Analysis
-
max time kernel
142s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 04:29
Static task
static1
General
-
Target
3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe
-
Size
966KB
-
MD5
6fe75921acf834450891d19e23c0e40f
-
SHA1
7a7735d5aca43e946274201e12c34863c6497bd9
-
SHA256
3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf
-
SHA512
31bbb99cc3f1aefe8a617c78e34b8209c3b6bd7cf535537f49c97aceceabc3582df89907aff084c92d6cd6737e317e8bed1250f08dd8cb57a7a853942072c9ad
-
SSDEEP
24576:7yK7aJfrzOTi+7omUqH8iAz4DI7eBmFyBrafPgk7aB:uK7u3Rd72meroo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr014390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr014390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr014390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr014390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr014390.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr014390.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si983705.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2152 un736963.exe 860 un855051.exe 2620 pr014390.exe 4612 qu924299.exe 960 rk148294.exe 3988 si983705.exe 5112 oneetx.exe 384 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1296 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr014390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr014390.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un736963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un736963.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un855051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un855051.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 384 3988 WerFault.exe 95 2628 3988 WerFault.exe 95 4016 3988 WerFault.exe 95 1492 3988 WerFault.exe 95 3648 3988 WerFault.exe 95 1016 3988 WerFault.exe 95 2276 3988 WerFault.exe 95 1744 3988 WerFault.exe 95 3832 3988 WerFault.exe 95 4812 3988 WerFault.exe 95 216 5112 WerFault.exe 114 4520 5112 WerFault.exe 114 692 5112 WerFault.exe 114 3896 5112 WerFault.exe 114 1156 5112 WerFault.exe 114 1100 5112 WerFault.exe 114 3768 5112 WerFault.exe 114 2828 5112 WerFault.exe 114 536 5112 WerFault.exe 114 876 5112 WerFault.exe 114 3220 5112 WerFault.exe 114 4448 5112 WerFault.exe 114 860 5112 WerFault.exe 114 4360 5112 WerFault.exe 114 1096 5112 WerFault.exe 114 4180 384 WerFault.exe 157 2668 5112 WerFault.exe 114 396 5112 WerFault.exe 114 5076 5112 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2620 pr014390.exe 2620 pr014390.exe 4612 qu924299.exe 4612 qu924299.exe 960 rk148294.exe 960 rk148294.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2620 pr014390.exe Token: SeDebugPrivilege 4612 qu924299.exe Token: SeDebugPrivilege 960 rk148294.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3988 si983705.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2152 1928 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe 82 PID 1928 wrote to memory of 2152 1928 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe 82 PID 1928 wrote to memory of 2152 1928 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe 82 PID 2152 wrote to memory of 860 2152 un736963.exe 83 PID 2152 wrote to memory of 860 2152 un736963.exe 83 PID 2152 wrote to memory of 860 2152 un736963.exe 83 PID 860 wrote to memory of 2620 860 un855051.exe 84 PID 860 wrote to memory of 2620 860 un855051.exe 84 PID 860 wrote to memory of 2620 860 un855051.exe 84 PID 860 wrote to memory of 4612 860 un855051.exe 91 PID 860 wrote to memory of 4612 860 un855051.exe 91 PID 860 wrote to memory of 4612 860 un855051.exe 91 PID 2152 wrote to memory of 960 2152 un736963.exe 94 PID 2152 wrote to memory of 960 2152 un736963.exe 94 PID 2152 wrote to memory of 960 2152 un736963.exe 94 PID 1928 wrote to memory of 3988 1928 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe 95 PID 1928 wrote to memory of 3988 1928 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe 95 PID 1928 wrote to memory of 3988 1928 3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe 95 PID 3988 wrote to memory of 5112 3988 si983705.exe 114 PID 3988 wrote to memory of 5112 3988 si983705.exe 114 PID 3988 wrote to memory of 5112 3988 si983705.exe 114 PID 5112 wrote to memory of 532 5112 oneetx.exe 131 PID 5112 wrote to memory of 532 5112 oneetx.exe 131 PID 5112 wrote to memory of 532 5112 oneetx.exe 131 PID 5112 wrote to memory of 4100 5112 oneetx.exe 137 PID 5112 wrote to memory of 4100 5112 oneetx.exe 137 PID 5112 wrote to memory of 4100 5112 oneetx.exe 137 PID 4100 wrote to memory of 1524 4100 cmd.exe 141 PID 4100 wrote to memory of 1524 4100 cmd.exe 141 PID 4100 wrote to memory of 1524 4100 cmd.exe 141 PID 4100 wrote to memory of 4352 4100 cmd.exe 142 PID 4100 wrote to memory of 4352 4100 cmd.exe 142 PID 4100 wrote to memory of 4352 4100 cmd.exe 142 PID 4100 wrote to memory of 4668 4100 cmd.exe 143 PID 4100 wrote to memory of 4668 4100 cmd.exe 143 PID 4100 wrote to memory of 4668 4100 cmd.exe 143 PID 4100 wrote to memory of 2220 4100 cmd.exe 144 PID 4100 wrote to memory of 2220 4100 cmd.exe 144 PID 4100 wrote to memory of 2220 4100 cmd.exe 144 PID 4100 wrote to memory of 5104 4100 cmd.exe 145 PID 4100 wrote to memory of 5104 4100 cmd.exe 145 PID 4100 wrote to memory of 5104 4100 cmd.exe 145 PID 4100 wrote to memory of 4240 4100 cmd.exe 146 PID 4100 wrote to memory of 4240 4100 cmd.exe 146 PID 4100 wrote to memory of 4240 4100 cmd.exe 146 PID 5112 wrote to memory of 1296 5112 oneetx.exe 162 PID 5112 wrote to memory of 1296 5112 oneetx.exe 162 PID 5112 wrote to memory of 1296 5112 oneetx.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe"C:\Users\Admin\AppData\Local\Temp\3c493cc1178df4ef549ea5da9e103f4c1bd791682f967ade1f09dd6080c327bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un736963.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un736963.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855051.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr014390.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr014390.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu924299.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu924299.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk148294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk148294.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si983705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si983705.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 6963⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7723⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7963⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 9803⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 9763⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 9883⤵
- Program crash
PID:1016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 11963⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 12363⤵
- Program crash
PID:1744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 12203⤵
- Program crash
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 6924⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 8444⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 9124⤵
- Program crash
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10524⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10724⤵
- Program crash
PID:1156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10724⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10844⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 10004⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 7764⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:5104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 8884⤵
- Program crash
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 6924⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 12644⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 7684⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 14924⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 11244⤵
- Program crash
PID:1096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 16324⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 15844⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 16484⤵
- Program crash
PID:5076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 13683⤵
- Program crash
PID:4812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3988 -ip 39881⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3988 -ip 39881⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3988 -ip 39881⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3988 -ip 39881⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3988 -ip 39881⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3988 -ip 39881⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3988 -ip 39881⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3988 -ip 39881⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3988 -ip 39881⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3988 -ip 39881⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5112 -ip 51121⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5112 -ip 51121⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5112 -ip 51121⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5112 -ip 51121⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5112 -ip 51121⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5112 -ip 51121⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5112 -ip 51121⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5112 -ip 51121⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 5112 -ip 51121⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5112 -ip 51121⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5112 -ip 51121⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5112 -ip 51121⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5112 -ip 51121⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5112 -ip 51121⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5112 -ip 51121⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 3162⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 384 -ip 3841⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 5112 -ip 51121⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5112 -ip 51121⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5112 -ip 51121⤵PID:5108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a7afb6d49219228dafb4dcd50935d45e
SHA1f4a3a09defa41188b90823f41f791e7c52964ba8
SHA2562da04ab50c7294cb0262a5c8d222fd2c1cbef890c295a1f086ccd7eac3a13d13
SHA51234ae8a545ec0c0dba11959be569d6f18c3e25d4d6c5e79cc562837143629471a3f608ffd3cacc478bc9db5cf21ff22f30200cd4f736e6e056302493e28f2ebf3
-
Filesize
256KB
MD5a7afb6d49219228dafb4dcd50935d45e
SHA1f4a3a09defa41188b90823f41f791e7c52964ba8
SHA2562da04ab50c7294cb0262a5c8d222fd2c1cbef890c295a1f086ccd7eac3a13d13
SHA51234ae8a545ec0c0dba11959be569d6f18c3e25d4d6c5e79cc562837143629471a3f608ffd3cacc478bc9db5cf21ff22f30200cd4f736e6e056302493e28f2ebf3
-
Filesize
707KB
MD50bf31a5dcd2df05d52567d9f035a26f0
SHA1f4285320027705874266ae594de4928751abba00
SHA256df89e961767c9c5472b4e613e126a0c957b206547aeb12f64febe8ae87ef732f
SHA5126dfe9fac6c3e88ba5a01766bd3dfd3c77a7d7a0883d1d73e4e6bff72f7475f5ffccfc3231737cb3093d1c4c56b7f3b420d66fa175c223ee054f6dde995ac66fc
-
Filesize
707KB
MD50bf31a5dcd2df05d52567d9f035a26f0
SHA1f4285320027705874266ae594de4928751abba00
SHA256df89e961767c9c5472b4e613e126a0c957b206547aeb12f64febe8ae87ef732f
SHA5126dfe9fac6c3e88ba5a01766bd3dfd3c77a7d7a0883d1d73e4e6bff72f7475f5ffccfc3231737cb3093d1c4c56b7f3b420d66fa175c223ee054f6dde995ac66fc
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
553KB
MD55afa5f0e294d6f8cdc033ca48d739443
SHA1799259e86247927b139e54e46987974181573d81
SHA256cdd64a8ad6d76c1aee521605d318d0817e4003dd3d9077d38ac183e935829120
SHA51254634e5a9db9ea6e618a9d81c87c1af9e964430f5cab4dba1c3dd3a27d5018a129d6d9a5aced31a05262a21492a9fbdea07d4dabc159334c99f9407099102dda
-
Filesize
553KB
MD55afa5f0e294d6f8cdc033ca48d739443
SHA1799259e86247927b139e54e46987974181573d81
SHA256cdd64a8ad6d76c1aee521605d318d0817e4003dd3d9077d38ac183e935829120
SHA51254634e5a9db9ea6e618a9d81c87c1af9e964430f5cab4dba1c3dd3a27d5018a129d6d9a5aced31a05262a21492a9fbdea07d4dabc159334c99f9407099102dda
-
Filesize
278KB
MD5db513cbb95733b03f02ccfdbd58a00ac
SHA1f7bf0f5d28fe4db9d1542f35e3c1d4db1961bcdc
SHA256b1bb0d3c39da23e6bce2e586505bfef8fb3dc0e01b5def71a61227f3febc9cb9
SHA512c8dc68b60404dde09ee7f2014227331a986f2a3f92b1757d8a34c61705f8a04a8e27247bcb0a08e9907332cfc52e35e3b0bf04637b7f6141619c5aef31cd866f
-
Filesize
278KB
MD5db513cbb95733b03f02ccfdbd58a00ac
SHA1f7bf0f5d28fe4db9d1542f35e3c1d4db1961bcdc
SHA256b1bb0d3c39da23e6bce2e586505bfef8fb3dc0e01b5def71a61227f3febc9cb9
SHA512c8dc68b60404dde09ee7f2014227331a986f2a3f92b1757d8a34c61705f8a04a8e27247bcb0a08e9907332cfc52e35e3b0bf04637b7f6141619c5aef31cd866f
-
Filesize
360KB
MD55767c4437abcc623eed732f59a81e1bc
SHA196ef85a845561fc80efdb31dd4fbee99349d2e4e
SHA2569a9f6cbb2f928d09fb9ce0707d1c5e25193dd96b275e75d5de57ad672dcbdc82
SHA512f5ff9c30003515e94f1c996cf137d2e8ef253a14676510924cac9e7c8cfa4daf36927e4f232c1005d64493d2fe7c2bd511eaf3cbfa20dbae12a649f6c2dbc7e2
-
Filesize
360KB
MD55767c4437abcc623eed732f59a81e1bc
SHA196ef85a845561fc80efdb31dd4fbee99349d2e4e
SHA2569a9f6cbb2f928d09fb9ce0707d1c5e25193dd96b275e75d5de57ad672dcbdc82
SHA512f5ff9c30003515e94f1c996cf137d2e8ef253a14676510924cac9e7c8cfa4daf36927e4f232c1005d64493d2fe7c2bd511eaf3cbfa20dbae12a649f6c2dbc7e2
-
Filesize
256KB
MD5a7afb6d49219228dafb4dcd50935d45e
SHA1f4a3a09defa41188b90823f41f791e7c52964ba8
SHA2562da04ab50c7294cb0262a5c8d222fd2c1cbef890c295a1f086ccd7eac3a13d13
SHA51234ae8a545ec0c0dba11959be569d6f18c3e25d4d6c5e79cc562837143629471a3f608ffd3cacc478bc9db5cf21ff22f30200cd4f736e6e056302493e28f2ebf3
-
Filesize
256KB
MD5a7afb6d49219228dafb4dcd50935d45e
SHA1f4a3a09defa41188b90823f41f791e7c52964ba8
SHA2562da04ab50c7294cb0262a5c8d222fd2c1cbef890c295a1f086ccd7eac3a13d13
SHA51234ae8a545ec0c0dba11959be569d6f18c3e25d4d6c5e79cc562837143629471a3f608ffd3cacc478bc9db5cf21ff22f30200cd4f736e6e056302493e28f2ebf3
-
Filesize
256KB
MD5a7afb6d49219228dafb4dcd50935d45e
SHA1f4a3a09defa41188b90823f41f791e7c52964ba8
SHA2562da04ab50c7294cb0262a5c8d222fd2c1cbef890c295a1f086ccd7eac3a13d13
SHA51234ae8a545ec0c0dba11959be569d6f18c3e25d4d6c5e79cc562837143629471a3f608ffd3cacc478bc9db5cf21ff22f30200cd4f736e6e056302493e28f2ebf3
-
Filesize
256KB
MD5a7afb6d49219228dafb4dcd50935d45e
SHA1f4a3a09defa41188b90823f41f791e7c52964ba8
SHA2562da04ab50c7294cb0262a5c8d222fd2c1cbef890c295a1f086ccd7eac3a13d13
SHA51234ae8a545ec0c0dba11959be569d6f18c3e25d4d6c5e79cc562837143629471a3f608ffd3cacc478bc9db5cf21ff22f30200cd4f736e6e056302493e28f2ebf3
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5