Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 10:21
Static task
static1
General
-
Target
6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe
-
Size
936KB
-
MD5
fdeb3d6b39a59f81a941c8645be4588d
-
SHA1
ad8de130206f9138dd03acb994b9cee86632c6af
-
SHA256
6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0
-
SHA512
e78d56299e330d8a12cf78480f6bb00c287fe61f9e2f82ea71ad35c7539f6be33a162122b2c6b254e51fcca3003d9274d5dadf40b552085e4f701dfcd997da7a
-
SSDEEP
24576:Byu0iv4QEbjZiPfYe1HGv7oSwIeIZcuMc:0e4pViPfLhWYpu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it780771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it780771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it780771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it780771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it780771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it780771.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr342955.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 620 ziMS5258.exe 392 zipS2256.exe 4700 it780771.exe 3236 jr285803.exe 4568 kp189386.exe 1728 lr342955.exe 2776 oneetx.exe 1072 oneetx.exe 3308 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1952 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it780771.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziMS5258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMS5258.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipS2256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zipS2256.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
pid pid_target Process procid_target 3984 3236 WerFault.exe 87 4072 1728 WerFault.exe 93 4792 1728 WerFault.exe 93 436 1728 WerFault.exe 93 1204 1728 WerFault.exe 93 3176 1728 WerFault.exe 93 1468 1728 WerFault.exe 93 2512 1728 WerFault.exe 93 2996 1728 WerFault.exe 93 3688 1728 WerFault.exe 93 1980 1728 WerFault.exe 93 4380 1728 WerFault.exe 93 824 2776 WerFault.exe 114 3288 2776 WerFault.exe 114 452 2776 WerFault.exe 114 1340 2776 WerFault.exe 114 1444 2776 WerFault.exe 114 2336 2776 WerFault.exe 114 1016 2776 WerFault.exe 114 756 2776 WerFault.exe 114 3256 2776 WerFault.exe 114 3548 2776 WerFault.exe 114 4292 2776 WerFault.exe 114 2628 2776 WerFault.exe 114 3008 2776 WerFault.exe 114 2544 2776 WerFault.exe 114 448 1072 WerFault.exe 155 4704 2776 WerFault.exe 114 3724 2776 WerFault.exe 114 1300 2776 WerFault.exe 114 3704 3308 WerFault.exe 180 2808 2776 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4700 it780771.exe 4700 it780771.exe 3236 jr285803.exe 3236 jr285803.exe 4568 kp189386.exe 4568 kp189386.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4700 it780771.exe Token: SeDebugPrivilege 3236 jr285803.exe Token: SeDebugPrivilege 4568 kp189386.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 lr342955.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 444 wrote to memory of 620 444 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe 84 PID 444 wrote to memory of 620 444 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe 84 PID 444 wrote to memory of 620 444 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe 84 PID 620 wrote to memory of 392 620 ziMS5258.exe 85 PID 620 wrote to memory of 392 620 ziMS5258.exe 85 PID 620 wrote to memory of 392 620 ziMS5258.exe 85 PID 392 wrote to memory of 4700 392 zipS2256.exe 86 PID 392 wrote to memory of 4700 392 zipS2256.exe 86 PID 392 wrote to memory of 3236 392 zipS2256.exe 87 PID 392 wrote to memory of 3236 392 zipS2256.exe 87 PID 392 wrote to memory of 3236 392 zipS2256.exe 87 PID 620 wrote to memory of 4568 620 ziMS5258.exe 91 PID 620 wrote to memory of 4568 620 ziMS5258.exe 91 PID 620 wrote to memory of 4568 620 ziMS5258.exe 91 PID 444 wrote to memory of 1728 444 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe 93 PID 444 wrote to memory of 1728 444 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe 93 PID 444 wrote to memory of 1728 444 6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe 93 PID 1728 wrote to memory of 2776 1728 lr342955.exe 114 PID 1728 wrote to memory of 2776 1728 lr342955.exe 114 PID 1728 wrote to memory of 2776 1728 lr342955.exe 114 PID 2776 wrote to memory of 1332 2776 oneetx.exe 131 PID 2776 wrote to memory of 1332 2776 oneetx.exe 131 PID 2776 wrote to memory of 1332 2776 oneetx.exe 131 PID 2776 wrote to memory of 2616 2776 oneetx.exe 137 PID 2776 wrote to memory of 2616 2776 oneetx.exe 137 PID 2776 wrote to memory of 2616 2776 oneetx.exe 137 PID 2616 wrote to memory of 3544 2616 cmd.exe 141 PID 2616 wrote to memory of 3544 2616 cmd.exe 141 PID 2616 wrote to memory of 3544 2616 cmd.exe 141 PID 2616 wrote to memory of 3592 2616 cmd.exe 142 PID 2616 wrote to memory of 3592 2616 cmd.exe 142 PID 2616 wrote to memory of 3592 2616 cmd.exe 142 PID 2616 wrote to memory of 4732 2616 cmd.exe 143 PID 2616 wrote to memory of 4732 2616 cmd.exe 143 PID 2616 wrote to memory of 4732 2616 cmd.exe 143 PID 2616 wrote to memory of 1636 2616 cmd.exe 144 PID 2616 wrote to memory of 1636 2616 cmd.exe 144 PID 2616 wrote to memory of 1636 2616 cmd.exe 144 PID 2616 wrote to memory of 3504 2616 cmd.exe 145 PID 2616 wrote to memory of 3504 2616 cmd.exe 145 PID 2616 wrote to memory of 3504 2616 cmd.exe 145 PID 2616 wrote to memory of 3136 2616 cmd.exe 146 PID 2616 wrote to memory of 3136 2616 cmd.exe 146 PID 2616 wrote to memory of 3136 2616 cmd.exe 146 PID 2776 wrote to memory of 1952 2776 oneetx.exe 170 PID 2776 wrote to memory of 1952 2776 oneetx.exe 170 PID 2776 wrote to memory of 1952 2776 oneetx.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe"C:\Users\Admin\AppData\Local\Temp\6d59a7511fa523fd7780f6ec9a3a42e8e36faab1669746ab2e7c681df19374a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMS5258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMS5258.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zipS2256.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zipS2256.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it780771.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it780771.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr285803.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr285803.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 20245⤵
- Program crash
PID:3984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp189386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp189386.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr342955.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr342955.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 6963⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 7523⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 8123⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 8643⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 9483⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 9483⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 12083⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 12243⤵
- Program crash
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 13043⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 13123⤵
- Program crash
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 6924⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 8324⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 8924⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 10524⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 10724⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 10524⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 11084⤵
- Program crash
PID:1016
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 9924⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 12484⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 9244⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 9884⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 7524⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 12764⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 14364⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 10644⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 16284⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 11004⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 16444⤵
- Program crash
PID:2808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 9603⤵
- Program crash
PID:4380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3236 -ip 32361⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1728 -ip 17281⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1728 -ip 17281⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1728 -ip 17281⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1728 -ip 17281⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1728 -ip 17281⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1728 -ip 17281⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1728 -ip 17281⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1728 -ip 17281⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1728 -ip 17281⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1728 -ip 17281⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1728 -ip 17281⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2776 -ip 27761⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2776 -ip 27761⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2776 -ip 27761⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2776 -ip 27761⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2776 -ip 27761⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2776 -ip 27761⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2776 -ip 27761⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2776 -ip 27761⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2776 -ip 27761⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2776 -ip 27761⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2776 -ip 27761⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2776 -ip 27761⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2776 -ip 27761⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2776 -ip 27761⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 3162⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 1072 -ip 10721⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 2776 -ip 27761⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2776 -ip 27761⤵PID:3332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 2776 -ip 27761⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 3122⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3308 -ip 33081⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 2776 -ip 27761⤵PID:2920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
623KB
MD58a6799c3b97256670c775e503923d57f
SHA190f83a5d22c86b861e5db043ea162d99551990aa
SHA25646aa661a893126f5ff7e920503c449cf82f5a07accc8ac4f7d0f251a56edfbaa
SHA512a84781386e797123ae310b4ffc6ad2b7ea4b89d1eeb00e68be05472705b8202f8cd26d1ed4abae3e74c11123519f95d6af96dcdc35bd7ad021fa6ae525841108
-
Filesize
623KB
MD58a6799c3b97256670c775e503923d57f
SHA190f83a5d22c86b861e5db043ea162d99551990aa
SHA25646aa661a893126f5ff7e920503c449cf82f5a07accc8ac4f7d0f251a56edfbaa
SHA512a84781386e797123ae310b4ffc6ad2b7ea4b89d1eeb00e68be05472705b8202f8cd26d1ed4abae3e74c11123519f95d6af96dcdc35bd7ad021fa6ae525841108
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
469KB
MD50aa158dc3f51350628261a150a6271b2
SHA18709171e012809489a723f0ddfd5e7ce86b3585a
SHA256ed9b0d661d709d6ba63590a5c32e455a53248fb81256fe577a4acd3dbc487d09
SHA51266ecdd434932491272d473a00665e3330c5c1c9caea5e992d42cea5cc5e7432f839dcc59fd31ee049bb4eca99001b40e148ce4654314ac746ba8a4fbabf8018a
-
Filesize
469KB
MD50aa158dc3f51350628261a150a6271b2
SHA18709171e012809489a723f0ddfd5e7ce86b3585a
SHA256ed9b0d661d709d6ba63590a5c32e455a53248fb81256fe577a4acd3dbc487d09
SHA51266ecdd434932491272d473a00665e3330c5c1c9caea5e992d42cea5cc5e7432f839dcc59fd31ee049bb4eca99001b40e148ce4654314ac746ba8a4fbabf8018a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
488KB
MD5e0748deb39f058966fd91fd85246d833
SHA1c53cda3ee510d9821229dfd530280a0972fbf68c
SHA25694d712740a1272e2aa9f9f00c383fc99c3a10dccc6700b3b2f400ca42b0d0a2e
SHA5126695b114b220afcb5ef750dbc97f8d697bc74cbf32eda6d3ef215cf07c3eafb0d5aa1071656760736c05ad9bf85cb766cd771bfc0d4642aa40ba9011f597bf67
-
Filesize
488KB
MD5e0748deb39f058966fd91fd85246d833
SHA1c53cda3ee510d9821229dfd530280a0972fbf68c
SHA25694d712740a1272e2aa9f9f00c383fc99c3a10dccc6700b3b2f400ca42b0d0a2e
SHA5126695b114b220afcb5ef750dbc97f8d697bc74cbf32eda6d3ef215cf07c3eafb0d5aa1071656760736c05ad9bf85cb766cd771bfc0d4642aa40ba9011f597bf67
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
383KB
MD53ddb832f1b9a86e28a912d35f23ba42e
SHA157e6c987808fa590577fc8f94b51b19f7b318bd6
SHA256b24c9bdfc9798f73bc3e1a7700f53a438a1c56b9353289f714dbe270f6523f96
SHA51263598fcd8a106790784cde5537e94a779b614be68c2250880ca7b9144815f6138289521e577dd616571ddb60d3774efec7754187a7e0facfcf98711457c139d2
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5