Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 19:44
Static task
static1
General
-
Target
b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe
-
Size
966KB
-
MD5
149c3cd8d711f6e128a4811f336faed0
-
SHA1
affdcfa04101175fa1485b8b924679b1a25b3dcd
-
SHA256
b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307
-
SHA512
dd38352150883afaeb31b3bdb709750e2aed4e1e725931f053626dc2dec709377542a36dbb3f5fe3575025d7bab935f6e81d7b917712d172e576e263b04896b8
-
SSDEEP
12288:hy90E523xRgPNhtlGvh1DNZpQR1awkeS/WoWy/tskj6buFe7knX4+w0kr5:hyTZPTSJhNZal/3yhjhFEknXbK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr136142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr136142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr136142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr136142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr136142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr136142.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si997154.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 4216 un517452.exe 1416 un189941.exe 1556 pr136142.exe 792 pr136142.exe 3312 qu599988.exe 4580 rk286771.exe 2968 si997154.exe 4056 oneetx.exe 936 oneetx.exe 2256 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1156 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr136142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr136142.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un517452.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un517452.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un189941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un189941.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 792 1556 pr136142.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 3476 3312 WerFault.exe 90 1100 2968 WerFault.exe 100 4692 2968 WerFault.exe 100 1516 2968 WerFault.exe 100 1340 2968 WerFault.exe 100 3292 2968 WerFault.exe 100 2436 2968 WerFault.exe 100 1868 2968 WerFault.exe 100 208 2968 WerFault.exe 100 4252 2968 WerFault.exe 100 4152 2968 WerFault.exe 100 1760 4056 WerFault.exe 120 4328 4056 WerFault.exe 120 4464 4056 WerFault.exe 120 1932 4056 WerFault.exe 120 4684 4056 WerFault.exe 120 3476 4056 WerFault.exe 120 3816 4056 WerFault.exe 120 3768 4056 WerFault.exe 120 3728 4056 WerFault.exe 120 2072 4056 WerFault.exe 120 4752 4056 WerFault.exe 120 3948 4056 WerFault.exe 120 580 4056 WerFault.exe 120 1284 4056 WerFault.exe 120 208 4056 WerFault.exe 120 4064 4056 WerFault.exe 120 828 936 WerFault.exe 167 2800 4056 WerFault.exe 120 4196 2256 WerFault.exe 172 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 792 pr136142.exe 792 pr136142.exe 3312 qu599988.exe 3312 qu599988.exe 4580 rk286771.exe 4580 rk286771.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 792 pr136142.exe Token: SeDebugPrivilege 3312 qu599988.exe Token: SeDebugPrivilege 4580 rk286771.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 si997154.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4216 2516 b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe 86 PID 2516 wrote to memory of 4216 2516 b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe 86 PID 2516 wrote to memory of 4216 2516 b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe 86 PID 4216 wrote to memory of 1416 4216 un517452.exe 87 PID 4216 wrote to memory of 1416 4216 un517452.exe 87 PID 4216 wrote to memory of 1416 4216 un517452.exe 87 PID 1416 wrote to memory of 1556 1416 un189941.exe 88 PID 1416 wrote to memory of 1556 1416 un189941.exe 88 PID 1416 wrote to memory of 1556 1416 un189941.exe 88 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1556 wrote to memory of 792 1556 pr136142.exe 89 PID 1416 wrote to memory of 3312 1416 un189941.exe 90 PID 1416 wrote to memory of 3312 1416 un189941.exe 90 PID 1416 wrote to memory of 3312 1416 un189941.exe 90 PID 4216 wrote to memory of 4580 4216 un517452.exe 97 PID 4216 wrote to memory of 4580 4216 un517452.exe 97 PID 4216 wrote to memory of 4580 4216 un517452.exe 97 PID 2516 wrote to memory of 2968 2516 b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe 100 PID 2516 wrote to memory of 2968 2516 b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe 100 PID 2516 wrote to memory of 2968 2516 b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe 100 PID 2968 wrote to memory of 4056 2968 si997154.exe 120 PID 2968 wrote to memory of 4056 2968 si997154.exe 120 PID 2968 wrote to memory of 4056 2968 si997154.exe 120 PID 4056 wrote to memory of 2704 4056 oneetx.exe 137 PID 4056 wrote to memory of 2704 4056 oneetx.exe 137 PID 4056 wrote to memory of 2704 4056 oneetx.exe 137 PID 4056 wrote to memory of 4352 4056 oneetx.exe 143 PID 4056 wrote to memory of 4352 4056 oneetx.exe 143 PID 4056 wrote to memory of 4352 4056 oneetx.exe 143 PID 4352 wrote to memory of 3080 4352 cmd.exe 147 PID 4352 wrote to memory of 3080 4352 cmd.exe 147 PID 4352 wrote to memory of 3080 4352 cmd.exe 147 PID 4352 wrote to memory of 3208 4352 cmd.exe 148 PID 4352 wrote to memory of 3208 4352 cmd.exe 148 PID 4352 wrote to memory of 3208 4352 cmd.exe 148 PID 4352 wrote to memory of 4188 4352 cmd.exe 149 PID 4352 wrote to memory of 4188 4352 cmd.exe 149 PID 4352 wrote to memory of 4188 4352 cmd.exe 149 PID 4352 wrote to memory of 4052 4352 cmd.exe 150 PID 4352 wrote to memory of 4052 4352 cmd.exe 150 PID 4352 wrote to memory of 4052 4352 cmd.exe 150 PID 4352 wrote to memory of 4960 4352 cmd.exe 151 PID 4352 wrote to memory of 4960 4352 cmd.exe 151 PID 4352 wrote to memory of 4960 4352 cmd.exe 151 PID 4352 wrote to memory of 832 4352 cmd.exe 152 PID 4352 wrote to memory of 832 4352 cmd.exe 152 PID 4352 wrote to memory of 832 4352 cmd.exe 152 PID 4056 wrote to memory of 1156 4056 oneetx.exe 164 PID 4056 wrote to memory of 1156 4056 oneetx.exe 164 PID 4056 wrote to memory of 1156 4056 oneetx.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe"C:\Users\Admin\AppData\Local\Temp\b089385ce1ab0dd0cc98fecee8c74147eecb536a8bbe1882f3d5a7e1b0f3f307.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un517452.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un517452.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un189941.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un189941.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr136142.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr136142.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr136142.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr136142.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu599988.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu599988.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 13285⤵
- Program crash
PID:3476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk286771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk286771.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si997154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si997154.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6963⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 7283⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 8563⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9803⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10043⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10043⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 12163⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 12323⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 13203⤵
- Program crash
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 6364⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 8364⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 9364⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10524⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10724⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10724⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 11204⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 9124⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 7764⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 13364⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 12924⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 13244⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 7444⤵
- Program crash
PID:580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 11044⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 16124⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 11004⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 16284⤵
- Program crash
PID:2800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 7683⤵
- Program crash
PID:4152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3312 -ip 33121⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2968 -ip 29681⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2968 -ip 29681⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2968 -ip 29681⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2968 -ip 29681⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2968 -ip 29681⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2968 -ip 29681⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2968 -ip 29681⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2968 -ip 29681⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2968 -ip 29681⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2968 -ip 29681⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4056 -ip 40561⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4056 -ip 40561⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4056 -ip 40561⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4056 -ip 40561⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4056 -ip 40561⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4056 -ip 40561⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4056 -ip 40561⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4056 -ip 40561⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4056 -ip 40561⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4056 -ip 40561⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4056 -ip 40561⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4056 -ip 40561⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4056 -ip 40561⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4056 -ip 40561⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4056 -ip 40561⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4056 -ip 40561⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 3122⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 936 -ip 9361⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4056 -ip 40561⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 3202⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2256 -ip 22561⤵PID:2136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
707KB
MD56accd844502b4402701c14b485bb0274
SHA131848e7b3e20bf5235fb3c25650459980b181271
SHA256cfc3913abd29c711a6e906d7b8666a216f06990d594461ca5f9a969a732e6c83
SHA512bebbbd86ae6729663b72f671e238e0cb54c71e757275c00c929840e34ed1fd9c0f50e5fddf6cffa89deb1d822509c4eba1e97d330a60468ee825673dded8eca0
-
Filesize
707KB
MD56accd844502b4402701c14b485bb0274
SHA131848e7b3e20bf5235fb3c25650459980b181271
SHA256cfc3913abd29c711a6e906d7b8666a216f06990d594461ca5f9a969a732e6c83
SHA512bebbbd86ae6729663b72f671e238e0cb54c71e757275c00c929840e34ed1fd9c0f50e5fddf6cffa89deb1d822509c4eba1e97d330a60468ee825673dded8eca0
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
553KB
MD5d0c0d86532983578868251447696e637
SHA1c543c93d914ef74d055ca56ba22fd78812702ce2
SHA256de149cc1db38ff6358d411ebab409b54bc707bceabb24de07097ec82e554a6ef
SHA51267e72f349c437e0cfaee34099f4d17a05dc10dd61cea83985e424c45bf3f05c873e1dcc9462873315725b1e678e6b1539dce2de50716c047d4941cc4b4d7a925
-
Filesize
553KB
MD5d0c0d86532983578868251447696e637
SHA1c543c93d914ef74d055ca56ba22fd78812702ce2
SHA256de149cc1db38ff6358d411ebab409b54bc707bceabb24de07097ec82e554a6ef
SHA51267e72f349c437e0cfaee34099f4d17a05dc10dd61cea83985e424c45bf3f05c873e1dcc9462873315725b1e678e6b1539dce2de50716c047d4941cc4b4d7a925
-
Filesize
278KB
MD550cebafd7094a9d110c4c30576865ec4
SHA11e26d2cc6f1b8a574ca5d250e773fc716f79fd3f
SHA256b5f0011b798468f07ad72febb2102d94144d01e2c88021c601a1d8fa6dc7c5f8
SHA5120606359a6f49b2661cef4fddd5d4371544309c484acdd14fef324f71e78a772b6594c6a1560b0978e687a885b7bc614167c383ed7f32f67e7f5af94419f1e4e7
-
Filesize
278KB
MD550cebafd7094a9d110c4c30576865ec4
SHA11e26d2cc6f1b8a574ca5d250e773fc716f79fd3f
SHA256b5f0011b798468f07ad72febb2102d94144d01e2c88021c601a1d8fa6dc7c5f8
SHA5120606359a6f49b2661cef4fddd5d4371544309c484acdd14fef324f71e78a772b6594c6a1560b0978e687a885b7bc614167c383ed7f32f67e7f5af94419f1e4e7
-
Filesize
278KB
MD550cebafd7094a9d110c4c30576865ec4
SHA11e26d2cc6f1b8a574ca5d250e773fc716f79fd3f
SHA256b5f0011b798468f07ad72febb2102d94144d01e2c88021c601a1d8fa6dc7c5f8
SHA5120606359a6f49b2661cef4fddd5d4371544309c484acdd14fef324f71e78a772b6594c6a1560b0978e687a885b7bc614167c383ed7f32f67e7f5af94419f1e4e7
-
Filesize
360KB
MD571d7c37014e2f938e5c1079c7b6739d4
SHA12564200206b673e44c08ca39c884c53472008cfd
SHA2563123c8429c1270a58b73e60f4edcf77de286a939650c71426c38af3d5185b1b9
SHA51220be5f7eb5d48b603e337eeb38bbea677ad797236fb5d292b5b12001e8303ae5a7fcfee3ac6114b665b9782a9ea3936fad7fcbb5a03a37e68cc2b0fbee62d00b
-
Filesize
360KB
MD571d7c37014e2f938e5c1079c7b6739d4
SHA12564200206b673e44c08ca39c884c53472008cfd
SHA2563123c8429c1270a58b73e60f4edcf77de286a939650c71426c38af3d5185b1b9
SHA51220be5f7eb5d48b603e337eeb38bbea677ad797236fb5d292b5b12001e8303ae5a7fcfee3ac6114b665b9782a9ea3936fad7fcbb5a03a37e68cc2b0fbee62d00b
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
256KB
MD57d5ee72f47eb987d5d962f48fb32410c
SHA19541f02dd636498d33b1e5fb5946d23993a3c6a5
SHA256b9519030884662bea7c4e4503fa7c09f062658418ce3238e81cf96f61e6f8488
SHA51251355962df0137a978cc27ca1df63462a35f6a29f3673fd5cc1ad516c83f5de0fd1cde8cd47c1645357de95063f33836504cbd330aa94389ec794f87f69e5e53
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5