Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 00:06
Static task
static1
General
-
Target
5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe
-
Size
827KB
-
MD5
b8b2a422e8a94a3101f2be72088876d3
-
SHA1
9837ff3e7457577024afc3fccc79f93bf1c15753
-
SHA256
5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d
-
SHA512
45ce548e88b8b6d6b36b71679027609b026e32249d35ff97a36eae2c7dd46210da2d5b2da82217e18c59edf6f5af2781430da4bbe9f4ce09296a0135881b8394
-
SSDEEP
24576:7y9W8ZCtBrmZT5DWyXmmMX0DCX3WWWhFrh:uY8ZoB6LyT50Xr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it156344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it156344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it156344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it156344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it156344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it156344.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr583414.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 3044 ziAE7173.exe 3332 ziAz2704.exe 1800 it156344.exe 1820 jr926548.exe 4340 kp297432.exe 3068 lr583414.exe 1264 oneetx.exe 3052 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2348 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it156344.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAE7173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAE7173.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAz2704.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziAz2704.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 1536 1820 WerFault.exe 89 5092 3068 WerFault.exe 93 4936 3068 WerFault.exe 93 968 3068 WerFault.exe 93 1684 3068 WerFault.exe 93 1148 3068 WerFault.exe 93 4772 3068 WerFault.exe 93 4676 3068 WerFault.exe 93 1544 3068 WerFault.exe 93 4908 3068 WerFault.exe 93 4388 3068 WerFault.exe 93 860 1264 WerFault.exe 113 1728 1264 WerFault.exe 113 1204 1264 WerFault.exe 113 932 1264 WerFault.exe 113 1320 1264 WerFault.exe 113 4720 1264 WerFault.exe 113 856 1264 WerFault.exe 113 232 1264 WerFault.exe 113 3452 1264 WerFault.exe 113 4328 1264 WerFault.exe 113 3284 1264 WerFault.exe 113 728 1264 WerFault.exe 113 1820 1264 WerFault.exe 113 4572 1264 WerFault.exe 113 1876 1264 WerFault.exe 113 3232 1264 WerFault.exe 113 3708 1264 WerFault.exe 113 1036 3052 WerFault.exe 161 1168 1264 WerFault.exe 113 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1800 it156344.exe 1800 it156344.exe 1820 jr926548.exe 1820 jr926548.exe 4340 kp297432.exe 4340 kp297432.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1800 it156344.exe Token: SeDebugPrivilege 1820 jr926548.exe Token: SeDebugPrivilege 4340 kp297432.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 lr583414.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3044 4548 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe 84 PID 4548 wrote to memory of 3044 4548 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe 84 PID 4548 wrote to memory of 3044 4548 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe 84 PID 3044 wrote to memory of 3332 3044 ziAE7173.exe 85 PID 3044 wrote to memory of 3332 3044 ziAE7173.exe 85 PID 3044 wrote to memory of 3332 3044 ziAE7173.exe 85 PID 3332 wrote to memory of 1800 3332 ziAz2704.exe 86 PID 3332 wrote to memory of 1800 3332 ziAz2704.exe 86 PID 3332 wrote to memory of 1820 3332 ziAz2704.exe 89 PID 3332 wrote to memory of 1820 3332 ziAz2704.exe 89 PID 3332 wrote to memory of 1820 3332 ziAz2704.exe 89 PID 3044 wrote to memory of 4340 3044 ziAE7173.exe 92 PID 3044 wrote to memory of 4340 3044 ziAE7173.exe 92 PID 3044 wrote to memory of 4340 3044 ziAE7173.exe 92 PID 4548 wrote to memory of 3068 4548 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe 93 PID 4548 wrote to memory of 3068 4548 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe 93 PID 4548 wrote to memory of 3068 4548 5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe 93 PID 3068 wrote to memory of 1264 3068 lr583414.exe 113 PID 3068 wrote to memory of 1264 3068 lr583414.exe 113 PID 3068 wrote to memory of 1264 3068 lr583414.exe 113 PID 1264 wrote to memory of 4968 1264 oneetx.exe 130 PID 1264 wrote to memory of 4968 1264 oneetx.exe 130 PID 1264 wrote to memory of 4968 1264 oneetx.exe 130 PID 1264 wrote to memory of 4028 1264 oneetx.exe 136 PID 1264 wrote to memory of 4028 1264 oneetx.exe 136 PID 1264 wrote to memory of 4028 1264 oneetx.exe 136 PID 4028 wrote to memory of 1960 4028 cmd.exe 140 PID 4028 wrote to memory of 1960 4028 cmd.exe 140 PID 4028 wrote to memory of 1960 4028 cmd.exe 140 PID 4028 wrote to memory of 4552 4028 cmd.exe 141 PID 4028 wrote to memory of 4552 4028 cmd.exe 141 PID 4028 wrote to memory of 4552 4028 cmd.exe 141 PID 4028 wrote to memory of 3988 4028 cmd.exe 142 PID 4028 wrote to memory of 3988 4028 cmd.exe 142 PID 4028 wrote to memory of 3988 4028 cmd.exe 142 PID 4028 wrote to memory of 4412 4028 cmd.exe 143 PID 4028 wrote to memory of 4412 4028 cmd.exe 143 PID 4028 wrote to memory of 4412 4028 cmd.exe 143 PID 4028 wrote to memory of 4780 4028 cmd.exe 144 PID 4028 wrote to memory of 4780 4028 cmd.exe 144 PID 4028 wrote to memory of 4780 4028 cmd.exe 144 PID 4028 wrote to memory of 3852 4028 cmd.exe 145 PID 4028 wrote to memory of 3852 4028 cmd.exe 145 PID 4028 wrote to memory of 3852 4028 cmd.exe 145 PID 1264 wrote to memory of 2348 1264 oneetx.exe 158 PID 1264 wrote to memory of 2348 1264 oneetx.exe 158 PID 1264 wrote to memory of 2348 1264 oneetx.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe"C:\Users\Admin\AppData\Local\Temp\5020a0e28c06e2e5a023cd883c570904cd738ce80e7e06d4a5ccced5c8219e0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAE7173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAE7173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAz2704.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziAz2704.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it156344.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it156344.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr926548.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr926548.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13205⤵
- Program crash
PID:1536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297432.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr583414.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr583414.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 6963⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 7803⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 8003⤵
- Program crash
PID:968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 9683⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 9803⤵
- Program crash
PID:1148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 10203⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 12203⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 12363⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 13163⤵
- Program crash
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 6924⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 8844⤵
- Program crash
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 9164⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 10604⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 10724⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 10604⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 11084⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 9444⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 13164⤵
- Program crash
PID:3452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 9084⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 13124⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 13004⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 12804⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 14324⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 10924⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 15404⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 15924⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 16444⤵
- Program crash
PID:1168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 13643⤵
- Program crash
PID:4388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1820 -ip 18201⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3068 -ip 30681⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3068 -ip 30681⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3068 -ip 30681⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3068 -ip 30681⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3068 -ip 30681⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3068 -ip 30681⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3068 -ip 30681⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3068 -ip 30681⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3068 -ip 30681⤵PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3068 -ip 30681⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1264 -ip 12641⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1264 -ip 12641⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1264 -ip 12641⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1264 -ip 12641⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1264 -ip 12641⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1264 -ip 12641⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1264 -ip 12641⤵PID:708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1264 -ip 12641⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1264 -ip 12641⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1264 -ip 12641⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1264 -ip 12641⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1264 -ip 12641⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1264 -ip 12641⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1264 -ip 12641⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1264 -ip 12641⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1264 -ip 12641⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1264 -ip 12641⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2162⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3052 -ip 30521⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1264 -ip 12641⤵PID:3476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5086eb4fa635eb3632feae152abc2dbe4
SHA1789f0fb0fbf147bff97e68a48eb1a6d67dee8f91
SHA256077497d2868c2a63781a6828884a1fb6a448f7c16cb985b28caef76f5c63d8e0
SHA5122ac4c0bb96c0dad413bd993281d2e875872eea3a16b68aec7b73cf2955f7f60a42d0535be8e27ff653535698aeeeba241b98fa8ff60c90af7bbc812cbb03dd32
-
Filesize
256KB
MD5086eb4fa635eb3632feae152abc2dbe4
SHA1789f0fb0fbf147bff97e68a48eb1a6d67dee8f91
SHA256077497d2868c2a63781a6828884a1fb6a448f7c16cb985b28caef76f5c63d8e0
SHA5122ac4c0bb96c0dad413bd993281d2e875872eea3a16b68aec7b73cf2955f7f60a42d0535be8e27ff653535698aeeeba241b98fa8ff60c90af7bbc812cbb03dd32
-
Filesize
568KB
MD52ba4a84f78c2422f8ec080d0f97f784c
SHA17512982073803ec76191576edee3cc42fe85319a
SHA256e4ef726102dae5ba0802eab69fc98f43688c58e8c3e648efa684fd31ac54885f
SHA5127b33da471448a34d88644e6358aa92d51401b045613df0bf2c5768c3299babd959d532ef08915f26f03e0de6ccd002432c08040076d7a7e1511889595be1bb09
-
Filesize
568KB
MD52ba4a84f78c2422f8ec080d0f97f784c
SHA17512982073803ec76191576edee3cc42fe85319a
SHA256e4ef726102dae5ba0802eab69fc98f43688c58e8c3e648efa684fd31ac54885f
SHA5127b33da471448a34d88644e6358aa92d51401b045613df0bf2c5768c3299babd959d532ef08915f26f03e0de6ccd002432c08040076d7a7e1511889595be1bb09
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
414KB
MD56edc34017b69d0c3928345bf9e790976
SHA1ab98e1720e075d2e6ccbb231b49663a92254d465
SHA2568be0f2b692e5b5bb0d886f39164d162ee1368fdec73d5d74f63c3c42cd6d3647
SHA512bb026cc789800dfb9d2654b71f2373eb61e4f0918c47d1dcfc207459795cad3825ac78e6c98fecc690f69e2fb7c5ba19b54b0298c1e2fa7e8c8535f5dc64e777
-
Filesize
414KB
MD56edc34017b69d0c3928345bf9e790976
SHA1ab98e1720e075d2e6ccbb231b49663a92254d465
SHA2568be0f2b692e5b5bb0d886f39164d162ee1368fdec73d5d74f63c3c42cd6d3647
SHA512bb026cc789800dfb9d2654b71f2373eb61e4f0918c47d1dcfc207459795cad3825ac78e6c98fecc690f69e2fb7c5ba19b54b0298c1e2fa7e8c8535f5dc64e777
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5875201f1effc9936ba5c6b7e388e2f84
SHA1ab243100ffc7a14f7ac9b75dcbfe65c2b164d6b3
SHA25634fe007e066108ba482b2a478d6713348d47cfda37bc7bc0e8190048b877f310
SHA51221838761f33ac9eb7c0e51bdd37dcb0edbc073c81214c8ce6ee34f396a44215a8009fb9f4bfcf1a075aed69d0d1b0f2c9e5aadefb86183beb17defc41033bc02
-
Filesize
359KB
MD5875201f1effc9936ba5c6b7e388e2f84
SHA1ab243100ffc7a14f7ac9b75dcbfe65c2b164d6b3
SHA25634fe007e066108ba482b2a478d6713348d47cfda37bc7bc0e8190048b877f310
SHA51221838761f33ac9eb7c0e51bdd37dcb0edbc073c81214c8ce6ee34f396a44215a8009fb9f4bfcf1a075aed69d0d1b0f2c9e5aadefb86183beb17defc41033bc02
-
Filesize
256KB
MD5086eb4fa635eb3632feae152abc2dbe4
SHA1789f0fb0fbf147bff97e68a48eb1a6d67dee8f91
SHA256077497d2868c2a63781a6828884a1fb6a448f7c16cb985b28caef76f5c63d8e0
SHA5122ac4c0bb96c0dad413bd993281d2e875872eea3a16b68aec7b73cf2955f7f60a42d0535be8e27ff653535698aeeeba241b98fa8ff60c90af7bbc812cbb03dd32
-
Filesize
256KB
MD5086eb4fa635eb3632feae152abc2dbe4
SHA1789f0fb0fbf147bff97e68a48eb1a6d67dee8f91
SHA256077497d2868c2a63781a6828884a1fb6a448f7c16cb985b28caef76f5c63d8e0
SHA5122ac4c0bb96c0dad413bd993281d2e875872eea3a16b68aec7b73cf2955f7f60a42d0535be8e27ff653535698aeeeba241b98fa8ff60c90af7bbc812cbb03dd32
-
Filesize
256KB
MD5086eb4fa635eb3632feae152abc2dbe4
SHA1789f0fb0fbf147bff97e68a48eb1a6d67dee8f91
SHA256077497d2868c2a63781a6828884a1fb6a448f7c16cb985b28caef76f5c63d8e0
SHA5122ac4c0bb96c0dad413bd993281d2e875872eea3a16b68aec7b73cf2955f7f60a42d0535be8e27ff653535698aeeeba241b98fa8ff60c90af7bbc812cbb03dd32
-
Filesize
256KB
MD5086eb4fa635eb3632feae152abc2dbe4
SHA1789f0fb0fbf147bff97e68a48eb1a6d67dee8f91
SHA256077497d2868c2a63781a6828884a1fb6a448f7c16cb985b28caef76f5c63d8e0
SHA5122ac4c0bb96c0dad413bd993281d2e875872eea3a16b68aec7b73cf2955f7f60a42d0535be8e27ff653535698aeeeba241b98fa8ff60c90af7bbc812cbb03dd32
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5