Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 13:31
Static task
static1
General
-
Target
45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe
-
Size
963KB
-
MD5
b71e900ed8600398ffdedaf1e4bc3a1f
-
SHA1
6c0fcc800ec9e5d38af55361b56038efe90342af
-
SHA256
45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e
-
SHA512
f242eb6ae8b43564796a1489c23b816ce3fc203377c8c36e459453d3108ef698d119133354f36d5726bc26b5d26404ef4bb42de8de4912aca2a5fb04077f60ca
-
SSDEEP
24576:uyP9lN2qF8pRWYcdlqPTfqPCOOnZcJlYIdQIqR:9F1KWv0DqP1OnZkmIdV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr459765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr459765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr459765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr459765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr459765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr459765.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si774566.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2968 un769458.exe 4808 un339286.exe 2612 pr459765.exe 908 qu586983.exe 4788 rk789928.exe 2596 si774566.exe 4324 oneetx.exe 1936 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr459765.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr459765.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un769458.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un339286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un339286.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un769458.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 5080 2612 WerFault.exe 85 3020 908 WerFault.exe 91 2628 2596 WerFault.exe 95 1108 2596 WerFault.exe 95 4584 2596 WerFault.exe 95 2108 2596 WerFault.exe 95 4720 2596 WerFault.exe 95 5100 2596 WerFault.exe 95 1528 2596 WerFault.exe 95 3896 2596 WerFault.exe 95 3744 2596 WerFault.exe 95 1016 2596 WerFault.exe 95 3720 4324 WerFault.exe 115 1460 4324 WerFault.exe 115 1400 4324 WerFault.exe 115 1648 4324 WerFault.exe 115 376 4324 WerFault.exe 115 2712 4324 WerFault.exe 115 4380 4324 WerFault.exe 115 1452 4324 WerFault.exe 115 4864 4324 WerFault.exe 115 3808 4324 WerFault.exe 115 1504 4324 WerFault.exe 115 2624 4324 WerFault.exe 115 3600 4324 WerFault.exe 115 1652 4324 WerFault.exe 115 3060 4324 WerFault.exe 115 2204 4324 WerFault.exe 115 4332 1936 WerFault.exe 165 4076 4324 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2612 pr459765.exe 2612 pr459765.exe 908 qu586983.exe 908 qu586983.exe 4788 rk789928.exe 4788 rk789928.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2612 pr459765.exe Token: SeDebugPrivilege 908 qu586983.exe Token: SeDebugPrivilege 4788 rk789928.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 si774566.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2968 4900 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe 83 PID 4900 wrote to memory of 2968 4900 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe 83 PID 4900 wrote to memory of 2968 4900 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe 83 PID 2968 wrote to memory of 4808 2968 un769458.exe 84 PID 2968 wrote to memory of 4808 2968 un769458.exe 84 PID 2968 wrote to memory of 4808 2968 un769458.exe 84 PID 4808 wrote to memory of 2612 4808 un339286.exe 85 PID 4808 wrote to memory of 2612 4808 un339286.exe 85 PID 4808 wrote to memory of 2612 4808 un339286.exe 85 PID 4808 wrote to memory of 908 4808 un339286.exe 91 PID 4808 wrote to memory of 908 4808 un339286.exe 91 PID 4808 wrote to memory of 908 4808 un339286.exe 91 PID 2968 wrote to memory of 4788 2968 un769458.exe 94 PID 2968 wrote to memory of 4788 2968 un769458.exe 94 PID 2968 wrote to memory of 4788 2968 un769458.exe 94 PID 4900 wrote to memory of 2596 4900 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe 95 PID 4900 wrote to memory of 2596 4900 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe 95 PID 4900 wrote to memory of 2596 4900 45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe 95 PID 2596 wrote to memory of 4324 2596 si774566.exe 115 PID 2596 wrote to memory of 4324 2596 si774566.exe 115 PID 2596 wrote to memory of 4324 2596 si774566.exe 115 PID 4324 wrote to memory of 4296 4324 oneetx.exe 135 PID 4324 wrote to memory of 4296 4324 oneetx.exe 135 PID 4324 wrote to memory of 4296 4324 oneetx.exe 135 PID 4324 wrote to memory of 4936 4324 oneetx.exe 141 PID 4324 wrote to memory of 4936 4324 oneetx.exe 141 PID 4324 wrote to memory of 4936 4324 oneetx.exe 141 PID 4936 wrote to memory of 912 4936 cmd.exe 145 PID 4936 wrote to memory of 912 4936 cmd.exe 145 PID 4936 wrote to memory of 912 4936 cmd.exe 145 PID 4936 wrote to memory of 2168 4936 cmd.exe 146 PID 4936 wrote to memory of 2168 4936 cmd.exe 146 PID 4936 wrote to memory of 2168 4936 cmd.exe 146 PID 4936 wrote to memory of 1112 4936 cmd.exe 147 PID 4936 wrote to memory of 1112 4936 cmd.exe 147 PID 4936 wrote to memory of 1112 4936 cmd.exe 147 PID 4936 wrote to memory of 4996 4936 cmd.exe 148 PID 4936 wrote to memory of 4996 4936 cmd.exe 148 PID 4936 wrote to memory of 4996 4936 cmd.exe 148 PID 4936 wrote to memory of 4184 4936 cmd.exe 149 PID 4936 wrote to memory of 4184 4936 cmd.exe 149 PID 4936 wrote to memory of 4184 4936 cmd.exe 149 PID 4936 wrote to memory of 1768 4936 cmd.exe 150 PID 4936 wrote to memory of 1768 4936 cmd.exe 150 PID 4936 wrote to memory of 1768 4936 cmd.exe 150 PID 4324 wrote to memory of 2516 4324 oneetx.exe 162 PID 4324 wrote to memory of 2516 4324 oneetx.exe 162 PID 4324 wrote to memory of 2516 4324 oneetx.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe"C:\Users\Admin\AppData\Local\Temp\45589690d2ed588f22d00cd2376d9bb7f69ce4a68d77394fe870c05fa52a723e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769458.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un339286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un339286.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr459765.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr459765.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 10885⤵
- Program crash
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu586983.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu586983.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 13205⤵
- Program crash
PID:3020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk789928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk789928.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774566.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774566.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 7083⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 7923⤵
- Program crash
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 8563⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 9763⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 8603⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 9683⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 12283⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 12203⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 13243⤵
- Program crash
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7044⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 8164⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 8964⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10524⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10924⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10924⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10524⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10004⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7644⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 13044⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 9044⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7804⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 12524⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 11644⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 15924⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 11804⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 16204⤵
- Program crash
PID:4076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 13563⤵
- Program crash
PID:1016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2612 -ip 26121⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 908 -ip 9081⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2596 -ip 25961⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2596 -ip 25961⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2596 -ip 25961⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2596 -ip 25961⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2596 -ip 25961⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2596 -ip 25961⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2596 -ip 25961⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2596 -ip 25961⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2596 -ip 25961⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2596 -ip 25961⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4324 -ip 43241⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4324 -ip 43241⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4324 -ip 43241⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4324 -ip 43241⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4324 -ip 43241⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4324 -ip 43241⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4324 -ip 43241⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4324 -ip 43241⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4324 -ip 43241⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4324 -ip 43241⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4324 -ip 43241⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4324 -ip 43241⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4324 -ip 43241⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4324 -ip 43241⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4324 -ip 43241⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4324 -ip 43241⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 4282⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1936 -ip 19361⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4324 -ip 43241⤵PID:1528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD54cc92cd42b84308a770e37b3038f572e
SHA1d8988a6ac8c92e21b270e22c576005c1c418ede0
SHA256e301abc7352bb3d89288374a7a07a9976980b55fbb319598bd297355311c9915
SHA512beb197522090690dd16a8523e87ddb5477faa5c66eebe445bdcba96b1704ef4b55392c97c0e9284a8eb756f0e732289bab941a7a585dca5e1c344295fbc0c93e
-
Filesize
256KB
MD54cc92cd42b84308a770e37b3038f572e
SHA1d8988a6ac8c92e21b270e22c576005c1c418ede0
SHA256e301abc7352bb3d89288374a7a07a9976980b55fbb319598bd297355311c9915
SHA512beb197522090690dd16a8523e87ddb5477faa5c66eebe445bdcba96b1704ef4b55392c97c0e9284a8eb756f0e732289bab941a7a585dca5e1c344295fbc0c93e
-
Filesize
704KB
MD5f38e5479b784a805b5220e497e8d002d
SHA19ebcf8a6b0c6160da5e43ec5a2897c793e02d509
SHA2568916f5b4bce1a878da0cb59face3eb32d68f6caff5b350e9704dfefb1a774d11
SHA512d5f3ba0d0e45477cd3d77c7778ae4297c37c75c41ac22870f8aa0098bc7ad21369a544e13edcda79a7b12b554ce1780aa65d10a5633d8cbb6f29b9db3b23bae0
-
Filesize
704KB
MD5f38e5479b784a805b5220e497e8d002d
SHA19ebcf8a6b0c6160da5e43ec5a2897c793e02d509
SHA2568916f5b4bce1a878da0cb59face3eb32d68f6caff5b350e9704dfefb1a774d11
SHA512d5f3ba0d0e45477cd3d77c7778ae4297c37c75c41ac22870f8aa0098bc7ad21369a544e13edcda79a7b12b554ce1780aa65d10a5633d8cbb6f29b9db3b23bae0
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
550KB
MD52bdcbdb2bebf316cc54c9771bea5e705
SHA12b7136ad43124e635f61230c4dbe2c2edfd739ca
SHA256b2141b0e7316dd401e27ed93af31d201f4c0fa6d31b8dd826a4131842bab963d
SHA5121c0c76bbdc72cf66b56b426a6eaf1ec60ac41394713b541ff305eab37c7ef0455402c52c1fa2098ba3ed55c5f2d63a82b1469c162070f1b41b62d0c095e38f14
-
Filesize
550KB
MD52bdcbdb2bebf316cc54c9771bea5e705
SHA12b7136ad43124e635f61230c4dbe2c2edfd739ca
SHA256b2141b0e7316dd401e27ed93af31d201f4c0fa6d31b8dd826a4131842bab963d
SHA5121c0c76bbdc72cf66b56b426a6eaf1ec60ac41394713b541ff305eab37c7ef0455402c52c1fa2098ba3ed55c5f2d63a82b1469c162070f1b41b62d0c095e38f14
-
Filesize
277KB
MD5cd070663a50a72e912f8a50f226c04d3
SHA17cc9805fbfc341cc66fbb5771bbe6b5895646bbd
SHA2560e378bb40474efa5bab19be59c8f03e0d55a9fd90aa8ef2aecfcdc39b0aaf997
SHA5126dd0ca6465f3f47e9796333c357fcabc2be8f65348b1ba36e41427ea82b9ad3943c37c34025fb498f89013a8a8b9afe7e0c089443654f1d839404a5c7387a365
-
Filesize
277KB
MD5cd070663a50a72e912f8a50f226c04d3
SHA17cc9805fbfc341cc66fbb5771bbe6b5895646bbd
SHA2560e378bb40474efa5bab19be59c8f03e0d55a9fd90aa8ef2aecfcdc39b0aaf997
SHA5126dd0ca6465f3f47e9796333c357fcabc2be8f65348b1ba36e41427ea82b9ad3943c37c34025fb498f89013a8a8b9afe7e0c089443654f1d839404a5c7387a365
-
Filesize
360KB
MD51be5c914991a090bea8c2c545440032e
SHA12c979137b54c60120eee4f44bfa5acd8f12798d1
SHA256a28b9dd5659448ce24d6a6dadeebadfda3e0dd163243e60d3fd4cc36379e569a
SHA5129ff073e6f5a4842fe3373a6fca02c6dbf134cbdce00257b7a7c7ada7eda3fcde52466d058d7eed4083a80741539ec6e383b972b5f998658d00ca97ec63f27860
-
Filesize
360KB
MD51be5c914991a090bea8c2c545440032e
SHA12c979137b54c60120eee4f44bfa5acd8f12798d1
SHA256a28b9dd5659448ce24d6a6dadeebadfda3e0dd163243e60d3fd4cc36379e569a
SHA5129ff073e6f5a4842fe3373a6fca02c6dbf134cbdce00257b7a7c7ada7eda3fcde52466d058d7eed4083a80741539ec6e383b972b5f998658d00ca97ec63f27860
-
Filesize
256KB
MD54cc92cd42b84308a770e37b3038f572e
SHA1d8988a6ac8c92e21b270e22c576005c1c418ede0
SHA256e301abc7352bb3d89288374a7a07a9976980b55fbb319598bd297355311c9915
SHA512beb197522090690dd16a8523e87ddb5477faa5c66eebe445bdcba96b1704ef4b55392c97c0e9284a8eb756f0e732289bab941a7a585dca5e1c344295fbc0c93e
-
Filesize
256KB
MD54cc92cd42b84308a770e37b3038f572e
SHA1d8988a6ac8c92e21b270e22c576005c1c418ede0
SHA256e301abc7352bb3d89288374a7a07a9976980b55fbb319598bd297355311c9915
SHA512beb197522090690dd16a8523e87ddb5477faa5c66eebe445bdcba96b1704ef4b55392c97c0e9284a8eb756f0e732289bab941a7a585dca5e1c344295fbc0c93e
-
Filesize
256KB
MD54cc92cd42b84308a770e37b3038f572e
SHA1d8988a6ac8c92e21b270e22c576005c1c418ede0
SHA256e301abc7352bb3d89288374a7a07a9976980b55fbb319598bd297355311c9915
SHA512beb197522090690dd16a8523e87ddb5477faa5c66eebe445bdcba96b1704ef4b55392c97c0e9284a8eb756f0e732289bab941a7a585dca5e1c344295fbc0c93e
-
Filesize
256KB
MD54cc92cd42b84308a770e37b3038f572e
SHA1d8988a6ac8c92e21b270e22c576005c1c418ede0
SHA256e301abc7352bb3d89288374a7a07a9976980b55fbb319598bd297355311c9915
SHA512beb197522090690dd16a8523e87ddb5477faa5c66eebe445bdcba96b1704ef4b55392c97c0e9284a8eb756f0e732289bab941a7a585dca5e1c344295fbc0c93e
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5