Analysis
-
max time kernel
145s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 16:03
Static task
static1
General
-
Target
80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe
-
Size
827KB
-
MD5
b73b409a420369a13425034afbddee37
-
SHA1
6b661184da8d28c1c560e794793410b1c6e4d8e4
-
SHA256
80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4
-
SHA512
509033a2894b0acd391724e9383893d7e6ebb57c976d48f7ff197509ea9d3ac16eed42400c695caa5a5116253bd0c40448aa963e3dad3dc59fe7b3dfe64b5482
-
SSDEEP
24576:Oyt9NdMOvpaooJHQitBiwbuHC9nhV6FxM:dtThaNtZtBimuHCux
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it430948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it430948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it430948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it430948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it430948.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it430948.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lr235158.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2320 zisY8219.exe 1564 zivr7644.exe 3880 it430948.exe 548 jr012281.exe 4000 kp028783.exe 2564 lr235158.exe 1056 oneetx.exe 4608 oneetx.exe 920 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4312 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it430948.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisY8219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisY8219.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivr7644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zivr7644.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 100 548 WerFault.exe 87 4004 2564 WerFault.exe 91 2636 2564 WerFault.exe 91 1472 2564 WerFault.exe 91 4544 2564 WerFault.exe 91 3736 2564 WerFault.exe 91 5040 2564 WerFault.exe 91 3900 2564 WerFault.exe 91 2088 2564 WerFault.exe 91 4100 2564 WerFault.exe 91 3120 2564 WerFault.exe 91 552 1056 WerFault.exe 111 4328 1056 WerFault.exe 111 5076 1056 WerFault.exe 111 3080 1056 WerFault.exe 111 3828 1056 WerFault.exe 111 4228 1056 WerFault.exe 111 412 1056 WerFault.exe 111 4336 1056 WerFault.exe 111 1088 1056 WerFault.exe 111 1340 1056 WerFault.exe 111 2432 1056 WerFault.exe 111 1648 1056 WerFault.exe 111 2204 1056 WerFault.exe 111 812 4608 WerFault.exe 150 4460 1056 WerFault.exe 111 2616 1056 WerFault.exe 111 4292 1056 WerFault.exe 111 3248 920 WerFault.exe 160 4588 1056 WerFault.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3880 it430948.exe 3880 it430948.exe 548 jr012281.exe 548 jr012281.exe 4000 kp028783.exe 4000 kp028783.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3880 it430948.exe Token: SeDebugPrivilege 548 jr012281.exe Token: SeDebugPrivilege 4000 kp028783.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 lr235158.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2320 1356 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe 84 PID 1356 wrote to memory of 2320 1356 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe 84 PID 1356 wrote to memory of 2320 1356 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe 84 PID 2320 wrote to memory of 1564 2320 zisY8219.exe 85 PID 2320 wrote to memory of 1564 2320 zisY8219.exe 85 PID 2320 wrote to memory of 1564 2320 zisY8219.exe 85 PID 1564 wrote to memory of 3880 1564 zivr7644.exe 86 PID 1564 wrote to memory of 3880 1564 zivr7644.exe 86 PID 1564 wrote to memory of 548 1564 zivr7644.exe 87 PID 1564 wrote to memory of 548 1564 zivr7644.exe 87 PID 1564 wrote to memory of 548 1564 zivr7644.exe 87 PID 2320 wrote to memory of 4000 2320 zisY8219.exe 90 PID 2320 wrote to memory of 4000 2320 zisY8219.exe 90 PID 2320 wrote to memory of 4000 2320 zisY8219.exe 90 PID 1356 wrote to memory of 2564 1356 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe 91 PID 1356 wrote to memory of 2564 1356 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe 91 PID 1356 wrote to memory of 2564 1356 80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe 91 PID 2564 wrote to memory of 1056 2564 lr235158.exe 111 PID 2564 wrote to memory of 1056 2564 lr235158.exe 111 PID 2564 wrote to memory of 1056 2564 lr235158.exe 111 PID 1056 wrote to memory of 3680 1056 oneetx.exe 128 PID 1056 wrote to memory of 3680 1056 oneetx.exe 128 PID 1056 wrote to memory of 3680 1056 oneetx.exe 128 PID 1056 wrote to memory of 3916 1056 oneetx.exe 134 PID 1056 wrote to memory of 3916 1056 oneetx.exe 134 PID 1056 wrote to memory of 3916 1056 oneetx.exe 134 PID 3916 wrote to memory of 3912 3916 cmd.exe 137 PID 3916 wrote to memory of 3912 3916 cmd.exe 137 PID 3916 wrote to memory of 3912 3916 cmd.exe 137 PID 3916 wrote to memory of 3256 3916 cmd.exe 139 PID 3916 wrote to memory of 3256 3916 cmd.exe 139 PID 3916 wrote to memory of 3256 3916 cmd.exe 139 PID 3916 wrote to memory of 2476 3916 cmd.exe 140 PID 3916 wrote to memory of 2476 3916 cmd.exe 140 PID 3916 wrote to memory of 2476 3916 cmd.exe 140 PID 3916 wrote to memory of 4016 3916 cmd.exe 141 PID 3916 wrote to memory of 4016 3916 cmd.exe 141 PID 3916 wrote to memory of 4016 3916 cmd.exe 141 PID 3916 wrote to memory of 1100 3916 cmd.exe 142 PID 3916 wrote to memory of 1100 3916 cmd.exe 142 PID 3916 wrote to memory of 1100 3916 cmd.exe 142 PID 3916 wrote to memory of 3984 3916 cmd.exe 143 PID 3916 wrote to memory of 3984 3916 cmd.exe 143 PID 3916 wrote to memory of 3984 3916 cmd.exe 143 PID 1056 wrote to memory of 4312 1056 oneetx.exe 157 PID 1056 wrote to memory of 4312 1056 oneetx.exe 157 PID 1056 wrote to memory of 4312 1056 oneetx.exe 157
Processes
-
C:\Users\Admin\AppData\Local\Temp\80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe"C:\Users\Admin\AppData\Local\Temp\80c8cf15f923abc4239a5817e5e448a22b4db15324e415ef3a584f60137746e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisY8219.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisY8219.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivr7644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivr7644.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it430948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it430948.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr012281.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr012281.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 19645⤵
- Program crash
PID:100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp028783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp028783.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235158.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 6963⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 7803⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 8563⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 9523⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 9563⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 9563⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 11803⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 12403⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 13123⤵
- Program crash
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 6924⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 8284⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 8924⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10524⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10604⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10804⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10644⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10004⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 7764⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 13404⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 13164⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 12884⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 13324⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10804⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 16124⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 11004⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 16284⤵
- Program crash
PID:4588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 14163⤵
- Program crash
PID:3120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 548 -ip 5481⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2564 -ip 25641⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2564 -ip 25641⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2564 -ip 25641⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2564 -ip 25641⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2564 -ip 25641⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2564 -ip 25641⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2564 -ip 25641⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2564 -ip 25641⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2564 -ip 25641⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2564 -ip 25641⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1056 -ip 10561⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1056 -ip 10561⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1056 -ip 10561⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1056 -ip 10561⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1056 -ip 10561⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1056 -ip 10561⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1056 -ip 10561⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1056 -ip 10561⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1056 -ip 10561⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1056 -ip 10561⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1056 -ip 10561⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1056 -ip 10561⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1056 -ip 10561⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 3242⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4608 -ip 46081⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1056 -ip 10561⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1056 -ip 10561⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1056 -ip 10561⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 3162⤵
- Program crash
PID:3248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 920 -ip 9201⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1056 -ip 10561⤵PID:4896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
568KB
MD5eddb0cd2e1b3b23dc08f5c3e1bfa3800
SHA1d578f9d00966cb1f655cd32cbcaea33ce4a65372
SHA2565377ba8e3a9d3f85dfa67f67d60743a33197b1f1fcf10b9c5e52521b250897d9
SHA512ccb8b4ec9f85bbc2cbc7a3e0fd8f86e2c6fe8e30a617160a452bd97f432f4ca227cbd8aef65dfd3c9b0381e5d4525ba660373ac3ba7dbed8347ef810da621415
-
Filesize
568KB
MD5eddb0cd2e1b3b23dc08f5c3e1bfa3800
SHA1d578f9d00966cb1f655cd32cbcaea33ce4a65372
SHA2565377ba8e3a9d3f85dfa67f67d60743a33197b1f1fcf10b9c5e52521b250897d9
SHA512ccb8b4ec9f85bbc2cbc7a3e0fd8f86e2c6fe8e30a617160a452bd97f432f4ca227cbd8aef65dfd3c9b0381e5d4525ba660373ac3ba7dbed8347ef810da621415
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
414KB
MD5e9eca2c979295d4d6b3255837f286912
SHA1810e605a0679a8986696d5f3ee5cdd321987fa99
SHA2566f198cff8554a1a35161e484bed1d4f6b1b8f2ed6314ed9e5e0811ea64d6ee02
SHA512fb56b2fc86cb4e2890d9106fae30b4f07599b96ddb6b69e762acdcfdff1af278df13177f0a903284ecf3209155e6741548a14fcc9a409a60f0ca06ee60989f1c
-
Filesize
414KB
MD5e9eca2c979295d4d6b3255837f286912
SHA1810e605a0679a8986696d5f3ee5cdd321987fa99
SHA2566f198cff8554a1a35161e484bed1d4f6b1b8f2ed6314ed9e5e0811ea64d6ee02
SHA512fb56b2fc86cb4e2890d9106fae30b4f07599b96ddb6b69e762acdcfdff1af278df13177f0a903284ecf3209155e6741548a14fcc9a409a60f0ca06ee60989f1c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD51fb7453a132284a7c4026d0a3cdb82bb
SHA16bf1b76c441d7ef27217a2301bbe065431f6f97b
SHA256b4b31bb16a5b3ad9e4fdacb572ebca2f539c6f91a6fcbba60f730f64d1d54900
SHA51279bea39551424dd4b4bbbec989386d3a4ef5379dea5b305c4500369757d9c08eb560b2ac64e031b7c766f34f691ce3eaa58dc6f29622682f737a8a9c060b5f33
-
Filesize
359KB
MD51fb7453a132284a7c4026d0a3cdb82bb
SHA16bf1b76c441d7ef27217a2301bbe065431f6f97b
SHA256b4b31bb16a5b3ad9e4fdacb572ebca2f539c6f91a6fcbba60f730f64d1d54900
SHA51279bea39551424dd4b4bbbec989386d3a4ef5379dea5b305c4500369757d9c08eb560b2ac64e031b7c766f34f691ce3eaa58dc6f29622682f737a8a9c060b5f33
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
255KB
MD5f202ada9871ce55632ee51e5982094d4
SHA1a8731c56c89f806d353e2894f001c40a55925dc7
SHA256703bcfc94c673b4af26dcc92974084a331507a06a33061090794d387809f9e31
SHA512e31a0b1e3bf73fc73eebbe6401fcdc9f9921cc7ac1f5f9b6bf01dd1e25187f13a2f5ced5ed12dd5bd5099c70f1a73853838c42b4c4b1d9802cfad62b306ba9e8
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5