Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 05:54
Static task
static1
General
-
Target
0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe
-
Size
827KB
-
MD5
7e7daac043a0670fdafc1fb52a9dd159
-
SHA1
c26120dda15908fbc4b59da188a5cb4c88b56474
-
SHA256
0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17
-
SHA512
ffd557b617bf1d261c7070526b2c77d6cd277de548b805214d41954cdb97c32f0c3225ce0f0e31501f84784872ad3ad80be41bd567da2beb16a7a564e0e10bf2
-
SSDEEP
12288:4y90gcJrhjPiVcbn/PzCepz4ZgLfCVevSne2goviCjyXM1+GL:4yVcnycbnm+z4ZgLfCwvIe2fviCW8+S
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it707177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it707177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it707177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it707177.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it707177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it707177.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr918432.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2092 ziul1296.exe 4540 ziIN5353.exe 696 it707177.exe 1724 jr810647.exe 984 kp840681.exe 3612 lr918432.exe 2652 oneetx.exe 4312 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4752 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it707177.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziIN5353.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziul1296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziul1296.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziIN5353.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 4412 1724 WerFault.exe 95 1592 3612 WerFault.exe 101 3892 3612 WerFault.exe 101 2544 3612 WerFault.exe 101 2232 3612 WerFault.exe 101 4092 3612 WerFault.exe 101 4528 3612 WerFault.exe 101 2804 3612 WerFault.exe 101 380 3612 WerFault.exe 101 924 3612 WerFault.exe 101 3752 3612 WerFault.exe 101 3720 2652 WerFault.exe 121 2552 2652 WerFault.exe 121 4140 2652 WerFault.exe 121 1324 2652 WerFault.exe 121 2248 2652 WerFault.exe 121 3888 2652 WerFault.exe 121 4236 2652 WerFault.exe 121 2172 2652 WerFault.exe 121 4876 2652 WerFault.exe 121 3092 2652 WerFault.exe 121 4044 2652 WerFault.exe 121 3408 2652 WerFault.exe 121 112 2652 WerFault.exe 121 1916 2652 WerFault.exe 121 2964 2652 WerFault.exe 121 2244 2652 WerFault.exe 121 924 2652 WerFault.exe 121 1232 4312 WerFault.exe 169 3504 2652 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 696 it707177.exe 696 it707177.exe 1724 jr810647.exe 1724 jr810647.exe 984 kp840681.exe 984 kp840681.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 696 it707177.exe Token: SeDebugPrivilege 1724 jr810647.exe Token: SeDebugPrivilege 984 kp840681.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3612 lr918432.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2092 2056 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe 85 PID 2056 wrote to memory of 2092 2056 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe 85 PID 2056 wrote to memory of 2092 2056 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe 85 PID 2092 wrote to memory of 4540 2092 ziul1296.exe 86 PID 2092 wrote to memory of 4540 2092 ziul1296.exe 86 PID 2092 wrote to memory of 4540 2092 ziul1296.exe 86 PID 4540 wrote to memory of 696 4540 ziIN5353.exe 87 PID 4540 wrote to memory of 696 4540 ziIN5353.exe 87 PID 4540 wrote to memory of 1724 4540 ziIN5353.exe 95 PID 4540 wrote to memory of 1724 4540 ziIN5353.exe 95 PID 4540 wrote to memory of 1724 4540 ziIN5353.exe 95 PID 2092 wrote to memory of 984 2092 ziul1296.exe 100 PID 2092 wrote to memory of 984 2092 ziul1296.exe 100 PID 2092 wrote to memory of 984 2092 ziul1296.exe 100 PID 2056 wrote to memory of 3612 2056 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe 101 PID 2056 wrote to memory of 3612 2056 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe 101 PID 2056 wrote to memory of 3612 2056 0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe 101 PID 3612 wrote to memory of 2652 3612 lr918432.exe 121 PID 3612 wrote to memory of 2652 3612 lr918432.exe 121 PID 3612 wrote to memory of 2652 3612 lr918432.exe 121 PID 2652 wrote to memory of 3136 2652 oneetx.exe 138 PID 2652 wrote to memory of 3136 2652 oneetx.exe 138 PID 2652 wrote to memory of 3136 2652 oneetx.exe 138 PID 2652 wrote to memory of 4540 2652 oneetx.exe 144 PID 2652 wrote to memory of 4540 2652 oneetx.exe 144 PID 2652 wrote to memory of 4540 2652 oneetx.exe 144 PID 4540 wrote to memory of 1424 4540 cmd.exe 148 PID 4540 wrote to memory of 1424 4540 cmd.exe 148 PID 4540 wrote to memory of 1424 4540 cmd.exe 148 PID 4540 wrote to memory of 4676 4540 cmd.exe 149 PID 4540 wrote to memory of 4676 4540 cmd.exe 149 PID 4540 wrote to memory of 4676 4540 cmd.exe 149 PID 4540 wrote to memory of 4824 4540 cmd.exe 150 PID 4540 wrote to memory of 4824 4540 cmd.exe 150 PID 4540 wrote to memory of 4824 4540 cmd.exe 150 PID 4540 wrote to memory of 2092 4540 cmd.exe 151 PID 4540 wrote to memory of 2092 4540 cmd.exe 151 PID 4540 wrote to memory of 2092 4540 cmd.exe 151 PID 4540 wrote to memory of 5040 4540 cmd.exe 152 PID 4540 wrote to memory of 5040 4540 cmd.exe 152 PID 4540 wrote to memory of 5040 4540 cmd.exe 152 PID 4540 wrote to memory of 2856 4540 cmd.exe 153 PID 4540 wrote to memory of 2856 4540 cmd.exe 153 PID 4540 wrote to memory of 2856 4540 cmd.exe 153 PID 2652 wrote to memory of 4752 2652 oneetx.exe 166 PID 2652 wrote to memory of 4752 2652 oneetx.exe 166 PID 2652 wrote to memory of 4752 2652 oneetx.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe"C:\Users\Admin\AppData\Local\Temp\0bfa95ffc92162b4513acfea980b151129dff21b939f92e854808a2d058ffd17.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziul1296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziul1296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIN5353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIN5353.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it707177.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it707177.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr810647.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr810647.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 13365⤵
- Program crash
PID:4412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp840681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp840681.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918432.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918432.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 7123⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 7963⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 8123⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 9643⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 9803⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 9803⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 12083⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 12283⤵
- Program crash
PID:380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 13203⤵
- Program crash
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 7084⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 8484⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 8724⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 10564⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 10764⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 10564⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 11324⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 9964⤵
- Program crash
PID:2172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 7084⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:5040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 13324⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 13564⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 13244⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 13164⤵
- Program crash
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 14364⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 11204⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 16324⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 14444⤵
- Program crash
PID:924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 16084⤵
- Program crash
PID:3504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 7643⤵
- Program crash
PID:3752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 1724 -ip 17241⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3612 -ip 36121⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3612 -ip 36121⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3612 -ip 36121⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3612 -ip 36121⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3612 -ip 36121⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3612 -ip 36121⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3612 -ip 36121⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3612 -ip 36121⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3612 -ip 36121⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3612 -ip 36121⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2652 -ip 26521⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2652 -ip 26521⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2652 -ip 26521⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2652 -ip 26521⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2652 -ip 26521⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2652 -ip 26521⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2652 -ip 26521⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2652 -ip 26521⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2652 -ip 26521⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 2652 -ip 26521⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2652 -ip 26521⤵PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2652 -ip 26521⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2652 -ip 26521⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2652 -ip 26521⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 2652 -ip 26521⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 2652 -ip 26521⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 2652 -ip 26521⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 4242⤵
- Program crash
PID:1232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4312 -ip 43121⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 2652 -ip 26521⤵PID:1932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
568KB
MD5eb91c25e4e9bbde15ebc9ac4d310063d
SHA1882fecc90b6c265cbd35092d8b12a01bb023df2a
SHA256af64aee0f3237d2143d6595469349ef9ea35301e2f8546463f6d3d9bb93d26c3
SHA5125a142bc132b13578d3a489e75eeb2c7aceec72ab9676cf595c7c08e3e126710ca1b2dee1bd12c55c4cc7b38f1283cd588491064ac9da16fa397d6e4972530dd4
-
Filesize
568KB
MD5eb91c25e4e9bbde15ebc9ac4d310063d
SHA1882fecc90b6c265cbd35092d8b12a01bb023df2a
SHA256af64aee0f3237d2143d6595469349ef9ea35301e2f8546463f6d3d9bb93d26c3
SHA5125a142bc132b13578d3a489e75eeb2c7aceec72ab9676cf595c7c08e3e126710ca1b2dee1bd12c55c4cc7b38f1283cd588491064ac9da16fa397d6e4972530dd4
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
414KB
MD525bc578572a1f6173d9e35c2bff1a31c
SHA175505532fea37c3840bf5379d8b3d5c6316f84d4
SHA2562306e1b043d48b689b6bdfe85458a0fa35e60b21abd385cdaa0f578b622ae9b5
SHA5121b37891023128bc0fce3e6f6de03185c5a8dd2585eadf29d89aaa6e43c4601396b6dc0af29fd79d5d7347353aad05dc5acf317c745e2ae0ce11912f3a39665f8
-
Filesize
414KB
MD525bc578572a1f6173d9e35c2bff1a31c
SHA175505532fea37c3840bf5379d8b3d5c6316f84d4
SHA2562306e1b043d48b689b6bdfe85458a0fa35e60b21abd385cdaa0f578b622ae9b5
SHA5121b37891023128bc0fce3e6f6de03185c5a8dd2585eadf29d89aaa6e43c4601396b6dc0af29fd79d5d7347353aad05dc5acf317c745e2ae0ce11912f3a39665f8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD52fd2beeef1f72585dd690ace5f631c0a
SHA196b324f3652102f172fe5c5ca06af574a2fc3998
SHA256a4aaed230e6253d2b65a912f0f2e98eb76384377e2a5be31ab4b11613c7c210a
SHA5121ac52af2886a378f400b749ded944c13ee49651c50094ac89b49e6e9b42dc178cb6c58efca49d2218beeca2d9527f58fd7455ab55d8590b44469a7248ca12166
-
Filesize
360KB
MD52fd2beeef1f72585dd690ace5f631c0a
SHA196b324f3652102f172fe5c5ca06af574a2fc3998
SHA256a4aaed230e6253d2b65a912f0f2e98eb76384377e2a5be31ab4b11613c7c210a
SHA5121ac52af2886a378f400b749ded944c13ee49651c50094ac89b49e6e9b42dc178cb6c58efca49d2218beeca2d9527f58fd7455ab55d8590b44469a7248ca12166
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
255KB
MD552c8d88080f3b880e0069039afe3789c
SHA15ed21c4848963a502e42d79d83112cc21e011ad0
SHA256d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f
SHA5122483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5