Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 08:17
Static task
static1
General
-
Target
4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe
-
Size
1.1MB
-
MD5
e4f71cbb39d9991ca8ab931a5794225b
-
SHA1
c89252b265b8dc3c7a9950031051be8efdf1fa30
-
SHA256
4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642
-
SHA512
be676fddc9714825183066fc60857db76c437e4fb0ce8d861f95149223d757882c87d202a71485a6702df43ce5d4e3ae9d9250d1e66d0c49af88d2fd60949b25
-
SSDEEP
24576:iyOWHb+JUs6Qt7b81uK5oV5puhO7KhdBgdrLdsUSwMqzc5yRQd:JF7Tmt7b81bOYhO7KFQr7zXUK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr534178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr534178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr534178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr534178.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr534178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr534178.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation si190377.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4176 un797500.exe 232 un099269.exe 4312 pr534178.exe 3840 qu173005.exe 4256 rk675166.exe 3312 si190377.exe 4480 oneetx.exe 2356 oneetx.exe 4380 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 400 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr534178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr534178.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un797500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un797500.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un099269.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un099269.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
pid pid_target Process procid_target 3976 4312 WerFault.exe 88 2712 3840 WerFault.exe 98 4884 3312 WerFault.exe 103 4768 3312 WerFault.exe 103 4440 3312 WerFault.exe 103 1088 3312 WerFault.exe 103 5084 3312 WerFault.exe 103 2996 3312 WerFault.exe 103 5060 3312 WerFault.exe 103 1888 3312 WerFault.exe 103 2204 3312 WerFault.exe 103 3664 3312 WerFault.exe 103 3280 4480 WerFault.exe 122 4292 4480 WerFault.exe 122 4140 4480 WerFault.exe 122 4392 4480 WerFault.exe 122 464 4480 WerFault.exe 122 4632 4480 WerFault.exe 122 4968 4480 WerFault.exe 122 688 4480 WerFault.exe 122 1428 4480 WerFault.exe 122 1784 4480 WerFault.exe 122 1724 4480 WerFault.exe 122 1988 4480 WerFault.exe 122 3956 4480 WerFault.exe 122 4940 4480 WerFault.exe 122 4528 4480 WerFault.exe 122 4796 2356 WerFault.exe 165 2572 4480 WerFault.exe 122 3680 4480 WerFault.exe 122 3892 4480 WerFault.exe 122 4520 4380 WerFault.exe 176 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4312 pr534178.exe 4312 pr534178.exe 3840 qu173005.exe 3840 qu173005.exe 4256 rk675166.exe 4256 rk675166.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4312 pr534178.exe Token: SeDebugPrivilege 3840 qu173005.exe Token: SeDebugPrivilege 4256 rk675166.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3312 si190377.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4176 4004 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe 86 PID 4004 wrote to memory of 4176 4004 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe 86 PID 4004 wrote to memory of 4176 4004 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe 86 PID 4176 wrote to memory of 232 4176 un797500.exe 87 PID 4176 wrote to memory of 232 4176 un797500.exe 87 PID 4176 wrote to memory of 232 4176 un797500.exe 87 PID 232 wrote to memory of 4312 232 un099269.exe 88 PID 232 wrote to memory of 4312 232 un099269.exe 88 PID 232 wrote to memory of 4312 232 un099269.exe 88 PID 232 wrote to memory of 3840 232 un099269.exe 98 PID 232 wrote to memory of 3840 232 un099269.exe 98 PID 232 wrote to memory of 3840 232 un099269.exe 98 PID 4176 wrote to memory of 4256 4176 un797500.exe 101 PID 4176 wrote to memory of 4256 4176 un797500.exe 101 PID 4176 wrote to memory of 4256 4176 un797500.exe 101 PID 4004 wrote to memory of 3312 4004 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe 103 PID 4004 wrote to memory of 3312 4004 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe 103 PID 4004 wrote to memory of 3312 4004 4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe 103 PID 3312 wrote to memory of 4480 3312 si190377.exe 122 PID 3312 wrote to memory of 4480 3312 si190377.exe 122 PID 3312 wrote to memory of 4480 3312 si190377.exe 122 PID 4480 wrote to memory of 4964 4480 oneetx.exe 139 PID 4480 wrote to memory of 4964 4480 oneetx.exe 139 PID 4480 wrote to memory of 4964 4480 oneetx.exe 139 PID 4480 wrote to memory of 3840 4480 oneetx.exe 145 PID 4480 wrote to memory of 3840 4480 oneetx.exe 145 PID 4480 wrote to memory of 3840 4480 oneetx.exe 145 PID 3840 wrote to memory of 2268 3840 cmd.exe 149 PID 3840 wrote to memory of 2268 3840 cmd.exe 149 PID 3840 wrote to memory of 2268 3840 cmd.exe 149 PID 3840 wrote to memory of 1496 3840 cmd.exe 150 PID 3840 wrote to memory of 1496 3840 cmd.exe 150 PID 3840 wrote to memory of 1496 3840 cmd.exe 150 PID 3840 wrote to memory of 1480 3840 cmd.exe 151 PID 3840 wrote to memory of 1480 3840 cmd.exe 151 PID 3840 wrote to memory of 1480 3840 cmd.exe 151 PID 3840 wrote to memory of 4228 3840 cmd.exe 152 PID 3840 wrote to memory of 4228 3840 cmd.exe 152 PID 3840 wrote to memory of 4228 3840 cmd.exe 152 PID 3840 wrote to memory of 1140 3840 cmd.exe 153 PID 3840 wrote to memory of 1140 3840 cmd.exe 153 PID 3840 wrote to memory of 1140 3840 cmd.exe 153 PID 3840 wrote to memory of 1336 3840 cmd.exe 154 PID 3840 wrote to memory of 1336 3840 cmd.exe 154 PID 3840 wrote to memory of 1336 3840 cmd.exe 154 PID 4480 wrote to memory of 400 4480 oneetx.exe 170 PID 4480 wrote to memory of 400 4480 oneetx.exe 170 PID 4480 wrote to memory of 400 4480 oneetx.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe"C:\Users\Admin\AppData\Local\Temp\4c4a5caef9e90603cb46ac85488de90add5c773abefa5dca4398653f04748642.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797500.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797500.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un099269.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un099269.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr534178.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr534178.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 10805⤵
- Program crash
PID:3976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu173005.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu173005.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 13205⤵
- Program crash
PID:2712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk675166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk675166.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190377.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190377.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 6963⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 7803⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 8563⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 9603⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 9683⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 9683⤵
- Program crash
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 12163⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 12323⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 13163⤵
- Program crash
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 6924⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7924⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8364⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 10524⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 10884⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 11084⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 11164⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 9924⤵
- Program crash
PID:688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 12244⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 12684⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7524⤵
- Program crash
PID:1724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 1324⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8684⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 14564⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 11364⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 16724⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 16124⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 16884⤵
- Program crash
PID:3892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 8003⤵
- Program crash
PID:3664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4312 -ip 43121⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3840 -ip 38401⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3312 -ip 33121⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3312 -ip 33121⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3312 -ip 33121⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3312 -ip 33121⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3312 -ip 33121⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3312 -ip 33121⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3312 -ip 33121⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3312 -ip 33121⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3312 -ip 33121⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3312 -ip 33121⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4480 -ip 44801⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4480 -ip 44801⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4480 -ip 44801⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4480 -ip 44801⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4480 -ip 44801⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4480 -ip 44801⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4480 -ip 44801⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4480 -ip 44801⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4480 -ip 44801⤵PID:1720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4480 -ip 44801⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4480 -ip 44801⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4480 -ip 44801⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4480 -ip 44801⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4480 -ip 44801⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4480 -ip 44801⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 3122⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2356 -ip 23561⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4480 -ip 44801⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4480 -ip 44801⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4480 -ip 44801⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 3162⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4380 -ip 43801⤵PID:4668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
763KB
MD58fe220b728d8745592600f0fe8cf101f
SHA19073eb18a02514f803e44c4d2660ff30f24b48d4
SHA256f3c268258cc0668ae8ab82395612479bcd5a01e2f03dfb12be80fed81db7ecde
SHA512fa285a7131a6da6b95598cd9449df454e1c329262c46364df33d472c7a937c8db1c763785e6030b5d62f9562799964711d62ad79f03b2e750c56fa166e7aad43
-
Filesize
763KB
MD58fe220b728d8745592600f0fe8cf101f
SHA19073eb18a02514f803e44c4d2660ff30f24b48d4
SHA256f3c268258cc0668ae8ab82395612479bcd5a01e2f03dfb12be80fed81db7ecde
SHA512fa285a7131a6da6b95598cd9449df454e1c329262c46364df33d472c7a937c8db1c763785e6030b5d62f9562799964711d62ad79f03b2e750c56fa166e7aad43
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
609KB
MD5e6b5c6f26ea3d5cca1537ce1db4c7f02
SHA178dd554a84fb4c929cac881a92cfa15262d12fad
SHA25630f3332aca9588d3d13b4d285cd66674dbf5e76d71b894f641589aef2978c3be
SHA512336da45551386cae0724b0a2ff1091b4922484b91a982d465f47947124b69387985ec8477616f1b4bfb3634d84f5997af1c20361aabb1993cf0fa592aacd07c6
-
Filesize
609KB
MD5e6b5c6f26ea3d5cca1537ce1db4c7f02
SHA178dd554a84fb4c929cac881a92cfa15262d12fad
SHA25630f3332aca9588d3d13b4d285cd66674dbf5e76d71b894f641589aef2978c3be
SHA512336da45551386cae0724b0a2ff1091b4922484b91a982d465f47947124b69387985ec8477616f1b4bfb3634d84f5997af1c20361aabb1993cf0fa592aacd07c6
-
Filesize
403KB
MD5ee8af3d73df9b560ba02c4ddb2ba1538
SHA17017aac232bbd2ffd1a594f21af5c7b24897c9ef
SHA256f4ba087013062af0b9826a7f13d7b5e397b6815e29beb71efcf9eaf653dbf511
SHA5127892ce50abac82071a443104a7bf5ec23e63770b6d7381f26c7078137ec3baf5f2fdad956085dadc2e66605f25e1272a88b2bd36a653216b4015c39f84e106ce
-
Filesize
403KB
MD5ee8af3d73df9b560ba02c4ddb2ba1538
SHA17017aac232bbd2ffd1a594f21af5c7b24897c9ef
SHA256f4ba087013062af0b9826a7f13d7b5e397b6815e29beb71efcf9eaf653dbf511
SHA5127892ce50abac82071a443104a7bf5ec23e63770b6d7381f26c7078137ec3baf5f2fdad956085dadc2e66605f25e1272a88b2bd36a653216b4015c39f84e106ce
-
Filesize
485KB
MD5a7c27a9f27d5030f38a13a2a9774df4c
SHA1d296b73bf24d8763cea68060ebc0e946098f616b
SHA256e69efe0c1b0343b6cf7836c04e7e3fe2e7cfc7f636961eed69e6ec0465790732
SHA5121629f99c0df0fcafe0daa158070053bd5f33aa8dbedcce168885851607dcd728dc34169dd4ec0ca529dcb6d6923098ac70db2f62dbb6ab284d5f98ad1c5a3786
-
Filesize
485KB
MD5a7c27a9f27d5030f38a13a2a9774df4c
SHA1d296b73bf24d8763cea68060ebc0e946098f616b
SHA256e69efe0c1b0343b6cf7836c04e7e3fe2e7cfc7f636961eed69e6ec0465790732
SHA5121629f99c0df0fcafe0daa158070053bd5f33aa8dbedcce168885851607dcd728dc34169dd4ec0ca529dcb6d6923098ac70db2f62dbb6ab284d5f98ad1c5a3786
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
381KB
MD547cdf103a1acbe0faa0fe28e9a77ca1f
SHA14650bc2f0d3ff2fc7a589c6f46711be418c5f67b
SHA256c5c148a572be1778100df4110d4314b2e2b290b676de58e52708edce88071a08
SHA5125cec14613fd81ccfac652baa6f40625d25e817b1df419179f46237ab1a482b3148778b1a1971e3a6cf47ea252fec020f0a5ebcdde74d95da2020f5202bc7a568
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5