Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 04:32
Static task
static1
General
-
Target
4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe
-
Size
828KB
-
MD5
edf036fc0d261ad2d63612b5b772e60c
-
SHA1
e34178b06a62f3dcb6eac1f33a9261bea90f04a3
-
SHA256
4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48
-
SHA512
f5ed08864dd2267085023753f4683b72b9d2d29132a30cd2507de0864be1e78718c3db61bd2cf757b6e7ae6d28c2a73a2f271f72c7bb57775322075a10bf040a
-
SSDEEP
12288:Fy90N4KlDqZo5TKi1/LCs0tp77MT9GAu/NW76LVAOkIfzhapL9o8roQ2D:FyI4Mq3iNpw77Hr/NW76pAAhVN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it041996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it041996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it041996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it041996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it041996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it041996.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lr160651.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 3208 ziLY9498.exe 3752 zitz5404.exe 4912 it041996.exe 2144 jr103524.exe 872 kp436608.exe 3216 lr160651.exe 3916 oneetx.exe 4872 oneetx.exe 3236 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3356 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it041996.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLY9498.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitz5404.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zitz5404.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLY9498.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 4904 3216 WerFault.exe 90 3272 3216 WerFault.exe 90 3928 3216 WerFault.exe 90 2148 3216 WerFault.exe 90 1428 3216 WerFault.exe 90 3800 3216 WerFault.exe 90 2652 3216 WerFault.exe 90 1644 3216 WerFault.exe 90 980 3216 WerFault.exe 90 3640 3216 WerFault.exe 90 4084 3916 WerFault.exe 114 4220 3916 WerFault.exe 114 1260 3916 WerFault.exe 114 4856 3916 WerFault.exe 114 4024 3916 WerFault.exe 114 4272 3916 WerFault.exe 114 2264 3916 WerFault.exe 114 4760 3916 WerFault.exe 114 2272 3916 WerFault.exe 114 4204 3916 WerFault.exe 114 3128 3916 WerFault.exe 114 3864 3916 WerFault.exe 114 4812 3916 WerFault.exe 114 2352 4872 WerFault.exe 154 1428 3916 WerFault.exe 114 1644 3916 WerFault.exe 114 1800 3916 WerFault.exe 114 4764 3236 WerFault.exe 164 4192 3916 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4912 it041996.exe 4912 it041996.exe 2144 jr103524.exe 2144 jr103524.exe 872 kp436608.exe 872 kp436608.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4912 it041996.exe Token: SeDebugPrivilege 2144 jr103524.exe Token: SeDebugPrivilege 872 kp436608.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3216 lr160651.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3208 4616 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe 82 PID 4616 wrote to memory of 3208 4616 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe 82 PID 4616 wrote to memory of 3208 4616 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe 82 PID 3208 wrote to memory of 3752 3208 ziLY9498.exe 83 PID 3208 wrote to memory of 3752 3208 ziLY9498.exe 83 PID 3208 wrote to memory of 3752 3208 ziLY9498.exe 83 PID 3752 wrote to memory of 4912 3752 zitz5404.exe 84 PID 3752 wrote to memory of 4912 3752 zitz5404.exe 84 PID 3752 wrote to memory of 2144 3752 zitz5404.exe 88 PID 3752 wrote to memory of 2144 3752 zitz5404.exe 88 PID 3752 wrote to memory of 2144 3752 zitz5404.exe 88 PID 3208 wrote to memory of 872 3208 ziLY9498.exe 89 PID 3208 wrote to memory of 872 3208 ziLY9498.exe 89 PID 3208 wrote to memory of 872 3208 ziLY9498.exe 89 PID 4616 wrote to memory of 3216 4616 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe 90 PID 4616 wrote to memory of 3216 4616 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe 90 PID 4616 wrote to memory of 3216 4616 4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe 90 PID 3216 wrote to memory of 3916 3216 lr160651.exe 114 PID 3216 wrote to memory of 3916 3216 lr160651.exe 114 PID 3216 wrote to memory of 3916 3216 lr160651.exe 114 PID 3916 wrote to memory of 4980 3916 oneetx.exe 132 PID 3916 wrote to memory of 4980 3916 oneetx.exe 132 PID 3916 wrote to memory of 4980 3916 oneetx.exe 132 PID 3916 wrote to memory of 1812 3916 oneetx.exe 138 PID 3916 wrote to memory of 1812 3916 oneetx.exe 138 PID 3916 wrote to memory of 1812 3916 oneetx.exe 138 PID 1812 wrote to memory of 2464 1812 cmd.exe 142 PID 1812 wrote to memory of 2464 1812 cmd.exe 142 PID 1812 wrote to memory of 2464 1812 cmd.exe 142 PID 1812 wrote to memory of 952 1812 cmd.exe 143 PID 1812 wrote to memory of 952 1812 cmd.exe 143 PID 1812 wrote to memory of 952 1812 cmd.exe 143 PID 1812 wrote to memory of 2236 1812 cmd.exe 144 PID 1812 wrote to memory of 2236 1812 cmd.exe 144 PID 1812 wrote to memory of 2236 1812 cmd.exe 144 PID 1812 wrote to memory of 1448 1812 cmd.exe 145 PID 1812 wrote to memory of 1448 1812 cmd.exe 145 PID 1812 wrote to memory of 1448 1812 cmd.exe 145 PID 1812 wrote to memory of 2020 1812 cmd.exe 146 PID 1812 wrote to memory of 2020 1812 cmd.exe 146 PID 1812 wrote to memory of 2020 1812 cmd.exe 146 PID 1812 wrote to memory of 1760 1812 cmd.exe 147 PID 1812 wrote to memory of 1760 1812 cmd.exe 147 PID 1812 wrote to memory of 1760 1812 cmd.exe 147 PID 3916 wrote to memory of 3356 3916 oneetx.exe 161 PID 3916 wrote to memory of 3356 3916 oneetx.exe 161 PID 3916 wrote to memory of 3356 3916 oneetx.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe"C:\Users\Admin\AppData\Local\Temp\4119d812dd41b04295a5f189a62ebe9b342e6773c35150bf161dc58453f08b48.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLY9498.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLY9498.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zitz5404.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zitz5404.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it041996.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it041996.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr103524.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr103524.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp436608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp436608.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr160651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr160651.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6963⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 7803⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 8603⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 8683⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 9763⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 8683⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 12203⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 12203⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 13203⤵
- Program crash
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 6924⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 8444⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 8684⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10524⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10724⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10724⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10964⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 9164⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 7684⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 13004⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 12724⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 7804⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 12684⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 11044⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 16004⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 16164⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 16324⤵
- Program crash
PID:4192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 7483⤵
- Program crash
PID:3640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3216 -ip 32161⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3216 -ip 32161⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3216 -ip 32161⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3216 -ip 32161⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3216 -ip 32161⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3216 -ip 32161⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3216 -ip 32161⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3216 -ip 32161⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3216 -ip 32161⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3216 -ip 32161⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3916 -ip 39161⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3916 -ip 39161⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3916 -ip 39161⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3916 -ip 39161⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3916 -ip 39161⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3916 -ip 39161⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3916 -ip 39161⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3916 -ip 39161⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3916 -ip 39161⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3916 -ip 39161⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3916 -ip 39161⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3916 -ip 39161⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3916 -ip 39161⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 3162⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4872 -ip 48721⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3916 -ip 39161⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3916 -ip 39161⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3916 -ip 39161⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 3122⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3236 -ip 32361⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3916 -ip 39161⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
569KB
MD539343e873a947b797062dad4177bdb4f
SHA1443079ab9ffdff46d692cad038b71ed198c5262f
SHA25618b1c25025bab6ea96dc4710efef05d86554a51bd10c0915e557970878c2d230
SHA5121cf20cf40392b2fac7aa0f9439ace2d6e639826a5732d154c2a7bd0551340ddf869dc15aed0a4955360d21993b38d3a9128ffd5e8cb49ee9d01f7bbcdbfc200e
-
Filesize
569KB
MD539343e873a947b797062dad4177bdb4f
SHA1443079ab9ffdff46d692cad038b71ed198c5262f
SHA25618b1c25025bab6ea96dc4710efef05d86554a51bd10c0915e557970878c2d230
SHA5121cf20cf40392b2fac7aa0f9439ace2d6e639826a5732d154c2a7bd0551340ddf869dc15aed0a4955360d21993b38d3a9128ffd5e8cb49ee9d01f7bbcdbfc200e
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
415KB
MD583d9014c815e961e678efbd4815652b6
SHA11fedd10b5f45c5cb61fcf3d9b7d7bb884557628d
SHA256d665f72df650aaae52498f4a7d9045ad6ece0c960d00a2330394ce57bf01e804
SHA512bd46bfc9324d6bfb17ce96b500704d88e4f3a868377c584e79163d1186500b8d3db2aba77093f230af7d7b300f67803b56959bbd7ceff8ab762d3f4468d1bc8b
-
Filesize
415KB
MD583d9014c815e961e678efbd4815652b6
SHA11fedd10b5f45c5cb61fcf3d9b7d7bb884557628d
SHA256d665f72df650aaae52498f4a7d9045ad6ece0c960d00a2330394ce57bf01e804
SHA512bd46bfc9324d6bfb17ce96b500704d88e4f3a868377c584e79163d1186500b8d3db2aba77093f230af7d7b300f67803b56959bbd7ceff8ab762d3f4468d1bc8b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD52ccdfaaa7e56ecdb3a2467724012f1f9
SHA19bf0c24bfc2ca6987865a5c433fd41675ba4879f
SHA2562e33fe6904ef7d6acb967135baf156382c53d02710663fa9b02586f59bd927a4
SHA5122e9659cceae6d04d838e94cdff2898a14ca1f3289a19cd9d59ee68634fe009c2a861dd85b9009183e654dbdfca9a3f6bdd9dedbd84d808dae1a00bf09040e601
-
Filesize
360KB
MD52ccdfaaa7e56ecdb3a2467724012f1f9
SHA19bf0c24bfc2ca6987865a5c433fd41675ba4879f
SHA2562e33fe6904ef7d6acb967135baf156382c53d02710663fa9b02586f59bd927a4
SHA5122e9659cceae6d04d838e94cdff2898a14ca1f3289a19cd9d59ee68634fe009c2a861dd85b9009183e654dbdfca9a3f6bdd9dedbd84d808dae1a00bf09040e601
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
256KB
MD55ea1ae42fb089d61cf4fab7109c6d08d
SHA197b363fd54d21660a18224a409f8df550721331f
SHA25663415fac08f52a17436a61719efd8f0a2691ea5bc31b47e397c6ae33cb02f90b
SHA512f47052a1c11a47c45451fa10ab0e597995a80daf428e0fd810adc761c5002ae239f6c87baab8e2e63340c16886b36dea76bfb4346c53062124a425a1d5f0d984
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5