Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 08:07
Static task
static1
General
-
Target
bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe
-
Size
828KB
-
MD5
f46e4d2ae9aa7205b04c3f4e279efdf3
-
SHA1
e0b72941762c9b7c1d4e6cab40ac97e0e701426d
-
SHA256
bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864
-
SHA512
bef89e18fe67e7cd829bf13254983cc59befb3df4662450678cb78db344fc3d2043e057b94b962a1e1e9ba0831d3b5a056f68f68520d2e690c03e77755e6709f
-
SSDEEP
12288:my90Fsi11+ETI4atwY8PfXLkAfOBblPSXTg9GbawmFTVWUTc03I6fFcnblp3dn3S:my54+t/RofjXTwGO26mNnC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it684830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it684830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it684830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it684830.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it684830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it684830.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr371995.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 220 ziLa3488.exe 1340 zidD8757.exe 640 it684830.exe 4876 jr662123.exe 4048 kp731034.exe 1840 lr371995.exe 3084 oneetx.exe 3744 oneetx.exe 4320 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3840 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it684830.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLa3488.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidD8757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidD8757.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLa3488.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 1044 4876 WerFault.exe 91 872 1840 WerFault.exe 98 3924 1840 WerFault.exe 98 3320 1840 WerFault.exe 98 5096 1840 WerFault.exe 98 2284 1840 WerFault.exe 98 3840 1840 WerFault.exe 98 3800 1840 WerFault.exe 98 3008 1840 WerFault.exe 98 3776 1840 WerFault.exe 98 2736 1840 WerFault.exe 98 2180 3084 WerFault.exe 118 4976 3084 WerFault.exe 118 404 3084 WerFault.exe 118 436 3084 WerFault.exe 118 3512 3084 WerFault.exe 118 4804 3084 WerFault.exe 118 2732 3084 WerFault.exe 118 920 3084 WerFault.exe 118 2128 3084 WerFault.exe 118 5020 3084 WerFault.exe 118 1908 3084 WerFault.exe 118 1452 3084 WerFault.exe 118 2608 3084 WerFault.exe 118 224 3084 WerFault.exe 118 788 3744 WerFault.exe 159 3216 3084 WerFault.exe 118 4032 3084 WerFault.exe 118 4312 3084 WerFault.exe 118 4828 4320 WerFault.exe 169 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 640 it684830.exe 640 it684830.exe 4876 jr662123.exe 4876 jr662123.exe 4048 kp731034.exe 4048 kp731034.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 640 it684830.exe Token: SeDebugPrivilege 4876 jr662123.exe Token: SeDebugPrivilege 4048 kp731034.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 lr371995.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3324 wrote to memory of 220 3324 bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe 84 PID 3324 wrote to memory of 220 3324 bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe 84 PID 3324 wrote to memory of 220 3324 bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe 84 PID 220 wrote to memory of 1340 220 ziLa3488.exe 85 PID 220 wrote to memory of 1340 220 ziLa3488.exe 85 PID 220 wrote to memory of 1340 220 ziLa3488.exe 85 PID 1340 wrote to memory of 640 1340 zidD8757.exe 86 PID 1340 wrote to memory of 640 1340 zidD8757.exe 86 PID 1340 wrote to memory of 4876 1340 zidD8757.exe 91 PID 1340 wrote to memory of 4876 1340 zidD8757.exe 91 PID 1340 wrote to memory of 4876 1340 zidD8757.exe 91 PID 220 wrote to memory of 4048 220 ziLa3488.exe 97 PID 220 wrote to memory of 4048 220 ziLa3488.exe 97 PID 220 wrote to memory of 4048 220 ziLa3488.exe 97 PID 3324 wrote to memory of 1840 3324 bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe 98 PID 3324 wrote to memory of 1840 3324 bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe 98 PID 3324 wrote to memory of 1840 3324 bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe 98 PID 1840 wrote to memory of 3084 1840 lr371995.exe 118 PID 1840 wrote to memory of 3084 1840 lr371995.exe 118 PID 1840 wrote to memory of 3084 1840 lr371995.exe 118 PID 3084 wrote to memory of 3456 3084 oneetx.exe 135 PID 3084 wrote to memory of 3456 3084 oneetx.exe 135 PID 3084 wrote to memory of 3456 3084 oneetx.exe 135 PID 3084 wrote to memory of 864 3084 oneetx.exe 141 PID 3084 wrote to memory of 864 3084 oneetx.exe 141 PID 3084 wrote to memory of 864 3084 oneetx.exe 141 PID 864 wrote to memory of 2380 864 cmd.exe 145 PID 864 wrote to memory of 2380 864 cmd.exe 145 PID 864 wrote to memory of 2380 864 cmd.exe 145 PID 864 wrote to memory of 1704 864 cmd.exe 146 PID 864 wrote to memory of 1704 864 cmd.exe 146 PID 864 wrote to memory of 1704 864 cmd.exe 146 PID 864 wrote to memory of 3444 864 cmd.exe 147 PID 864 wrote to memory of 3444 864 cmd.exe 147 PID 864 wrote to memory of 3444 864 cmd.exe 147 PID 864 wrote to memory of 4876 864 cmd.exe 148 PID 864 wrote to memory of 4876 864 cmd.exe 148 PID 864 wrote to memory of 4876 864 cmd.exe 148 PID 864 wrote to memory of 4152 864 cmd.exe 149 PID 864 wrote to memory of 4152 864 cmd.exe 149 PID 864 wrote to memory of 4152 864 cmd.exe 149 PID 864 wrote to memory of 4852 864 cmd.exe 150 PID 864 wrote to memory of 4852 864 cmd.exe 150 PID 864 wrote to memory of 4852 864 cmd.exe 150 PID 3084 wrote to memory of 3840 3084 oneetx.exe 164 PID 3084 wrote to memory of 3840 3084 oneetx.exe 164 PID 3084 wrote to memory of 3840 3084 oneetx.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe"C:\Users\Admin\AppData\Local\Temp\bf27ff151c3d47b8b7e41eed14ea5bb981aa7d5b2d5323ca69eae5f35b5bf864.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLa3488.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLa3488.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidD8757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidD8757.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it684830.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it684830.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr662123.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr662123.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 13245⤵
- Program crash
PID:1044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp731034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp731034.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371995.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 7123⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 7963⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 8643⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 9563⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 9723⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 9723⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 12243⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 12403⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 13203⤵
- Program crash
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 7084⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 8724⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 8804⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 10564⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 10764⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 10964⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 11044⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 9964⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 12884⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 13164⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 13444⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 7724⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 7444⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 11204⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 16084⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 11204⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 16204⤵
- Program crash
PID:4312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 13643⤵
- Program crash
PID:2736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4876 -ip 48761⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1840 -ip 18401⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1840 -ip 18401⤵PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1840 -ip 18401⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1840 -ip 18401⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1840 -ip 18401⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1840 -ip 18401⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1840 -ip 18401⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1840 -ip 18401⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1840 -ip 18401⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1840 -ip 18401⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3084 -ip 30841⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3084 -ip 30841⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3084 -ip 30841⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3084 -ip 30841⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3084 -ip 30841⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3084 -ip 30841⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3084 -ip 30841⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3084 -ip 30841⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3084 -ip 30841⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3084 -ip 30841⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3084 -ip 30841⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3084 -ip 30841⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3084 -ip 30841⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3084 -ip 30841⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 4242⤵
- Program crash
PID:788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3744 -ip 37441⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3084 -ip 30841⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3084 -ip 30841⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3084 -ip 30841⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 4282⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4320 -ip 43201⤵PID:3864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
568KB
MD5ac50fab638fe18e9f92e04550d4b495a
SHA1758cb03d42df29e981e511a4ba96122250c792bc
SHA256cb9e7d2baa3a0a88f15386b379dc6f6e471242920100dc86bea97299199fa9b5
SHA51261d15aca97ed3ffe3f68d506f96ffc08e0029e0b5ee514892dfceb7c873305d1d59f19707a8ad9b11c1c0202534f7322345d3a5781fce7aac3c93d5438f87f5c
-
Filesize
568KB
MD5ac50fab638fe18e9f92e04550d4b495a
SHA1758cb03d42df29e981e511a4ba96122250c792bc
SHA256cb9e7d2baa3a0a88f15386b379dc6f6e471242920100dc86bea97299199fa9b5
SHA51261d15aca97ed3ffe3f68d506f96ffc08e0029e0b5ee514892dfceb7c873305d1d59f19707a8ad9b11c1c0202534f7322345d3a5781fce7aac3c93d5438f87f5c
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
414KB
MD59653d8c0d69e4e747602827ad0dfada9
SHA1587563d9c14d487153739427fc04e7af9ebf2fe1
SHA2567376a4cd06aa211b3cc32fa48adb4131f51c8f15b1f2c58e022d568bfa7b3a63
SHA512de047b30c2a5e7f7740181988d3e78bed8b6bfeb9ad9acae41fc366dc5f875183b0bcc96b95a5ae9e9c7d23807ae3429ae7d34ecb375191534a056f81337652d
-
Filesize
414KB
MD59653d8c0d69e4e747602827ad0dfada9
SHA1587563d9c14d487153739427fc04e7af9ebf2fe1
SHA2567376a4cd06aa211b3cc32fa48adb4131f51c8f15b1f2c58e022d568bfa7b3a63
SHA512de047b30c2a5e7f7740181988d3e78bed8b6bfeb9ad9acae41fc366dc5f875183b0bcc96b95a5ae9e9c7d23807ae3429ae7d34ecb375191534a056f81337652d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD528081ad32ced271963cbd122bff6106f
SHA1e3123a54648efe096e04bf1a394ebb1529d4c018
SHA2566370754e542b7d3fca4029e8722521f7929d47377ba668cb6377ea5f53409049
SHA51212d0e3a4193f7fca375f6591d6e3106dbfe911943f2d04e8915339a4349e73cd4c954b0f0ef2dc6a21a6171bfce2a75b2e23a9385e043c1f8e2fbb7fcf100129
-
Filesize
359KB
MD528081ad32ced271963cbd122bff6106f
SHA1e3123a54648efe096e04bf1a394ebb1529d4c018
SHA2566370754e542b7d3fca4029e8722521f7929d47377ba668cb6377ea5f53409049
SHA51212d0e3a4193f7fca375f6591d6e3106dbfe911943f2d04e8915339a4349e73cd4c954b0f0ef2dc6a21a6171bfce2a75b2e23a9385e043c1f8e2fbb7fcf100129
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
256KB
MD51ba00c85c1879578df4011207a5bce9a
SHA1bbaa8eb741d670b3e1fac1e17e5f7de63a3592c2
SHA25611828ca6685b39e1c53b78d65fa1582c8cd385b12fdf74b121c1c9fac718c0b4
SHA512ada3638da343734e9e8e067bbb94b3a296a479758519588e6d0b5a8f0a497787ae6934a08581a3bde300a4ef629325d01ad4d3423c2763218610c635cf50535f
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5