Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 08:08
Static task
static1
General
-
Target
c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe
-
Size
1.3MB
-
MD5
5eb1a0cc95c496d036e68597b71bdf5d
-
SHA1
6cfb9c042ad523ce49ae2765c6a69d5aecf2a223
-
SHA256
c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098
-
SHA512
5cbd2bc0778b3873109af4bdc32b153b7f6ebc95125c8bc878e49c4e211b51293be36e11af2817687d7bb170a9a31b3d6ffd0c2826840ab4422c311d7a381a44
-
SSDEEP
24576:VyVEetj+x+G4ZJSqdwJyTX5Ys7r4lXnZYR01bU89MlF:wVEeU+G4ZwJwXGs7ry51L9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az704124.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection co630436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" co630436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" co630436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" co630436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" co630436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" co630436.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az704124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az704124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az704124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az704124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az704124.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation ge421670.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation ft391019.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 14 IoCs
pid Process 1776 ki744465.exe 4340 ki784129.exe 1388 ki845065.exe 4420 ki800872.exe 1988 az704124.exe 4228 bu098329.exe 2740 co630436.exe 1408 djK81t23.exe 3808 ft391019.exe 1664 oneetx.exe 2740 ge421670.exe 960 oneetx.exe 3532 oneetx.exe 2160 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3992 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" co630436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az704124.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features co630436.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ki845065.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki800872.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ki800872.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki784129.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki744465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki784129.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki845065.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ki744465.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
pid pid_target Process procid_target 4400 4228 WerFault.exe 92 4448 2740 WerFault.exe 98 4488 1408 WerFault.exe 102 2276 2740 WerFault.exe 107 1376 2740 WerFault.exe 107 4220 2740 WerFault.exe 107 3464 2740 WerFault.exe 107 3528 2740 WerFault.exe 107 2984 2740 WerFault.exe 107 1192 2740 WerFault.exe 107 1424 2740 WerFault.exe 107 2044 2740 WerFault.exe 107 2440 2740 WerFault.exe 107 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1988 az704124.exe 1988 az704124.exe 4228 bu098329.exe 4228 bu098329.exe 2740 co630436.exe 2740 co630436.exe 1408 djK81t23.exe 1408 djK81t23.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1988 az704124.exe Token: SeDebugPrivilege 4228 bu098329.exe Token: SeDebugPrivilege 2740 co630436.exe Token: SeDebugPrivilege 1408 djK81t23.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3808 ft391019.exe 2740 ge421670.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 4300 wrote to memory of 1776 4300 c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe 83 PID 4300 wrote to memory of 1776 4300 c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe 83 PID 4300 wrote to memory of 1776 4300 c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe 83 PID 1776 wrote to memory of 4340 1776 ki744465.exe 84 PID 1776 wrote to memory of 4340 1776 ki744465.exe 84 PID 1776 wrote to memory of 4340 1776 ki744465.exe 84 PID 4340 wrote to memory of 1388 4340 ki784129.exe 85 PID 4340 wrote to memory of 1388 4340 ki784129.exe 85 PID 4340 wrote to memory of 1388 4340 ki784129.exe 85 PID 1388 wrote to memory of 4420 1388 ki845065.exe 86 PID 1388 wrote to memory of 4420 1388 ki845065.exe 86 PID 1388 wrote to memory of 4420 1388 ki845065.exe 86 PID 4420 wrote to memory of 1988 4420 ki800872.exe 87 PID 4420 wrote to memory of 1988 4420 ki800872.exe 87 PID 4420 wrote to memory of 4228 4420 ki800872.exe 92 PID 4420 wrote to memory of 4228 4420 ki800872.exe 92 PID 4420 wrote to memory of 4228 4420 ki800872.exe 92 PID 1388 wrote to memory of 2740 1388 ki845065.exe 98 PID 1388 wrote to memory of 2740 1388 ki845065.exe 98 PID 1388 wrote to memory of 2740 1388 ki845065.exe 98 PID 4340 wrote to memory of 1408 4340 ki784129.exe 102 PID 4340 wrote to memory of 1408 4340 ki784129.exe 102 PID 4340 wrote to memory of 1408 4340 ki784129.exe 102 PID 1776 wrote to memory of 3808 1776 ki744465.exe 105 PID 1776 wrote to memory of 3808 1776 ki744465.exe 105 PID 1776 wrote to memory of 3808 1776 ki744465.exe 105 PID 3808 wrote to memory of 1664 3808 ft391019.exe 106 PID 3808 wrote to memory of 1664 3808 ft391019.exe 106 PID 3808 wrote to memory of 1664 3808 ft391019.exe 106 PID 4300 wrote to memory of 2740 4300 c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe 107 PID 4300 wrote to memory of 2740 4300 c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe 107 PID 4300 wrote to memory of 2740 4300 c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe 107 PID 1664 wrote to memory of 1512 1664 oneetx.exe 108 PID 1664 wrote to memory of 1512 1664 oneetx.exe 108 PID 1664 wrote to memory of 1512 1664 oneetx.exe 108 PID 1664 wrote to memory of 1520 1664 oneetx.exe 110 PID 1664 wrote to memory of 1520 1664 oneetx.exe 110 PID 1664 wrote to memory of 1520 1664 oneetx.exe 110 PID 1520 wrote to memory of 1160 1520 cmd.exe 112 PID 1520 wrote to memory of 1160 1520 cmd.exe 112 PID 1520 wrote to memory of 1160 1520 cmd.exe 112 PID 1520 wrote to memory of 3020 1520 cmd.exe 113 PID 1520 wrote to memory of 3020 1520 cmd.exe 113 PID 1520 wrote to memory of 3020 1520 cmd.exe 113 PID 1520 wrote to memory of 1768 1520 cmd.exe 114 PID 1520 wrote to memory of 1768 1520 cmd.exe 114 PID 1520 wrote to memory of 1768 1520 cmd.exe 114 PID 1520 wrote to memory of 532 1520 cmd.exe 116 PID 1520 wrote to memory of 532 1520 cmd.exe 116 PID 1520 wrote to memory of 532 1520 cmd.exe 116 PID 1520 wrote to memory of 3524 1520 cmd.exe 117 PID 1520 wrote to memory of 3524 1520 cmd.exe 117 PID 1520 wrote to memory of 3524 1520 cmd.exe 117 PID 1520 wrote to memory of 4524 1520 cmd.exe 118 PID 1520 wrote to memory of 4524 1520 cmd.exe 118 PID 1520 wrote to memory of 4524 1520 cmd.exe 118 PID 2740 wrote to memory of 960 2740 ge421670.exe 136 PID 2740 wrote to memory of 960 2740 ge421670.exe 136 PID 2740 wrote to memory of 960 2740 ge421670.exe 136 PID 1664 wrote to memory of 3992 1664 oneetx.exe 140 PID 1664 wrote to memory of 3992 1664 oneetx.exe 140 PID 1664 wrote to memory of 3992 1664 oneetx.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe"C:\Users\Admin\AppData\Local\Temp\c5f4a8b057ddfae0724d4c7df713735d97dca885fbee4febef26900c64ee4098.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki744465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki744465.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki784129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki784129.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki845065.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki845065.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki800872.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki800872.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az704124.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az704124.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu098329.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu098329.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 13247⤵
- Program crash
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\co630436.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\co630436.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 10886⤵
- Program crash
PID:4448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\djK81t23.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\djK81t23.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 20165⤵
- Program crash
PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft391019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ft391019.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵PID:3020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵PID:1768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵PID:3524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵PID:4524
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge421670.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge421670.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 7123⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 7963⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 8163⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 9763⤵
- Program crash
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 9563⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 9563⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 12243⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 12243⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 13683⤵
- Program crash
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Executes dropped EXE
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 12923⤵
- Program crash
PID:2440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4228 -ip 42281⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2740 -ip 27401⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1408 -ip 14081⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2740 -ip 27401⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2740 -ip 27401⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2740 -ip 27401⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2740 -ip 27401⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2740 -ip 27401⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2740 -ip 27401⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2740 -ip 27401⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2740 -ip 27401⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2740 -ip 27401⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2740 -ip 27401⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3532
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD527af34e2d7a9184d69deb71cbc9e428c
SHA16797d775a45466f5fcef16dd7769f8151caa97d0
SHA256ce2775c3754d49e57d285280034bf01b3d9451ed2bf82b1228d803a7668c3562
SHA512489e30729225951472ee50daa048d80fbd88027c5743abdbfafda314b658708a1bc1351bb406c02a099648aca83ac158ced6fb5c224abd9b72514fbec4b23441
-
Filesize
256KB
MD527af34e2d7a9184d69deb71cbc9e428c
SHA16797d775a45466f5fcef16dd7769f8151caa97d0
SHA256ce2775c3754d49e57d285280034bf01b3d9451ed2bf82b1228d803a7668c3562
SHA512489e30729225951472ee50daa048d80fbd88027c5743abdbfafda314b658708a1bc1351bb406c02a099648aca83ac158ced6fb5c224abd9b72514fbec4b23441
-
Filesize
1.0MB
MD5d1b7f8a59b07c6338d8444d00bf0f878
SHA13f0ff41c92f56b455af45eed497f9b01d61a9ede
SHA25661ae8c8ab283e68d9a64627d22d571894ae0004ccbf9867ef374c6b1e36b4a8b
SHA5120da6c124a68f8393b99bfcdefb542f7812163ddbf4211d9f2c1e33c1412fbffacef54c161ab665cab9d0cc6c34c0cc30d4fcdd20a8a7becade1cad3bcbafff74
-
Filesize
1.0MB
MD5d1b7f8a59b07c6338d8444d00bf0f878
SHA13f0ff41c92f56b455af45eed497f9b01d61a9ede
SHA25661ae8c8ab283e68d9a64627d22d571894ae0004ccbf9867ef374c6b1e36b4a8b
SHA5120da6c124a68f8393b99bfcdefb542f7812163ddbf4211d9f2c1e33c1412fbffacef54c161ab665cab9d0cc6c34c0cc30d4fcdd20a8a7becade1cad3bcbafff74
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
881KB
MD5a0ae24823f56e29635d9ced209982031
SHA12fb7c4d42358af3e3af51d03b887cadd3e3d7d2f
SHA2560282c7c227c530640707ca0d1b6be07696232d5490dffd739ee8e78ef6a40816
SHA512d73108bd5c1f74c1df5cb220537186794deb92fb09d36b19adee8e7bd90c7da4c44a15e9a29a98745741849f4c760b7f0b6c50b5021381f0ed44e1d00973929d
-
Filesize
881KB
MD5a0ae24823f56e29635d9ced209982031
SHA12fb7c4d42358af3e3af51d03b887cadd3e3d7d2f
SHA2560282c7c227c530640707ca0d1b6be07696232d5490dffd739ee8e78ef6a40816
SHA512d73108bd5c1f74c1df5cb220537186794deb92fb09d36b19adee8e7bd90c7da4c44a15e9a29a98745741849f4c760b7f0b6c50b5021381f0ed44e1d00973929d
-
Filesize
359KB
MD533787be10a8d7d62732ccc115d057e0c
SHA1ea75684652efb65c7a990fe2a818cdd999c8063a
SHA2564487247fc5f9a5787400a4b97a91f97f7e149e1978f9421a66b08d3b3f14c03d
SHA5121472f39a7e6e896666a6750a9e02631050b67625aea2896b1926dd35091924e1cefda9dac203607a665ea6e5b8bdb9d6139e7710c54db74134c8f5b9bc8a0a7e
-
Filesize
359KB
MD533787be10a8d7d62732ccc115d057e0c
SHA1ea75684652efb65c7a990fe2a818cdd999c8063a
SHA2564487247fc5f9a5787400a4b97a91f97f7e149e1978f9421a66b08d3b3f14c03d
SHA5121472f39a7e6e896666a6750a9e02631050b67625aea2896b1926dd35091924e1cefda9dac203607a665ea6e5b8bdb9d6139e7710c54db74134c8f5b9bc8a0a7e
-
Filesize
694KB
MD5316fbdf7001a3aa8c6098007f97774e8
SHA1af6a2cb607aa3ec91cb7bd5e75d3f9856dc58267
SHA256a1ab8b1cf71dbbf52730fdaca15348b11719e9702e46cb653a56d6971580f33b
SHA512e6e76e423a0c7d2a40776fa8373dbc39817d9fe562cfdf03f3d25c527c19105d172ae457e080796b53bfeab8db94d9800c983b5b428a0b890c0b61e21289719e
-
Filesize
694KB
MD5316fbdf7001a3aa8c6098007f97774e8
SHA1af6a2cb607aa3ec91cb7bd5e75d3f9856dc58267
SHA256a1ab8b1cf71dbbf52730fdaca15348b11719e9702e46cb653a56d6971580f33b
SHA512e6e76e423a0c7d2a40776fa8373dbc39817d9fe562cfdf03f3d25c527c19105d172ae457e080796b53bfeab8db94d9800c983b5b428a0b890c0b61e21289719e
-
Filesize
277KB
MD5a40b760a8b062151ae019acadedc2aa9
SHA1a9a2171f8ddab5f4d6af3c561916e72f0876039d
SHA2567ee7de02c0eaa3ee5b3c9a5967287d59ab5f7e123171bf52ada7116e1091e60c
SHA512027f37fbc5c829566151c12dd7be0eefbc4afb09accf1df30d955eee86f5f3bbb304b76800f2e4579358756ef0ddd603f09a28e69b359c030a4886790f170da8
-
Filesize
277KB
MD5a40b760a8b062151ae019acadedc2aa9
SHA1a9a2171f8ddab5f4d6af3c561916e72f0876039d
SHA2567ee7de02c0eaa3ee5b3c9a5967287d59ab5f7e123171bf52ada7116e1091e60c
SHA512027f37fbc5c829566151c12dd7be0eefbc4afb09accf1df30d955eee86f5f3bbb304b76800f2e4579358756ef0ddd603f09a28e69b359c030a4886790f170da8
-
Filesize
414KB
MD52f4fd9629682a8220499ecb706bb45c5
SHA1768a80bad4f27878f4d34ae3a46f136a8da089a2
SHA256f20c649c109af5d1ed1ff8ab1ec688df088f9a29babc9cc5767779d2f7223d9c
SHA512bce96a0d03b3b1216b9d9bd2b354a3268be775b67998108de33f6110bfadb398b581bfd84ac4b72a6664e2cfce89fe29cfa4cffe6bf27a24f206670314194b1f
-
Filesize
414KB
MD52f4fd9629682a8220499ecb706bb45c5
SHA1768a80bad4f27878f4d34ae3a46f136a8da089a2
SHA256f20c649c109af5d1ed1ff8ab1ec688df088f9a29babc9cc5767779d2f7223d9c
SHA512bce96a0d03b3b1216b9d9bd2b354a3268be775b67998108de33f6110bfadb398b581bfd84ac4b72a6664e2cfce89fe29cfa4cffe6bf27a24f206670314194b1f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5f36f31d931c53bb6d1de29a93527b3e5
SHA16284c294cfb129297962954a78bb00609941c315
SHA256e292388167832202ad48326a7e730633be8aff5a709201bf35f59c7d195e7e38
SHA512db439f39a05a97640b366e3ef84178456801b5c7ccc0aa59024b27ff1303dd57357914ec0c9c1de98c62bec30b9c5e2977cec78082ed0764c18c6b6b7d33c97d
-
Filesize
359KB
MD5f36f31d931c53bb6d1de29a93527b3e5
SHA16284c294cfb129297962954a78bb00609941c315
SHA256e292388167832202ad48326a7e730633be8aff5a709201bf35f59c7d195e7e38
SHA512db439f39a05a97640b366e3ef84178456801b5c7ccc0aa59024b27ff1303dd57357914ec0c9c1de98c62bec30b9c5e2977cec78082ed0764c18c6b6b7d33c97d
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
204KB
MD5d2622752e39ebe03e48351887e7ba2c7
SHA18377db1a7994b5101d4285126cbb2e8e7e4e82e3
SHA256c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0
SHA512f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5