Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 11:25
Static task
static1
General
-
Target
63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe
-
Size
965KB
-
MD5
dffc854ef2ec8f14b8d1474fa0880691
-
SHA1
f238efeb865a4aee81630aeb0d85337e40b22880
-
SHA256
63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e
-
SHA512
af48575d9a4d9c1dd34bffdb00ce5076d779f84568f24b094927d5676bd68df44f66bcfd60406f3ee8a8bbcb721813eb178c3f075e852f78b8fc2eecbc6779b5
-
SSDEEP
24576:eyouLfzOx6tOXR5w7wfO59dAG6Nylr2KSeoHNnCON:thfo6YROkfQAMrN/ACO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr579454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr579454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr579454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr579454.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr579454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr579454.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si280883.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1280 un901759.exe 2340 un572327.exe 4272 pr579454.exe 5056 qu370439.exe 3380 rk729240.exe 1564 si280883.exe 2020 oneetx.exe 3744 oneetx.exe 1792 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr579454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr579454.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un572327.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un572327.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un901759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un901759.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 3096 4272 WerFault.exe 79 2628 5056 WerFault.exe 84 3660 1564 WerFault.exe 90 1788 1564 WerFault.exe 90 3236 1564 WerFault.exe 90 396 1564 WerFault.exe 90 4896 1564 WerFault.exe 90 1956 1564 WerFault.exe 90 3788 1564 WerFault.exe 90 4964 1564 WerFault.exe 90 5084 1564 WerFault.exe 90 4860 1564 WerFault.exe 90 4840 2020 WerFault.exe 109 1096 2020 WerFault.exe 109 640 2020 WerFault.exe 109 2868 2020 WerFault.exe 109 2444 2020 WerFault.exe 109 1704 2020 WerFault.exe 109 100 2020 WerFault.exe 109 4656 2020 WerFault.exe 109 4004 2020 WerFault.exe 109 5060 2020 WerFault.exe 109 644 2020 WerFault.exe 109 4428 2020 WerFault.exe 109 900 2020 WerFault.exe 109 4172 2020 WerFault.exe 109 5048 3744 WerFault.exe 150 3420 2020 WerFault.exe 109 4708 2020 WerFault.exe 109 4000 2020 WerFault.exe 109 1368 1792 WerFault.exe 160 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4272 pr579454.exe 4272 pr579454.exe 5056 qu370439.exe 5056 qu370439.exe 3380 rk729240.exe 3380 rk729240.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4272 pr579454.exe Token: SeDebugPrivilege 5056 qu370439.exe Token: SeDebugPrivilege 3380 rk729240.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1564 si280883.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1280 1220 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe 77 PID 1220 wrote to memory of 1280 1220 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe 77 PID 1220 wrote to memory of 1280 1220 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe 77 PID 1280 wrote to memory of 2340 1280 un901759.exe 78 PID 1280 wrote to memory of 2340 1280 un901759.exe 78 PID 1280 wrote to memory of 2340 1280 un901759.exe 78 PID 2340 wrote to memory of 4272 2340 un572327.exe 79 PID 2340 wrote to memory of 4272 2340 un572327.exe 79 PID 2340 wrote to memory of 4272 2340 un572327.exe 79 PID 2340 wrote to memory of 5056 2340 un572327.exe 84 PID 2340 wrote to memory of 5056 2340 un572327.exe 84 PID 2340 wrote to memory of 5056 2340 un572327.exe 84 PID 1280 wrote to memory of 3380 1280 un901759.exe 88 PID 1280 wrote to memory of 3380 1280 un901759.exe 88 PID 1280 wrote to memory of 3380 1280 un901759.exe 88 PID 1220 wrote to memory of 1564 1220 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe 90 PID 1220 wrote to memory of 1564 1220 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe 90 PID 1220 wrote to memory of 1564 1220 63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe 90 PID 1564 wrote to memory of 2020 1564 si280883.exe 109 PID 1564 wrote to memory of 2020 1564 si280883.exe 109 PID 1564 wrote to memory of 2020 1564 si280883.exe 109 PID 2020 wrote to memory of 1116 2020 oneetx.exe 126 PID 2020 wrote to memory of 1116 2020 oneetx.exe 126 PID 2020 wrote to memory of 1116 2020 oneetx.exe 126 PID 2020 wrote to memory of 1960 2020 oneetx.exe 132 PID 2020 wrote to memory of 1960 2020 oneetx.exe 132 PID 2020 wrote to memory of 1960 2020 oneetx.exe 132 PID 1960 wrote to memory of 1180 1960 cmd.exe 136 PID 1960 wrote to memory of 1180 1960 cmd.exe 136 PID 1960 wrote to memory of 1180 1960 cmd.exe 136 PID 1960 wrote to memory of 2488 1960 cmd.exe 137 PID 1960 wrote to memory of 2488 1960 cmd.exe 137 PID 1960 wrote to memory of 2488 1960 cmd.exe 137 PID 1960 wrote to memory of 1364 1960 cmd.exe 138 PID 1960 wrote to memory of 1364 1960 cmd.exe 138 PID 1960 wrote to memory of 1364 1960 cmd.exe 138 PID 1960 wrote to memory of 4176 1960 cmd.exe 139 PID 1960 wrote to memory of 4176 1960 cmd.exe 139 PID 1960 wrote to memory of 4176 1960 cmd.exe 139 PID 1960 wrote to memory of 2440 1960 cmd.exe 140 PID 1960 wrote to memory of 2440 1960 cmd.exe 140 PID 1960 wrote to memory of 2440 1960 cmd.exe 140 PID 1960 wrote to memory of 2404 1960 cmd.exe 141 PID 1960 wrote to memory of 2404 1960 cmd.exe 141 PID 1960 wrote to memory of 2404 1960 cmd.exe 141 PID 2020 wrote to memory of 2228 2020 oneetx.exe 155 PID 2020 wrote to memory of 2228 2020 oneetx.exe 155 PID 2020 wrote to memory of 2228 2020 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe"C:\Users\Admin\AppData\Local\Temp\63c89581bba92ba36ba510e64c4508828d4300020cc4228225ee467cefbfe36e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un572327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un572327.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr579454.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr579454.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 10805⤵
- Program crash
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu370439.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu370439.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 14565⤵
- Program crash
PID:2628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk729240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk729240.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280883.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 7083⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 7843⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 8563⤵
- Program crash
PID:3236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 9723⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 8603⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 9883⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 12243⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 12163⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 13243⤵
- Program crash
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 7044⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 8604⤵
- Program crash
PID:1096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 8924⤵
- Program crash
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 10524⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 10724⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 10724⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 11084⤵
- Program crash
PID:100
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 9924⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 12924⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 13764⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 13364⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 6924⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 13684⤵
- Program crash
PID:900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 11564⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 11484⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 16044⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 16724⤵
- Program crash
PID:4000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 13643⤵
- Program crash
PID:4860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4272 -ip 42721⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5056 -ip 50561⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1564 -ip 15641⤵PID:3772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1564 -ip 15641⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1564 -ip 15641⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1564 -ip 15641⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1564 -ip 15641⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1564 -ip 15641⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1564 -ip 15641⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1564 -ip 15641⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1564 -ip 15641⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1564 -ip 15641⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2020 -ip 20201⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2020 -ip 20201⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2020 -ip 20201⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2020 -ip 20201⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2020 -ip 20201⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2020 -ip 20201⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2020 -ip 20201⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2020 -ip 20201⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2020 -ip 20201⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2020 -ip 20201⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2020 -ip 20201⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2020 -ip 20201⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2020 -ip 20201⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2020 -ip 20201⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 4202⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3744 -ip 37441⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2020 -ip 20201⤵PID:1168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2020 -ip 20201⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2020 -ip 20201⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 4282⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1792 -ip 17921⤵PID:2700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
705KB
MD521b6f6865e0e048a6675b7d53c71644f
SHA18f889c2d467e410f1e2babda5472712bd9db4e17
SHA256eff730511f8edb36a95d45e006edbcbecaaf1351afa1ae6164b0d83547212cfe
SHA51272554a288eb6a5e2cbdba2509506203482b1b6c47fe162b78568dbf70b2ae2a569d14a9d2ba8821abca5915b80452291fd0a5661544cf42c0f35351b9f9ad9f4
-
Filesize
705KB
MD521b6f6865e0e048a6675b7d53c71644f
SHA18f889c2d467e410f1e2babda5472712bd9db4e17
SHA256eff730511f8edb36a95d45e006edbcbecaaf1351afa1ae6164b0d83547212cfe
SHA51272554a288eb6a5e2cbdba2509506203482b1b6c47fe162b78568dbf70b2ae2a569d14a9d2ba8821abca5915b80452291fd0a5661544cf42c0f35351b9f9ad9f4
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
552KB
MD5ea2c9758243c156fea7a5c9fdf4bfb0f
SHA1ba7feec4c674a1bd54ef0393b467d77cf0a9eb78
SHA2567854297a81413868660d681103509bddb1baefd2d1d49d63df7ff9f99d9b262c
SHA51281f711d84919197630536baf1a320be5db6cc78bc09b6dfea6d58cf331b53da631426956e01182400545aee2647202d5b91c4ddcee9728014d4e18c4c3b463b3
-
Filesize
552KB
MD5ea2c9758243c156fea7a5c9fdf4bfb0f
SHA1ba7feec4c674a1bd54ef0393b467d77cf0a9eb78
SHA2567854297a81413868660d681103509bddb1baefd2d1d49d63df7ff9f99d9b262c
SHA51281f711d84919197630536baf1a320be5db6cc78bc09b6dfea6d58cf331b53da631426956e01182400545aee2647202d5b91c4ddcee9728014d4e18c4c3b463b3
-
Filesize
278KB
MD5e89d7de59871d5ef34698a35dfdc491b
SHA1c5f7dad69bb92f8aa6f554a57d4e98e6f4540621
SHA256dd30d7c9838c4c5e2f03b1c73152b1da63b16952bfea03297136859a4a04c4a0
SHA5125da77648f18bb43685a657fc815dcf7bf4a607cc005db9851440bc2fa108c01acc96f51b69098f18d50d2329c5b74c4145602ce83cd20e0d7f19f976767caefe
-
Filesize
278KB
MD5e89d7de59871d5ef34698a35dfdc491b
SHA1c5f7dad69bb92f8aa6f554a57d4e98e6f4540621
SHA256dd30d7c9838c4c5e2f03b1c73152b1da63b16952bfea03297136859a4a04c4a0
SHA5125da77648f18bb43685a657fc815dcf7bf4a607cc005db9851440bc2fa108c01acc96f51b69098f18d50d2329c5b74c4145602ce83cd20e0d7f19f976767caefe
-
Filesize
360KB
MD59a57358e0aaa3ae8776e2474e25ff9e2
SHA149f267cbaa6f03ca8f508db383f449c5c6aab1b2
SHA25647b656560aa0adb4f767799f245daded481c9a90bd0025f6c8acf0b75f4e5ef6
SHA5128d2034e18a730dbb630d59ebf8b070ae0ad87126ceab448d3f4a4bb1cb0e78056d9c91da42c63751452bda4b57de261c7b2b3f682a6898bfdb0b656908a33702
-
Filesize
360KB
MD59a57358e0aaa3ae8776e2474e25ff9e2
SHA149f267cbaa6f03ca8f508db383f449c5c6aab1b2
SHA25647b656560aa0adb4f767799f245daded481c9a90bd0025f6c8acf0b75f4e5ef6
SHA5128d2034e18a730dbb630d59ebf8b070ae0ad87126ceab448d3f4a4bb1cb0e78056d9c91da42c63751452bda4b57de261c7b2b3f682a6898bfdb0b656908a33702
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
256KB
MD5243f106eb5c0c520b47744a1681d8d84
SHA1c403f4fc286947857e89a1dfa6e39aa403a530c8
SHA2562b8455a9b3933e1f7655f055cf0ba27932ebc057aad3e2dd9d785429cb696761
SHA512281682454a770286bb364b0c3064df40f35ae30660a0aa43975d8f9c5303a5de652a289cb823275693701e73d12e35740f53266ea8359f81b124debb31de2f93
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5