Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 08:26
Static task
static1
General
-
Target
ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe
-
Size
827KB
-
MD5
46d5e811e23de5a35e2c554f4b49f7cf
-
SHA1
dbfb90fa61b813da21b989349b6f32ec339cbff9
-
SHA256
ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53
-
SHA512
1a6ef62d47836ac801b9eb0fc2827ecd62b4f8eda51616d1bcfaffc55e2bd6b7f9c509d70a37d7d15c13cfd2b6178d9a9c2667811a1e3c01748d2c7bb990ea91
-
SSDEEP
12288:9y90pbsLe/2nkPNWpt3iJ10HCcTvBpgxKwc/WYyxjZD+PFOEzB6bDZ+O93LbT:9yab8eunkPctSJvOLgKvzAkIn
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it206693.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it206693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it206693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it206693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it206693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it206693.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr717138.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2376 zieu6224.exe 1464 ziRF0681.exe 628 it206693.exe 2704 jr268421.exe 4688 kp908872.exe 2796 lr717138.exe 3320 oneetx.exe 3096 oneetx.exe 756 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4332 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it206693.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieu6224.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRF0681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziRF0681.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieu6224.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 944 2704 WerFault.exe 93 5036 2796 WerFault.exe 99 1456 2796 WerFault.exe 99 4128 2796 WerFault.exe 99 3684 2796 WerFault.exe 99 1856 2796 WerFault.exe 99 3772 2796 WerFault.exe 99 1392 2796 WerFault.exe 99 3016 2796 WerFault.exe 99 1168 2796 WerFault.exe 99 4708 2796 WerFault.exe 99 2040 3320 WerFault.exe 118 4116 3320 WerFault.exe 118 3840 3320 WerFault.exe 118 3188 3320 WerFault.exe 118 2584 3320 WerFault.exe 118 4364 3320 WerFault.exe 118 4816 3320 WerFault.exe 118 2836 3320 WerFault.exe 118 3068 3320 WerFault.exe 118 4464 3320 WerFault.exe 118 5040 3320 WerFault.exe 118 5004 3320 WerFault.exe 118 5052 3320 WerFault.exe 118 2844 3320 WerFault.exe 118 3396 3096 WerFault.exe 159 4604 3320 WerFault.exe 118 4272 3320 WerFault.exe 118 2060 3320 WerFault.exe 118 1508 756 WerFault.exe 169 4548 3320 WerFault.exe 118 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 628 it206693.exe 628 it206693.exe 2704 jr268421.exe 2704 jr268421.exe 4688 kp908872.exe 4688 kp908872.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 628 it206693.exe Token: SeDebugPrivilege 2704 jr268421.exe Token: SeDebugPrivilege 4688 kp908872.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 lr717138.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2376 4548 ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe 84 PID 4548 wrote to memory of 2376 4548 ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe 84 PID 4548 wrote to memory of 2376 4548 ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe 84 PID 2376 wrote to memory of 1464 2376 zieu6224.exe 85 PID 2376 wrote to memory of 1464 2376 zieu6224.exe 85 PID 2376 wrote to memory of 1464 2376 zieu6224.exe 85 PID 1464 wrote to memory of 628 1464 ziRF0681.exe 86 PID 1464 wrote to memory of 628 1464 ziRF0681.exe 86 PID 1464 wrote to memory of 2704 1464 ziRF0681.exe 93 PID 1464 wrote to memory of 2704 1464 ziRF0681.exe 93 PID 1464 wrote to memory of 2704 1464 ziRF0681.exe 93 PID 2376 wrote to memory of 4688 2376 zieu6224.exe 97 PID 2376 wrote to memory of 4688 2376 zieu6224.exe 97 PID 2376 wrote to memory of 4688 2376 zieu6224.exe 97 PID 4548 wrote to memory of 2796 4548 ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe 99 PID 4548 wrote to memory of 2796 4548 ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe 99 PID 4548 wrote to memory of 2796 4548 ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe 99 PID 2796 wrote to memory of 3320 2796 lr717138.exe 118 PID 2796 wrote to memory of 3320 2796 lr717138.exe 118 PID 2796 wrote to memory of 3320 2796 lr717138.exe 118 PID 3320 wrote to memory of 4912 3320 oneetx.exe 135 PID 3320 wrote to memory of 4912 3320 oneetx.exe 135 PID 3320 wrote to memory of 4912 3320 oneetx.exe 135 PID 3320 wrote to memory of 3956 3320 oneetx.exe 141 PID 3320 wrote to memory of 3956 3320 oneetx.exe 141 PID 3320 wrote to memory of 3956 3320 oneetx.exe 141 PID 3956 wrote to memory of 532 3956 cmd.exe 144 PID 3956 wrote to memory of 532 3956 cmd.exe 144 PID 3956 wrote to memory of 532 3956 cmd.exe 144 PID 3956 wrote to memory of 2488 3956 cmd.exe 146 PID 3956 wrote to memory of 2488 3956 cmd.exe 146 PID 3956 wrote to memory of 2488 3956 cmd.exe 146 PID 3956 wrote to memory of 3728 3956 cmd.exe 147 PID 3956 wrote to memory of 3728 3956 cmd.exe 147 PID 3956 wrote to memory of 3728 3956 cmd.exe 147 PID 3956 wrote to memory of 632 3956 cmd.exe 149 PID 3956 wrote to memory of 632 3956 cmd.exe 149 PID 3956 wrote to memory of 632 3956 cmd.exe 149 PID 3956 wrote to memory of 1632 3956 cmd.exe 148 PID 3956 wrote to memory of 1632 3956 cmd.exe 148 PID 3956 wrote to memory of 1632 3956 cmd.exe 148 PID 3956 wrote to memory of 2016 3956 cmd.exe 150 PID 3956 wrote to memory of 2016 3956 cmd.exe 150 PID 3956 wrote to memory of 2016 3956 cmd.exe 150 PID 3320 wrote to memory of 4332 3320 oneetx.exe 166 PID 3320 wrote to memory of 4332 3320 oneetx.exe 166 PID 3320 wrote to memory of 4332 3320 oneetx.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe"C:\Users\Admin\AppData\Local\Temp\ab3d509ba3e94533be85325886df3272b56597fa374051038bc0228ff8690a53.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieu6224.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieu6224.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRF0681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRF0681.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it206693.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it206693.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr268421.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr268421.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 17925⤵
- Program crash
PID:944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp908872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp908872.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr717138.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr717138.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 7203⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 7883⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 8723⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 8243⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 9803⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 9803⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 12203⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 12723⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 13203⤵
- Program crash
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 7084⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 8404⤵
- Program crash
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 9164⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 10564⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 10644⤵
- Program crash
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 11124⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 11084⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 9964⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 7804⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 13204⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 7884⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 6964⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 13404⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 14724⤵
- Program crash
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 10964⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 16884⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 16484⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 17044⤵
- Program crash
PID:4548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 13683⤵
- Program crash
PID:4708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2704 -ip 27041⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2796 -ip 27961⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2796 -ip 27961⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2796 -ip 27961⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2796 -ip 27961⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2796 -ip 27961⤵PID:844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2796 -ip 27961⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2796 -ip 27961⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2796 -ip 27961⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2796 -ip 27961⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2796 -ip 27961⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3320 -ip 33201⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3320 -ip 33201⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3320 -ip 33201⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3320 -ip 33201⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3320 -ip 33201⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3320 -ip 33201⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3320 -ip 33201⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3320 -ip 33201⤵PID:236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3320 -ip 33201⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3320 -ip 33201⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3320 -ip 33201⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3320 -ip 33201⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3320 -ip 33201⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3320 -ip 33201⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 4242⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3096 -ip 30961⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3320 -ip 33201⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3320 -ip 33201⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3320 -ip 33201⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 4242⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 756 -ip 7561⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3320 -ip 33201⤵PID:2796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
568KB
MD5093e2ba03fada8fc0678b4e7899c81ca
SHA12fc6ec64d829393f0037e168682fe924052e95ca
SHA25656ce34453ae4fb568c2e4c37c34d395831a2ced64eecd3c64cf4668afb7371f2
SHA5129c45fe79b1068bdb22738cd6fd54ee806c59bdf50b90372340d59a0ef0ea2f51032c1695573380cf7bdf8f33a969929d0f2b91df3ad104cda250af9abc688246
-
Filesize
568KB
MD5093e2ba03fada8fc0678b4e7899c81ca
SHA12fc6ec64d829393f0037e168682fe924052e95ca
SHA25656ce34453ae4fb568c2e4c37c34d395831a2ced64eecd3c64cf4668afb7371f2
SHA5129c45fe79b1068bdb22738cd6fd54ee806c59bdf50b90372340d59a0ef0ea2f51032c1695573380cf7bdf8f33a969929d0f2b91df3ad104cda250af9abc688246
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
414KB
MD54fcc0e4c6ebf8a297e29235bc48f17a9
SHA1185f6dd2570d681d48ccb081657420fbaec72240
SHA256a03cc1eab8742d48994527b61060deba4e4385e51a42f93cd1d34b28390710ae
SHA51220708ee9597c4552fa7d0a4fa9ede3f7a7b0301ae10072d6f54abc348a9d5983d6e5f18feaa66252aaa2c14b04f76fe744984bb734bd236ddc5cb8eee2e7e22e
-
Filesize
414KB
MD54fcc0e4c6ebf8a297e29235bc48f17a9
SHA1185f6dd2570d681d48ccb081657420fbaec72240
SHA256a03cc1eab8742d48994527b61060deba4e4385e51a42f93cd1d34b28390710ae
SHA51220708ee9597c4552fa7d0a4fa9ede3f7a7b0301ae10072d6f54abc348a9d5983d6e5f18feaa66252aaa2c14b04f76fe744984bb734bd236ddc5cb8eee2e7e22e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5d12fd5ae06dae0c8008fb863ae93d3c2
SHA122f62828b7c04843828fc0c468a135460419ee21
SHA256327c1bcc3754eb01306b4d354291d802caf4aa6b68231bcb9ec2c7618ec5698b
SHA512b07009c04b9b9ca479cc499b7cf871a790d6e0afb1d814a7af6b1093eef8a948b069b08603d7318e6c4226cd3bfa2f1a34a0ab1193ddc3d47f0e52a51a94a8c1
-
Filesize
359KB
MD5d12fd5ae06dae0c8008fb863ae93d3c2
SHA122f62828b7c04843828fc0c468a135460419ee21
SHA256327c1bcc3754eb01306b4d354291d802caf4aa6b68231bcb9ec2c7618ec5698b
SHA512b07009c04b9b9ca479cc499b7cf871a790d6e0afb1d814a7af6b1093eef8a948b069b08603d7318e6c4226cd3bfa2f1a34a0ab1193ddc3d47f0e52a51a94a8c1
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
256KB
MD5882d4290d3368c3a3caa7dff7ac88c8c
SHA1d4470b60338218d997295c7a4c416aa67d695589
SHA256a4e6335d3178d922da2e1b78958a306937b6325ea2d391f946da0c48157601fc
SHA51229d8bc958c480d01f5477a6cfc966b4370e3821c2e35dc513345d8dcbb7c6227e91f3a4aca1120a0102dc95921773f6e5a1489cbc03a4fbad55e1876b53418a1
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5