Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 10:05
Static task
static1
General
-
Target
07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe
-
Size
1.1MB
-
MD5
54174a87649d0312c061705807b84663
-
SHA1
08a0714291432bbf6b700f3c482845588cdb55f6
-
SHA256
07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b
-
SHA512
6dc2f30cd048b11acad3e47f554e30c77df7b3acb89c90c27598506d5f7f76def4ff6c25636cd678d938d067beddd5f5d6966191d0a66bbb4fbf43c5edc813c1
-
SSDEEP
24576:/y9HkoTpkV43w4AktDRh0jrDGOY7bp8PfKT+fKKKlCuOIH7Q/5:K9Hg23XNh0XDG18Pfc+fKsuOG7Q/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr590487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr590487.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr590487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr590487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr590487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr590487.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si993544.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2156 un698062.exe 5008 un232244.exe 1516 pr590487.exe 1752 qu227358.exe 4980 rk781349.exe 4764 si993544.exe 2772 oneetx.exe 1232 oneetx.exe 888 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3896 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr590487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr590487.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un698062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un698062.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un232244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un232244.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
pid pid_target Process procid_target 3056 1516 WerFault.exe 84 2592 1752 WerFault.exe 93 2200 4764 WerFault.exe 99 5000 4764 WerFault.exe 99 1304 4764 WerFault.exe 99 1392 4764 WerFault.exe 99 2740 4764 WerFault.exe 99 3644 4764 WerFault.exe 99 4844 4764 WerFault.exe 99 1860 4764 WerFault.exe 99 380 4764 WerFault.exe 99 1460 4764 WerFault.exe 99 3032 4764 WerFault.exe 99 944 2772 WerFault.exe 120 4040 2772 WerFault.exe 120 3812 2772 WerFault.exe 120 3692 2772 WerFault.exe 120 2136 2772 WerFault.exe 120 4604 2772 WerFault.exe 120 4004 2772 WerFault.exe 120 5116 2772 WerFault.exe 120 4820 2772 WerFault.exe 120 4856 2772 WerFault.exe 120 4500 2772 WerFault.exe 120 4988 2772 WerFault.exe 120 3580 2772 WerFault.exe 120 1392 1232 WerFault.exe 159 2900 2772 WerFault.exe 120 3780 2772 WerFault.exe 120 2128 2772 WerFault.exe 120 3032 888 WerFault.exe 169 488 2772 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1516 pr590487.exe 1516 pr590487.exe 1752 qu227358.exe 1752 qu227358.exe 4980 rk781349.exe 4980 rk781349.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1516 pr590487.exe Token: SeDebugPrivilege 1752 qu227358.exe Token: SeDebugPrivilege 4980 rk781349.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4764 si993544.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 808 wrote to memory of 2156 808 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe 82 PID 808 wrote to memory of 2156 808 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe 82 PID 808 wrote to memory of 2156 808 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe 82 PID 2156 wrote to memory of 5008 2156 un698062.exe 83 PID 2156 wrote to memory of 5008 2156 un698062.exe 83 PID 2156 wrote to memory of 5008 2156 un698062.exe 83 PID 5008 wrote to memory of 1516 5008 un232244.exe 84 PID 5008 wrote to memory of 1516 5008 un232244.exe 84 PID 5008 wrote to memory of 1516 5008 un232244.exe 84 PID 5008 wrote to memory of 1752 5008 un232244.exe 93 PID 5008 wrote to memory of 1752 5008 un232244.exe 93 PID 5008 wrote to memory of 1752 5008 un232244.exe 93 PID 2156 wrote to memory of 4980 2156 un698062.exe 98 PID 2156 wrote to memory of 4980 2156 un698062.exe 98 PID 2156 wrote to memory of 4980 2156 un698062.exe 98 PID 808 wrote to memory of 4764 808 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe 99 PID 808 wrote to memory of 4764 808 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe 99 PID 808 wrote to memory of 4764 808 07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe 99 PID 4764 wrote to memory of 2772 4764 si993544.exe 120 PID 4764 wrote to memory of 2772 4764 si993544.exe 120 PID 4764 wrote to memory of 2772 4764 si993544.exe 120 PID 2772 wrote to memory of 1400 2772 oneetx.exe 137 PID 2772 wrote to memory of 1400 2772 oneetx.exe 137 PID 2772 wrote to memory of 1400 2772 oneetx.exe 137 PID 2772 wrote to memory of 2592 2772 oneetx.exe 143 PID 2772 wrote to memory of 2592 2772 oneetx.exe 143 PID 2772 wrote to memory of 2592 2772 oneetx.exe 143 PID 2592 wrote to memory of 4836 2592 cmd.exe 147 PID 2592 wrote to memory of 4836 2592 cmd.exe 147 PID 2592 wrote to memory of 4836 2592 cmd.exe 147 PID 2592 wrote to memory of 2384 2592 cmd.exe 148 PID 2592 wrote to memory of 2384 2592 cmd.exe 148 PID 2592 wrote to memory of 2384 2592 cmd.exe 148 PID 2592 wrote to memory of 5104 2592 cmd.exe 149 PID 2592 wrote to memory of 5104 2592 cmd.exe 149 PID 2592 wrote to memory of 5104 2592 cmd.exe 149 PID 2592 wrote to memory of 5008 2592 cmd.exe 151 PID 2592 wrote to memory of 5008 2592 cmd.exe 151 PID 2592 wrote to memory of 5008 2592 cmd.exe 151 PID 2592 wrote to memory of 3540 2592 cmd.exe 150 PID 2592 wrote to memory of 3540 2592 cmd.exe 150 PID 2592 wrote to memory of 3540 2592 cmd.exe 150 PID 2592 wrote to memory of 1880 2592 cmd.exe 152 PID 2592 wrote to memory of 1880 2592 cmd.exe 152 PID 2592 wrote to memory of 1880 2592 cmd.exe 152 PID 2772 wrote to memory of 3896 2772 oneetx.exe 166 PID 2772 wrote to memory of 3896 2772 oneetx.exe 166 PID 2772 wrote to memory of 3896 2772 oneetx.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe"C:\Users\Admin\AppData\Local\Temp\07994579c1f73d9616d2f222b98226b02cf9e679953b862ca2052e8f96b5e11b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698062.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698062.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un232244.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un232244.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr590487.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr590487.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 10885⤵
- Program crash
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu227358.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu227358.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 18565⤵
- Program crash
PID:2592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk781349.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk781349.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si993544.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si993544.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 6963⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 7203⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 8563⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 9763⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 10043⤵
- Program crash
PID:2740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 10043⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 12163⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 12203⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 12883⤵
- Program crash
PID:380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 13323⤵
- Program crash
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 6924⤵
- Program crash
PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 8284⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 8404⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 10524⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 10924⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 10924⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 11284⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 10124⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 7284⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 12764⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 12004⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 7604⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 7684⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 11124⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 16564⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 15844⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 16644⤵
- Program crash
PID:488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 17523⤵
- Program crash
PID:3032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1516 -ip 15161⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1752 -ip 17521⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4764 -ip 47641⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4764 -ip 47641⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4764 -ip 47641⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4764 -ip 47641⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4764 -ip 47641⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4764 -ip 47641⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4764 -ip 47641⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4764 -ip 47641⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4764 -ip 47641⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4764 -ip 47641⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4764 -ip 47641⤵PID:888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2772 -ip 27721⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2772 -ip 27721⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2772 -ip 27721⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2772 -ip 27721⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2772 -ip 27721⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2772 -ip 27721⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2772 -ip 27721⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2772 -ip 27721⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2772 -ip 27721⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2772 -ip 27721⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2772 -ip 27721⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2772 -ip 27721⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2772 -ip 27721⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 3202⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1232 -ip 12321⤵PID:1360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2772 -ip 27721⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2772 -ip 27721⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2772 -ip 27721⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 3162⤵
- Program crash
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 888 -ip 8881⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2772 -ip 27721⤵PID:4508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
763KB
MD51188d9d70ebb5c460c90c93937e28514
SHA14c07297e6ad36752f740736647eae4abf5028668
SHA2563ad8812798d7d837080bd63520425fb9e490ee156588f0d19cb09d49631638d5
SHA512d30b35d112cf0f1cf276ed850b5b6957cea68b9eed458a9f815072c27820f8b2e7db4940d3f8903b3cb24bde99771db72d785cc2a591f18989131a4272a54797
-
Filesize
763KB
MD51188d9d70ebb5c460c90c93937e28514
SHA14c07297e6ad36752f740736647eae4abf5028668
SHA2563ad8812798d7d837080bd63520425fb9e490ee156588f0d19cb09d49631638d5
SHA512d30b35d112cf0f1cf276ed850b5b6957cea68b9eed458a9f815072c27820f8b2e7db4940d3f8903b3cb24bde99771db72d785cc2a591f18989131a4272a54797
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
609KB
MD54cc889a4ca5e2b616e72e3b5ae35b543
SHA10fc75a2a60ac103c02cd570f8aefefd47d1df252
SHA256f1696bde3368ae0e5a368cead742ffb37d9037e1c6c73e572a5bf09f85d5a3a8
SHA51257a2fb002897017f21dddad6f63670716933a93eeeb542661b288b85b45f26691225a80881ed80eefb4f4b820b082c9a73643b1f52242f5d8160acaad6acda9c
-
Filesize
609KB
MD54cc889a4ca5e2b616e72e3b5ae35b543
SHA10fc75a2a60ac103c02cd570f8aefefd47d1df252
SHA256f1696bde3368ae0e5a368cead742ffb37d9037e1c6c73e572a5bf09f85d5a3a8
SHA51257a2fb002897017f21dddad6f63670716933a93eeeb542661b288b85b45f26691225a80881ed80eefb4f4b820b082c9a73643b1f52242f5d8160acaad6acda9c
-
Filesize
405KB
MD53ad21e1b4be1dabd82eeab0d2aaa15ad
SHA1abd8312557dfb460b6f1d01a392b259536e75d2f
SHA2568fd76c5833c62d9cd86357efcacc36f388aa6ce11fa5e222683342a220ae7eea
SHA51297656499271019d3ca3005cac63b8ef745d07dfc1db52a75cdf526ef5ca331856afebe5f2233e560a5fcb7538d33ee4ec1ab36cb8ff6b2ff677fc0c2acf458f1
-
Filesize
405KB
MD53ad21e1b4be1dabd82eeab0d2aaa15ad
SHA1abd8312557dfb460b6f1d01a392b259536e75d2f
SHA2568fd76c5833c62d9cd86357efcacc36f388aa6ce11fa5e222683342a220ae7eea
SHA51297656499271019d3ca3005cac63b8ef745d07dfc1db52a75cdf526ef5ca331856afebe5f2233e560a5fcb7538d33ee4ec1ab36cb8ff6b2ff677fc0c2acf458f1
-
Filesize
488KB
MD5b1692ac46a6d9fbf95891a7434ddede8
SHA10af0e030064fb1d827391ca3fbeac1630dab87a1
SHA2563dd09614b89c9765fe2b87574ba5f5eec3dbf06967698995000d97c3d15d4e05
SHA5126dbd055f944869a4226ccdde57791e49ed27a3ee69c8b3ec35132e0287d2e68805d9ba2d97dd063f4efbf2c1a625f1048abe7188b0a08eb5aab1a4215bf378a5
-
Filesize
488KB
MD5b1692ac46a6d9fbf95891a7434ddede8
SHA10af0e030064fb1d827391ca3fbeac1630dab87a1
SHA2563dd09614b89c9765fe2b87574ba5f5eec3dbf06967698995000d97c3d15d4e05
SHA5126dbd055f944869a4226ccdde57791e49ed27a3ee69c8b3ec35132e0287d2e68805d9ba2d97dd063f4efbf2c1a625f1048abe7188b0a08eb5aab1a4215bf378a5
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
383KB
MD5b3f99e2466011427187c002c6688b271
SHA1ffc0198b2e5310535fbe73b3ebe098714697f44e
SHA2564a2a3d3562aa2d74adc4beaebea8807d5cfeff7ec79cf1cf0e9e86166fe40f0d
SHA512521bdf39bcf34bf8b382de0ff7bc1af306ca938740263aeb9178e5cc21609c8765a5ecf111e90204b8f1e278905278a6c5efd68c2bd2c3c68ee89cc6074916c7
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5