Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 15:00
Static task
static1
General
-
Target
6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe
-
Size
828KB
-
MD5
e70d050a6f8ad0dd69512eedd0834673
-
SHA1
54c9322f06a141fc5b09ce0bf11c36a1ee176d20
-
SHA256
6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f
-
SHA512
93e67e0c31b2cf146d19823603704aa0b1fb58ac6b9cbfbc8583f98d4b721815bbb4701f548b13596eaee1f57c2452f5add3fb05f1009cc253506ba3df749d9e
-
SSDEEP
12288:ny90PkDiQ5no8/R5eI8di4tfeeyeK2x5hEIz5xS6STnvrIabLHYNj:nyYkno8ZoI8d3tfeeyeXtkjj9jYNj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it149823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it149823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it149823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it149823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it149823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it149823.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr842356.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2812 ziiA0559.exe 1564 ziXI3912.exe 4324 it149823.exe 2616 jr967668.exe 1400 kp791378.exe 4068 lr842356.exe 460 oneetx.exe 3408 oneetx.exe 4632 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4072 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it149823.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziXI3912.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiA0559.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiA0559.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXI3912.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 2164 2616 WerFault.exe 90 2556 4068 WerFault.exe 97 1304 4068 WerFault.exe 97 4380 4068 WerFault.exe 97 4204 4068 WerFault.exe 97 4376 4068 WerFault.exe 97 4232 4068 WerFault.exe 97 4788 4068 WerFault.exe 97 956 4068 WerFault.exe 97 4580 4068 WerFault.exe 97 2324 4068 WerFault.exe 97 1040 460 WerFault.exe 117 952 460 WerFault.exe 117 3776 460 WerFault.exe 117 1232 460 WerFault.exe 117 3988 460 WerFault.exe 117 3852 460 WerFault.exe 117 2676 460 WerFault.exe 117 2536 460 WerFault.exe 117 3864 460 WerFault.exe 117 3184 460 WerFault.exe 117 2908 460 WerFault.exe 117 4080 460 WerFault.exe 117 3428 460 WerFault.exe 117 2208 3408 WerFault.exe 156 1956 460 WerFault.exe 117 3952 460 WerFault.exe 117 1344 460 WerFault.exe 117 2572 460 WerFault.exe 117 4712 4632 WerFault.exe 166 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4324 it149823.exe 4324 it149823.exe 2616 jr967668.exe 2616 jr967668.exe 1400 kp791378.exe 1400 kp791378.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4324 it149823.exe Token: SeDebugPrivilege 2616 jr967668.exe Token: SeDebugPrivilege 1400 kp791378.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4068 lr842356.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 540 wrote to memory of 2812 540 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe 83 PID 540 wrote to memory of 2812 540 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe 83 PID 540 wrote to memory of 2812 540 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe 83 PID 2812 wrote to memory of 1564 2812 ziiA0559.exe 84 PID 2812 wrote to memory of 1564 2812 ziiA0559.exe 84 PID 2812 wrote to memory of 1564 2812 ziiA0559.exe 84 PID 1564 wrote to memory of 4324 1564 ziXI3912.exe 85 PID 1564 wrote to memory of 4324 1564 ziXI3912.exe 85 PID 1564 wrote to memory of 2616 1564 ziXI3912.exe 90 PID 1564 wrote to memory of 2616 1564 ziXI3912.exe 90 PID 1564 wrote to memory of 2616 1564 ziXI3912.exe 90 PID 2812 wrote to memory of 1400 2812 ziiA0559.exe 96 PID 2812 wrote to memory of 1400 2812 ziiA0559.exe 96 PID 2812 wrote to memory of 1400 2812 ziiA0559.exe 96 PID 540 wrote to memory of 4068 540 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe 97 PID 540 wrote to memory of 4068 540 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe 97 PID 540 wrote to memory of 4068 540 6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe 97 PID 4068 wrote to memory of 460 4068 lr842356.exe 117 PID 4068 wrote to memory of 460 4068 lr842356.exe 117 PID 4068 wrote to memory of 460 4068 lr842356.exe 117 PID 460 wrote to memory of 1056 460 oneetx.exe 134 PID 460 wrote to memory of 1056 460 oneetx.exe 134 PID 460 wrote to memory of 1056 460 oneetx.exe 134 PID 460 wrote to memory of 1296 460 oneetx.exe 140 PID 460 wrote to memory of 1296 460 oneetx.exe 140 PID 460 wrote to memory of 1296 460 oneetx.exe 140 PID 1296 wrote to memory of 4800 1296 cmd.exe 144 PID 1296 wrote to memory of 4800 1296 cmd.exe 144 PID 1296 wrote to memory of 4800 1296 cmd.exe 144 PID 1296 wrote to memory of 2268 1296 cmd.exe 145 PID 1296 wrote to memory of 2268 1296 cmd.exe 145 PID 1296 wrote to memory of 2268 1296 cmd.exe 145 PID 1296 wrote to memory of 1556 1296 cmd.exe 146 PID 1296 wrote to memory of 1556 1296 cmd.exe 146 PID 1296 wrote to memory of 1556 1296 cmd.exe 146 PID 1296 wrote to memory of 1452 1296 cmd.exe 147 PID 1296 wrote to memory of 1452 1296 cmd.exe 147 PID 1296 wrote to memory of 1452 1296 cmd.exe 147 PID 1296 wrote to memory of 2616 1296 cmd.exe 148 PID 1296 wrote to memory of 2616 1296 cmd.exe 148 PID 1296 wrote to memory of 2616 1296 cmd.exe 148 PID 1296 wrote to memory of 2232 1296 cmd.exe 149 PID 1296 wrote to memory of 2232 1296 cmd.exe 149 PID 1296 wrote to memory of 2232 1296 cmd.exe 149 PID 460 wrote to memory of 4072 460 oneetx.exe 163 PID 460 wrote to memory of 4072 460 oneetx.exe 163 PID 460 wrote to memory of 4072 460 oneetx.exe 163
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe"C:\Users\Admin\AppData\Local\Temp\6fb0b6f0715aba41535aaf95a27e8410cbe43d868ace19580f67103b01399a6f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiA0559.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiA0559.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXI3912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziXI3912.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it149823.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it149823.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr967668.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr967668.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 13205⤵
- Program crash
PID:2164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp791378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp791378.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr842356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr842356.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 7083⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 7803⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 8203⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 9563⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 8723⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 9723⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 12163⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 12323⤵
- Program crash
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 13163⤵
- Program crash
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7044⤵
- Program crash
PID:1040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 8284⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 9044⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10524⤵
- Program crash
PID:1232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10884⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10884⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10844⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 9924⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7644⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7764⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13084⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13164⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 9084⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 11124⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 16164⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10964⤵
- Program crash
PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 16284⤵
- Program crash
PID:2572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 13443⤵
- Program crash
PID:2324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2616 -ip 26161⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4068 -ip 40681⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4068 -ip 40681⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4068 -ip 40681⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4068 -ip 40681⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4068 -ip 40681⤵PID:364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4068 -ip 40681⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4068 -ip 40681⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4068 -ip 40681⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4068 -ip 40681⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4068 -ip 40681⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 460 -ip 4601⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 460 -ip 4601⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 460 -ip 4601⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 460 -ip 4601⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 460 -ip 4601⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 460 -ip 4601⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 460 -ip 4601⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 460 -ip 4601⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 460 -ip 4601⤵PID:508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 460 -ip 4601⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 460 -ip 4601⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 460 -ip 4601⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 460 -ip 4601⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 3562⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3408 -ip 34081⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 460 -ip 4601⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 460 -ip 4601⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 460 -ip 4601⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 4282⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 460 -ip 4601⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4632 -ip 46321⤵PID:3136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
569KB
MD54f93f7d9337761d198500bd6a2729812
SHA12d0144398f6f7d84fc1f8bd55f2f00bb68a2c62a
SHA2564b45ac06e6cbd6a08003a992b31358e64de581a7fbdedb02251aa19472474ff9
SHA512fb279fc2f757d8c9d37ea85515f66d2ca91cd25bf93216e856cc9e72b4de23dc115c76cd0b2ef201eb65121dcb802e8245e853e0b276e246a5b3a99b0affefc6
-
Filesize
569KB
MD54f93f7d9337761d198500bd6a2729812
SHA12d0144398f6f7d84fc1f8bd55f2f00bb68a2c62a
SHA2564b45ac06e6cbd6a08003a992b31358e64de581a7fbdedb02251aa19472474ff9
SHA512fb279fc2f757d8c9d37ea85515f66d2ca91cd25bf93216e856cc9e72b4de23dc115c76cd0b2ef201eb65121dcb802e8245e853e0b276e246a5b3a99b0affefc6
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
415KB
MD58b0e3ce67d1b243e1b0a8ca787238397
SHA1dc5f752ee7a176760400edbda0ff004669fc0771
SHA256929e762a5b6a20fae729ce00f47e1ef2ea859585788a7771557b6a099563a457
SHA51233fe06d543db139b296b02dfd3ad71aa77c60b5951234626b400fa281e4e9b6cbbfa909a0cfccfd3bb4d1d630b249e29e284382f81f33987cc1d3bbd6e8d296a
-
Filesize
415KB
MD58b0e3ce67d1b243e1b0a8ca787238397
SHA1dc5f752ee7a176760400edbda0ff004669fc0771
SHA256929e762a5b6a20fae729ce00f47e1ef2ea859585788a7771557b6a099563a457
SHA51233fe06d543db139b296b02dfd3ad71aa77c60b5951234626b400fa281e4e9b6cbbfa909a0cfccfd3bb4d1d630b249e29e284382f81f33987cc1d3bbd6e8d296a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5956e78bc02a0b2eb9eb72d82c47cb7c6
SHA12e0b95603460ea2f244056fd6e9ea30a18e43b4a
SHA2565d80ac132725c8d1ecd81c9b5890ace742b7cef2821c813f4b3867b7fb226da5
SHA512cc5726adfb52dc1a07d4bedcc0e850e847cb453ad202c90a00ba82e43a07fc8e2811a17f3368ba11475022c5667f141df7d64b2bfed6134067c48f5285610dc1
-
Filesize
360KB
MD5956e78bc02a0b2eb9eb72d82c47cb7c6
SHA12e0b95603460ea2f244056fd6e9ea30a18e43b4a
SHA2565d80ac132725c8d1ecd81c9b5890ace742b7cef2821c813f4b3867b7fb226da5
SHA512cc5726adfb52dc1a07d4bedcc0e850e847cb453ad202c90a00ba82e43a07fc8e2811a17f3368ba11475022c5667f141df7d64b2bfed6134067c48f5285610dc1
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
256KB
MD5e020b98ecfb507396fff148cab0966c2
SHA13df52bdd43bad18c19c1a9863dbd4842ca5c9acb
SHA256fda6b9f1a864e4dbcf5075f746994d39700f8facf9dfac71842715cd37fc15d7
SHA512987ec9ccb996718192c90eaae6df202b55bd56180dea35a2c9e4b4c92a9f92557aca067b0362a74f59567f5dcf240f95d6929db94511d9dfe3bfbb50f7a1cef1
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5