 640 -ip 6401⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 640 -ip 6401⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 640 -ip 6401⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 640 -ip 6401⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 640 -ip 6401⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 640 -ip 6401⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 640 -ip 6401⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 640 -ip 6401⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 640 -ip 6401⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 640 -ip 6401⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 640 -ip 6401⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 640 -ip 6401⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 640 -ip 6401⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 640 -ip 6401⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 4242⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 5008 -ip 50081⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 640 -ip 6401⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 640 -ip 6401⤵PID:820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 640 -ip 6401⤵PID:3464
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:408
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 4282⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2064 -ip 20641⤵PID:328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
705KB
MD5f38e3f3a2315c532ee0af807d2c6ef94
SHA19c7bd8d1294987105e10f3a88387cf3ad3c3ca00
SHA2566da29d69b298d23d269114339e67a1fe8b75ca1874a359d94b88ec5bd63fd910
SHA512b6c2cbab15f6bb08f302fb0322664e36555a30f25b8bf4fd272a72531aa9495166836792e51a2df6c47220a1748600537bd882331017804278e942301808e5e7
-
Filesize
705KB
MD5f38e3f3a2315c532ee0af807d2c6ef94
SHA19c7bd8d1294987105e10f3a88387cf3ad3c3ca00
SHA2566da29d69b298d23d269114339e67a1fe8b75ca1874a359d94b88ec5bd63fd910
SHA512b6c2cbab15f6bb08f302fb0322664e36555a30f25b8bf4fd272a72531aa9495166836792e51a2df6c47220a1748600537bd882331017804278e942301808e5e7
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
551KB
MD56c9629fa438f37b247b954d97363f6d2
SHA1f17f850c03dea5e9d39247ae93347a27b61ee0f2
SHA256e3a2fd8b52c4ab90cdb66694c3ec74a1878c43c65621d076d7835c7eb1aa6847
SHA512c2470826c0b8320014b1a9fa449b1abeaa29a7ae9ea35cd7a18b443efa62775e8676c396140babf9192a8e0146ee7f5eb74684d40ff3b2861e36171fb091ccc8
-
Filesize
551KB
MD56c9629fa438f37b247b954d97363f6d2
SHA1f17f850c03dea5e9d39247ae93347a27b61ee0f2
SHA256e3a2fd8b52c4ab90cdb66694c3ec74a1878c43c65621d076d7835c7eb1aa6847
SHA512c2470826c0b8320014b1a9fa449b1abeaa29a7ae9ea35cd7a18b443efa62775e8676c396140babf9192a8e0146ee7f5eb74684d40ff3b2861e36171fb091ccc8
-
Filesize
277KB
MD57b4321bdf3f1fd61f2a2873710ca789d
SHA1dc4feb4c8256ccc447109f991522a56e8b23916a
SHA256dc9ba35fd82a245bd6921e909fabdb1c31e9b15b8b3c30fd9a21df96ab6c8dbe
SHA512ad54d54ae71ae5eaac7f5c68fa61271c5ab0cfac2373922e893627f253fac503e78995933b357514ce9607bd29f94b23cd762638daccefcb4932a0e4402446e8
-
Filesize
277KB
MD57b4321bdf3f1fd61f2a2873710ca789d
SHA1dc4feb4c8256ccc447109f991522a56e8b23916a
SHA256dc9ba35fd82a245bd6921e909fabdb1c31e9b15b8b3c30fd9a21df96ab6c8dbe
SHA512ad54d54ae71ae5eaac7f5c68fa61271c5ab0cfac2373922e893627f253fac503e78995933b357514ce9607bd29f94b23cd762638daccefcb4932a0e4402446e8
-
Filesize
360KB
MD576d1104ab6301990b73ffc61820d8006
SHA1af896d83bfcd152425e470a2a0d00267377ae52f
SHA25628dffeb9681852548c156ec8b2354d69443d39b78b4c8c19878e56d4cb703b74
SHA51277a68c1fd9dc2b4de4b8d93cebdbfbcc719d0d22770734693a49365a71cf24e22afd7b8e57492cf1467b321227ec75c58eecdf472cca6b7c74134e9ab96a759a
-
Filesize
360KB
MD576d1104ab6301990b73ffc61820d8006
SHA1af896d83bfcd152425e470a2a0d00267377ae52f
SHA25628dffeb9681852548c156ec8b2354d69443d39b78b4c8c19878e56d4cb703b74
SHA51277a68c1fd9dc2b4de4b8d93cebdbfbcc719d0d22770734693a49365a71cf24e22afd7b8e57492cf1467b321227ec75c58eecdf472cca6b7c74134e9ab96a759a
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5