Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 16:01
Static task
static1
General
-
Target
1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe
-
Size
936KB
-
MD5
ebc78a55f1c93f5a14a902a2d0c3b23f
-
SHA1
22829ceece0f9e4b97adb20d62a394d74791835f
-
SHA256
1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62
-
SHA512
1f8ed3e75d5044e3d06bfcc18124a659de4738b43c0a82bacb57221bfb4dd72b23f64c821647da2239f810e94472ffe8a631e049820ec0674a8cfb93f60895bf
-
SSDEEP
24576:5yYW6tDkwhcLC8cpyjlEW981DcQaq4pZF3S4:sYW6t4CcLC8+RtuFC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it685666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it685666.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it685666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it685666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it685666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it685666.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr803680.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 1960 zixZ9502.exe 1164 ziOR0119.exe 4116 it685666.exe 4568 jr943724.exe 1248 kp002950.exe 740 lr803680.exe 1296 oneetx.exe 508 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3332 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it685666.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zixZ9502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixZ9502.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOR0119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziOR0119.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 3848 4568 WerFault.exe 87 1440 740 WerFault.exe 91 508 740 WerFault.exe 91 2152 740 WerFault.exe 91 4224 740 WerFault.exe 91 4044 740 WerFault.exe 91 4408 740 WerFault.exe 91 1872 740 WerFault.exe 91 3316 740 WerFault.exe 91 5020 740 WerFault.exe 91 1100 740 WerFault.exe 91 4284 1296 WerFault.exe 111 4828 1296 WerFault.exe 111 4308 1296 WerFault.exe 111 3708 1296 WerFault.exe 111 4704 1296 WerFault.exe 111 4544 1296 WerFault.exe 111 3056 1296 WerFault.exe 111 1784 1296 WerFault.exe 111 2148 1296 WerFault.exe 111 4248 1296 WerFault.exe 111 2268 1296 WerFault.exe 111 4576 1296 WerFault.exe 111 924 1296 WerFault.exe 111 2256 1296 WerFault.exe 111 4796 1296 WerFault.exe 111 1660 1296 WerFault.exe 111 3932 1296 WerFault.exe 111 232 508 WerFault.exe 159 1720 1296 WerFault.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4116 it685666.exe 4116 it685666.exe 4568 jr943724.exe 4568 jr943724.exe 1248 kp002950.exe 1248 kp002950.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4116 it685666.exe Token: SeDebugPrivilege 4568 jr943724.exe Token: SeDebugPrivilege 1248 kp002950.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 740 lr803680.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1960 1696 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe 84 PID 1696 wrote to memory of 1960 1696 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe 84 PID 1696 wrote to memory of 1960 1696 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe 84 PID 1960 wrote to memory of 1164 1960 zixZ9502.exe 85 PID 1960 wrote to memory of 1164 1960 zixZ9502.exe 85 PID 1960 wrote to memory of 1164 1960 zixZ9502.exe 85 PID 1164 wrote to memory of 4116 1164 ziOR0119.exe 86 PID 1164 wrote to memory of 4116 1164 ziOR0119.exe 86 PID 1164 wrote to memory of 4568 1164 ziOR0119.exe 87 PID 1164 wrote to memory of 4568 1164 ziOR0119.exe 87 PID 1164 wrote to memory of 4568 1164 ziOR0119.exe 87 PID 1960 wrote to memory of 1248 1960 zixZ9502.exe 90 PID 1960 wrote to memory of 1248 1960 zixZ9502.exe 90 PID 1960 wrote to memory of 1248 1960 zixZ9502.exe 90 PID 1696 wrote to memory of 740 1696 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe 91 PID 1696 wrote to memory of 740 1696 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe 91 PID 1696 wrote to memory of 740 1696 1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe 91 PID 740 wrote to memory of 1296 740 lr803680.exe 111 PID 740 wrote to memory of 1296 740 lr803680.exe 111 PID 740 wrote to memory of 1296 740 lr803680.exe 111 PID 1296 wrote to memory of 1648 1296 oneetx.exe 128 PID 1296 wrote to memory of 1648 1296 oneetx.exe 128 PID 1296 wrote to memory of 1648 1296 oneetx.exe 128 PID 1296 wrote to memory of 4908 1296 oneetx.exe 134 PID 1296 wrote to memory of 4908 1296 oneetx.exe 134 PID 1296 wrote to memory of 4908 1296 oneetx.exe 134 PID 4908 wrote to memory of 2120 4908 cmd.exe 138 PID 4908 wrote to memory of 2120 4908 cmd.exe 138 PID 4908 wrote to memory of 2120 4908 cmd.exe 138 PID 4908 wrote to memory of 2664 4908 cmd.exe 139 PID 4908 wrote to memory of 2664 4908 cmd.exe 139 PID 4908 wrote to memory of 2664 4908 cmd.exe 139 PID 4908 wrote to memory of 4688 4908 cmd.exe 140 PID 4908 wrote to memory of 4688 4908 cmd.exe 140 PID 4908 wrote to memory of 4688 4908 cmd.exe 140 PID 4908 wrote to memory of 524 4908 cmd.exe 141 PID 4908 wrote to memory of 524 4908 cmd.exe 141 PID 4908 wrote to memory of 524 4908 cmd.exe 141 PID 4908 wrote to memory of 1036 4908 cmd.exe 142 PID 4908 wrote to memory of 1036 4908 cmd.exe 142 PID 4908 wrote to memory of 1036 4908 cmd.exe 142 PID 4908 wrote to memory of 3324 4908 cmd.exe 143 PID 4908 wrote to memory of 3324 4908 cmd.exe 143 PID 4908 wrote to memory of 3324 4908 cmd.exe 143 PID 1296 wrote to memory of 3332 1296 oneetx.exe 156 PID 1296 wrote to memory of 3332 1296 oneetx.exe 156 PID 1296 wrote to memory of 3332 1296 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe"C:\Users\Admin\AppData\Local\Temp\1af18fffc6a44e64564a9f8a79e45d4a4a200014481d61aa8e88636c12470e62.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixZ9502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixZ9502.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziOR0119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziOR0119.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it685666.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it685666.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr943724.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr943724.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 18245⤵
- Program crash
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp002950.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp002950.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr803680.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr803680.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 6963⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 7243⤵
- Program crash
PID:508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 8563⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 9603⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 9803⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 10003⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 12203⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 12363⤵
- Program crash
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 13163⤵
- Program crash
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 6924⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 9084⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 9004⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 9044⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 9324⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 11164⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 11324⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 10204⤵
- Program crash
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 7764⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 7564⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 13084⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 12924⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 7804⤵
- Program crash
PID:924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 14924⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 10924⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 16204⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 11284⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 16364⤵
- Program crash
PID:1720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 8643⤵
- Program crash
PID:1100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4568 -ip 45681⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 740 -ip 7401⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 740 -ip 7401⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 740 -ip 7401⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 740 -ip 7401⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 740 -ip 7401⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 740 -ip 7401⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 740 -ip 7401⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 740 -ip 7401⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 740 -ip 7401⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 740 -ip 7401⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1296 -ip 12961⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1296 -ip 12961⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1296 -ip 12961⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1296 -ip 12961⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1296 -ip 12961⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1296 -ip 12961⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1296 -ip 12961⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1296 -ip 12961⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1296 -ip 12961⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1296 -ip 12961⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1296 -ip 12961⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1296 -ip 12961⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1296 -ip 12961⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1296 -ip 12961⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1296 -ip 12961⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1296 -ip 12961⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1296 -ip 12961⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 3162⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 508 -ip 5081⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1296 -ip 12961⤵PID:4060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD50b1f0d8475025b4d21bca6acc2b3bca5
SHA1c755adae2c96195546ce1c7f7253dab4ca801de5
SHA256e8804daf09efc94a8b716e534019073a7f352c3274d0ca24edbf9d8a10b06e9e
SHA5122e507332d946f3010ffc53c198bc1a21ad9bd4306fcf1a3cf70b8da8a9cf4d0a0baa68d8a73fae2da2e6153b128c8052dccfe2fbfc7a5230f518296efd52d138
-
Filesize
384KB
MD50b1f0d8475025b4d21bca6acc2b3bca5
SHA1c755adae2c96195546ce1c7f7253dab4ca801de5
SHA256e8804daf09efc94a8b716e534019073a7f352c3274d0ca24edbf9d8a10b06e9e
SHA5122e507332d946f3010ffc53c198bc1a21ad9bd4306fcf1a3cf70b8da8a9cf4d0a0baa68d8a73fae2da2e6153b128c8052dccfe2fbfc7a5230f518296efd52d138
-
Filesize
622KB
MD5bbdb19b3c547a7c99dc8f7cedaaded61
SHA1d71719e9ad636455383a131d5f0aaa1e6df610ce
SHA256d2a6bda7b213101f5564e402d1bdce4a68299bea873d266cf171654fde200d9b
SHA512a9a46b47c16c61e595e65cc8b00ed6278043b42990145c5f65bd604cdaeaba81652669fdd2378aa18aadde8dd754ac5f7c708328a68c3fa25627a93f7a57749e
-
Filesize
622KB
MD5bbdb19b3c547a7c99dc8f7cedaaded61
SHA1d71719e9ad636455383a131d5f0aaa1e6df610ce
SHA256d2a6bda7b213101f5564e402d1bdce4a68299bea873d266cf171654fde200d9b
SHA512a9a46b47c16c61e595e65cc8b00ed6278043b42990145c5f65bd604cdaeaba81652669fdd2378aa18aadde8dd754ac5f7c708328a68c3fa25627a93f7a57749e
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
468KB
MD5ddcb0e5bc37e9163e5e6e85222a8be6f
SHA1ccb1691497ad11ec3d8102838163eb987c1da423
SHA2562d896e3c978c62b477690f4305b64af3d448f64f779630ec63663ec83ac8649f
SHA512df6552284d32ce16176af20e44b07fa96f0dae9b81d7cf8b9b0416c84d8608aed73198a5a6df898ee13249c134dee882009e1ff8df1a3b0d11f1aeabd39f2896
-
Filesize
468KB
MD5ddcb0e5bc37e9163e5e6e85222a8be6f
SHA1ccb1691497ad11ec3d8102838163eb987c1da423
SHA2562d896e3c978c62b477690f4305b64af3d448f64f779630ec63663ec83ac8649f
SHA512df6552284d32ce16176af20e44b07fa96f0dae9b81d7cf8b9b0416c84d8608aed73198a5a6df898ee13249c134dee882009e1ff8df1a3b0d11f1aeabd39f2896
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
488KB
MD5ccb3a996cfab76d7190674af933ac1a4
SHA1b55c1e0810a688758efe1801d695d84215175ccf
SHA2562366bb86d752cae3597723f2a213d6e611bf8487c053628a557943aa05625ce5
SHA512153750a11772f5497addc90625499d3d2b90e763a0fe51f718e9d7c27d1f736afa6087414b25d97da27ea5470438b723c668919a58e49ae0ed7fd202e9cb0190
-
Filesize
488KB
MD5ccb3a996cfab76d7190674af933ac1a4
SHA1b55c1e0810a688758efe1801d695d84215175ccf
SHA2562366bb86d752cae3597723f2a213d6e611bf8487c053628a557943aa05625ce5
SHA512153750a11772f5497addc90625499d3d2b90e763a0fe51f718e9d7c27d1f736afa6087414b25d97da27ea5470438b723c668919a58e49ae0ed7fd202e9cb0190
-
Filesize
384KB
MD50b1f0d8475025b4d21bca6acc2b3bca5
SHA1c755adae2c96195546ce1c7f7253dab4ca801de5
SHA256e8804daf09efc94a8b716e534019073a7f352c3274d0ca24edbf9d8a10b06e9e
SHA5122e507332d946f3010ffc53c198bc1a21ad9bd4306fcf1a3cf70b8da8a9cf4d0a0baa68d8a73fae2da2e6153b128c8052dccfe2fbfc7a5230f518296efd52d138
-
Filesize
384KB
MD50b1f0d8475025b4d21bca6acc2b3bca5
SHA1c755adae2c96195546ce1c7f7253dab4ca801de5
SHA256e8804daf09efc94a8b716e534019073a7f352c3274d0ca24edbf9d8a10b06e9e
SHA5122e507332d946f3010ffc53c198bc1a21ad9bd4306fcf1a3cf70b8da8a9cf4d0a0baa68d8a73fae2da2e6153b128c8052dccfe2fbfc7a5230f518296efd52d138
-
Filesize
384KB
MD50b1f0d8475025b4d21bca6acc2b3bca5
SHA1c755adae2c96195546ce1c7f7253dab4ca801de5
SHA256e8804daf09efc94a8b716e534019073a7f352c3274d0ca24edbf9d8a10b06e9e
SHA5122e507332d946f3010ffc53c198bc1a21ad9bd4306fcf1a3cf70b8da8a9cf4d0a0baa68d8a73fae2da2e6153b128c8052dccfe2fbfc7a5230f518296efd52d138
-
Filesize
384KB
MD50b1f0d8475025b4d21bca6acc2b3bca5
SHA1c755adae2c96195546ce1c7f7253dab4ca801de5
SHA256e8804daf09efc94a8b716e534019073a7f352c3274d0ca24edbf9d8a10b06e9e
SHA5122e507332d946f3010ffc53c198bc1a21ad9bd4306fcf1a3cf70b8da8a9cf4d0a0baa68d8a73fae2da2e6153b128c8052dccfe2fbfc7a5230f518296efd52d138
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5