Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 02:12
Static task
static1
General
-
Target
6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe
-
Size
827KB
-
MD5
6abe6833230b6760239cb25be707dd2e
-
SHA1
39275ba27a14c82380a4730b7b2fb65b66febc2e
-
SHA256
6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863
-
SHA512
7de4d4c270ba028feca9ab7a979b41ba9d3ff27b6f94c54171cd5cc2daeb20b62a9b32f55912e5f2a269dd8b293dea0719e0b690fe01c53a4d6bb7768f502a86
-
SSDEEP
24576:hyrKGRW0CE7hFfMXAA/kzdB9W7RiStWWWMh:UrKer1VFf/nB4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it783916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it783916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it783916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it783916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it783916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it783916.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr662052.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1356 zirH6019.exe 4888 ziFX3479.exe 4572 it783916.exe 3588 jr530948.exe 1228 kp962646.exe 4380 lr662052.exe 2224 oneetx.exe 2604 oneetx.exe 3568 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4316 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it783916.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziFX3479.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zirH6019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirH6019.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziFX3479.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 26 IoCs
pid pid_target Process procid_target 1004 3588 WerFault.exe 87 3116 4380 WerFault.exe 92 3320 4380 WerFault.exe 92 628 4380 WerFault.exe 92 3812 4380 WerFault.exe 92 4652 4380 WerFault.exe 92 2968 2224 WerFault.exe 102 1460 2224 WerFault.exe 102 4124 2224 WerFault.exe 102 3640 2224 WerFault.exe 102 744 2224 WerFault.exe 102 3440 2224 WerFault.exe 102 948 2224 WerFault.exe 102 3828 2224 WerFault.exe 102 4328 2224 WerFault.exe 102 668 2224 WerFault.exe 102 3772 2224 WerFault.exe 102 1420 2224 WerFault.exe 102 2192 2224 WerFault.exe 102 3428 2224 WerFault.exe 102 544 2224 WerFault.exe 102 1576 2604 WerFault.exe 149 400 2224 WerFault.exe 102 2736 2224 WerFault.exe 102 4956 2224 WerFault.exe 102 864 3568 WerFault.exe 159 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4572 it783916.exe 4572 it783916.exe 3588 jr530948.exe 3588 jr530948.exe 1228 kp962646.exe 1228 kp962646.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4572 it783916.exe Token: SeDebugPrivilege 3588 jr530948.exe Token: SeDebugPrivilege 1228 kp962646.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3152 wrote to memory of 1356 3152 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe 80 PID 3152 wrote to memory of 1356 3152 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe 80 PID 3152 wrote to memory of 1356 3152 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe 80 PID 1356 wrote to memory of 4888 1356 zirH6019.exe 81 PID 1356 wrote to memory of 4888 1356 zirH6019.exe 81 PID 1356 wrote to memory of 4888 1356 zirH6019.exe 81 PID 4888 wrote to memory of 4572 4888 ziFX3479.exe 82 PID 4888 wrote to memory of 4572 4888 ziFX3479.exe 82 PID 4888 wrote to memory of 3588 4888 ziFX3479.exe 87 PID 4888 wrote to memory of 3588 4888 ziFX3479.exe 87 PID 4888 wrote to memory of 3588 4888 ziFX3479.exe 87 PID 1356 wrote to memory of 1228 1356 zirH6019.exe 91 PID 1356 wrote to memory of 1228 1356 zirH6019.exe 91 PID 1356 wrote to memory of 1228 1356 zirH6019.exe 91 PID 3152 wrote to memory of 4380 3152 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe 92 PID 3152 wrote to memory of 4380 3152 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe 92 PID 3152 wrote to memory of 4380 3152 6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe 92 PID 4380 wrote to memory of 2224 4380 lr662052.exe 102 PID 4380 wrote to memory of 2224 4380 lr662052.exe 102 PID 4380 wrote to memory of 2224 4380 lr662052.exe 102 PID 2224 wrote to memory of 3612 2224 oneetx.exe 122 PID 2224 wrote to memory of 3612 2224 oneetx.exe 122 PID 2224 wrote to memory of 3612 2224 oneetx.exe 122 PID 2224 wrote to memory of 3180 2224 oneetx.exe 128 PID 2224 wrote to memory of 3180 2224 oneetx.exe 128 PID 2224 wrote to memory of 3180 2224 oneetx.exe 128 PID 3180 wrote to memory of 2184 3180 cmd.exe 132 PID 3180 wrote to memory of 2184 3180 cmd.exe 132 PID 3180 wrote to memory of 2184 3180 cmd.exe 132 PID 3180 wrote to memory of 3928 3180 cmd.exe 133 PID 3180 wrote to memory of 3928 3180 cmd.exe 133 PID 3180 wrote to memory of 3928 3180 cmd.exe 133 PID 3180 wrote to memory of 3712 3180 cmd.exe 134 PID 3180 wrote to memory of 3712 3180 cmd.exe 134 PID 3180 wrote to memory of 3712 3180 cmd.exe 134 PID 3180 wrote to memory of 3752 3180 cmd.exe 135 PID 3180 wrote to memory of 3752 3180 cmd.exe 135 PID 3180 wrote to memory of 3752 3180 cmd.exe 135 PID 3180 wrote to memory of 4852 3180 cmd.exe 136 PID 3180 wrote to memory of 4852 3180 cmd.exe 136 PID 3180 wrote to memory of 4852 3180 cmd.exe 136 PID 3180 wrote to memory of 5044 3180 cmd.exe 137 PID 3180 wrote to memory of 5044 3180 cmd.exe 137 PID 3180 wrote to memory of 5044 3180 cmd.exe 137 PID 2224 wrote to memory of 4316 2224 oneetx.exe 154 PID 2224 wrote to memory of 4316 2224 oneetx.exe 154 PID 2224 wrote to memory of 4316 2224 oneetx.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe"C:\Users\Admin\AppData\Local\Temp\6b5c997b48207961ce16ecd30e148bbf10374998b15cd93ffeedae3fe33d4863.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirH6019.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirH6019.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFX3479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFX3479.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it783916.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it783916.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr530948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr530948.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 16565⤵
- Program crash
PID:1004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp962646.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp962646.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr662052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr662052.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 6963⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 6923⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 8163⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 11843⤵
- Program crash
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 6924⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 10044⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 10124⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 10804⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 11044⤵
- Program crash
PID:744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 11124⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 11204⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 11524⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 9924⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 13244⤵
- Program crash
PID:668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:5044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 7844⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 13244⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 13084⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 6924⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 11364⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 16164⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 11764⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 16324⤵
- Program crash
PID:4956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 16083⤵
- Program crash
PID:4652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3588 -ip 35881⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4380 -ip 43801⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 4380 -ip 43801⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4380 -ip 43801⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4380 -ip 43801⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4380 -ip 43801⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2224 -ip 22241⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2224 -ip 22241⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2224 -ip 22241⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2224 -ip 22241⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2224 -ip 22241⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2224 -ip 22241⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2224 -ip 22241⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2224 -ip 22241⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2224 -ip 22241⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2224 -ip 22241⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2224 -ip 22241⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2224 -ip 22241⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2224 -ip 22241⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2224 -ip 22241⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2224 -ip 22241⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 3162⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2604 -ip 26041⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2224 -ip 22241⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2224 -ip 22241⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2224 -ip 22241⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 3202⤵
- Program crash
PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3568 -ip 35681⤵PID:824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
568KB
MD5d3c795ed4170041e7fab396f6a54d979
SHA18633754fe1c13b5b414daea6ff31a4e5deb65291
SHA256e72c2ded89d5a6de2587603accbd38495bcfc22352c78beb1cea5a0379df47e9
SHA51260ad4f49225d8d86d06e07a00a8d5d1a117665b5a9c99dc89ae4362bdea4e75c516f7d2ec56fee4fadfb1ab10da388df53bc9ffbc340969876c8c51fd8e860da
-
Filesize
568KB
MD5d3c795ed4170041e7fab396f6a54d979
SHA18633754fe1c13b5b414daea6ff31a4e5deb65291
SHA256e72c2ded89d5a6de2587603accbd38495bcfc22352c78beb1cea5a0379df47e9
SHA51260ad4f49225d8d86d06e07a00a8d5d1a117665b5a9c99dc89ae4362bdea4e75c516f7d2ec56fee4fadfb1ab10da388df53bc9ffbc340969876c8c51fd8e860da
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
414KB
MD585caa3cf041550e6092a46d18411903d
SHA1448b083815cf91b61ea09b2b57be7f84d13a4be1
SHA2563b6d737a5d92252875b6bcc1afa6b8cf787ed8c847159d6e4a0c134f420f3675
SHA5124f53b611a6e14e79cdedc2d1f80390ad2103f39b92ecee147cfa0703bb83bf1e115d1bccfb61b20646b41484d401f3317c2d1df9a2a23b903ef66ce858cffa80
-
Filesize
414KB
MD585caa3cf041550e6092a46d18411903d
SHA1448b083815cf91b61ea09b2b57be7f84d13a4be1
SHA2563b6d737a5d92252875b6bcc1afa6b8cf787ed8c847159d6e4a0c134f420f3675
SHA5124f53b611a6e14e79cdedc2d1f80390ad2103f39b92ecee147cfa0703bb83bf1e115d1bccfb61b20646b41484d401f3317c2d1df9a2a23b903ef66ce858cffa80
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5a7318df2d0cfce0fd9dedbe817d98c27
SHA1065a790ade5b7ae5a09be95432b12abc6c9961c0
SHA256abf0be581e55e8830bb5442cb93e49e840429535d5022338ae4095ca7110cdf2
SHA512762e364398a3f712e3c7e235affbdfa47844b2ef6d1d248cb0c5e36e9dc047249f7f4bf6f96594281c1a84b77587731afdf0c0ea4f0bf1cdf146f0f701708703
-
Filesize
359KB
MD5a7318df2d0cfce0fd9dedbe817d98c27
SHA1065a790ade5b7ae5a09be95432b12abc6c9961c0
SHA256abf0be581e55e8830bb5442cb93e49e840429535d5022338ae4095ca7110cdf2
SHA512762e364398a3f712e3c7e235affbdfa47844b2ef6d1d248cb0c5e36e9dc047249f7f4bf6f96594281c1a84b77587731afdf0c0ea4f0bf1cdf146f0f701708703
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
256KB
MD506966dd0ec7f6e9c804d04e91ee29fdf
SHA1828806d3a05aeaba5ed3a5cfebcf1be95df52de5
SHA256e9903d769f1548431fbd54fdd734c715d8f94406b71a50b8d4eb287a3e73ba66
SHA512dbcddbafb4043f6fb65999c9985afc81adb938bcf5dc4bdc227009207652c0fc6e3e5136b5bd6fcba751c0ff4e6874bfaab4465abb620b8fd65a10c182a9108e
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5