Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 20:30
Static task
static1
General
-
Target
c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe
-
Size
920KB
-
MD5
a75a639f50a7f1cc0e3a1d4428acae53
-
SHA1
bd74ccd3dd338325538edb7de2514c84c466762c
-
SHA256
c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63
-
SHA512
a9ea63cd65b20ec698e07cf388daf18d38ac839fb3ec8c9a1e877a3cba860f58fbad35c17c4824832162ab445cd0f50594d57c9a5d578ec82950667af3e9b842
-
SSDEEP
12288:gy90fcnMwhggQDobndWsddo2nkaJphNN3euiapKTnJn4ms2V1ttRrYuwqbJcuDY+:gyIc5hVnoyphgapKTnJne2VlRE6bO6n
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it685775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it685775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it685775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it685775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it685775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it685775.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr043300.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2540 zidC8603.exe 3964 zize9894.exe 4496 it685775.exe 208 jr464358.exe 3856 kp992354.exe 3140 lr043300.exe 1432 oneetx.exe 3968 oneetx.exe 2092 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2588 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it685775.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidC8603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidC8603.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zize9894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zize9894.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 3816 208 WerFault.exe 89 548 3140 WerFault.exe 96 552 3140 WerFault.exe 96 4860 3140 WerFault.exe 96 1020 3140 WerFault.exe 96 3164 3140 WerFault.exe 96 1904 3140 WerFault.exe 96 3712 3140 WerFault.exe 96 2016 3140 WerFault.exe 96 64 3140 WerFault.exe 96 3356 3140 WerFault.exe 96 4956 1432 WerFault.exe 116 3192 1432 WerFault.exe 116 3352 1432 WerFault.exe 116 1692 1432 WerFault.exe 116 3736 1432 WerFault.exe 116 4600 1432 WerFault.exe 116 4544 1432 WerFault.exe 116 744 1432 WerFault.exe 116 3200 1432 WerFault.exe 116 3660 1432 WerFault.exe 116 3612 1432 WerFault.exe 116 392 1432 WerFault.exe 116 1684 1432 WerFault.exe 116 840 3968 WerFault.exe 151 4416 1432 WerFault.exe 116 4084 1432 WerFault.exe 116 4256 1432 WerFault.exe 116 5032 2092 WerFault.exe 165 3548 1432 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4496 it685775.exe 4496 it685775.exe 208 jr464358.exe 208 jr464358.exe 3856 kp992354.exe 3856 kp992354.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4496 it685775.exe Token: SeDebugPrivilege 208 jr464358.exe Token: SeDebugPrivilege 3856 kp992354.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3140 lr043300.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2540 2116 c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe 82 PID 2116 wrote to memory of 2540 2116 c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe 82 PID 2116 wrote to memory of 2540 2116 c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe 82 PID 2540 wrote to memory of 3964 2540 zidC8603.exe 83 PID 2540 wrote to memory of 3964 2540 zidC8603.exe 83 PID 2540 wrote to memory of 3964 2540 zidC8603.exe 83 PID 3964 wrote to memory of 4496 3964 zize9894.exe 84 PID 3964 wrote to memory of 4496 3964 zize9894.exe 84 PID 3964 wrote to memory of 208 3964 zize9894.exe 89 PID 3964 wrote to memory of 208 3964 zize9894.exe 89 PID 3964 wrote to memory of 208 3964 zize9894.exe 89 PID 2540 wrote to memory of 3856 2540 zidC8603.exe 95 PID 2540 wrote to memory of 3856 2540 zidC8603.exe 95 PID 2540 wrote to memory of 3856 2540 zidC8603.exe 95 PID 2116 wrote to memory of 3140 2116 c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe 96 PID 2116 wrote to memory of 3140 2116 c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe 96 PID 2116 wrote to memory of 3140 2116 c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe 96 PID 3140 wrote to memory of 1432 3140 lr043300.exe 116 PID 3140 wrote to memory of 1432 3140 lr043300.exe 116 PID 3140 wrote to memory of 1432 3140 lr043300.exe 116 PID 1432 wrote to memory of 2268 1432 oneetx.exe 133 PID 1432 wrote to memory of 2268 1432 oneetx.exe 133 PID 1432 wrote to memory of 2268 1432 oneetx.exe 133 PID 1432 wrote to memory of 1268 1432 oneetx.exe 139 PID 1432 wrote to memory of 1268 1432 oneetx.exe 139 PID 1432 wrote to memory of 1268 1432 oneetx.exe 139 PID 1268 wrote to memory of 3632 1268 cmd.exe 143 PID 1268 wrote to memory of 3632 1268 cmd.exe 143 PID 1268 wrote to memory of 3632 1268 cmd.exe 143 PID 1268 wrote to memory of 3740 1268 cmd.exe 144 PID 1268 wrote to memory of 3740 1268 cmd.exe 144 PID 1268 wrote to memory of 3740 1268 cmd.exe 144 PID 1268 wrote to memory of 3668 1268 cmd.exe 145 PID 1268 wrote to memory of 3668 1268 cmd.exe 145 PID 1268 wrote to memory of 3668 1268 cmd.exe 145 PID 1268 wrote to memory of 836 1268 cmd.exe 146 PID 1268 wrote to memory of 836 1268 cmd.exe 146 PID 1268 wrote to memory of 836 1268 cmd.exe 146 PID 1268 wrote to memory of 3512 1268 cmd.exe 147 PID 1268 wrote to memory of 3512 1268 cmd.exe 147 PID 1268 wrote to memory of 3512 1268 cmd.exe 147 PID 1268 wrote to memory of 216 1268 cmd.exe 148 PID 1268 wrote to memory of 216 1268 cmd.exe 148 PID 1268 wrote to memory of 216 1268 cmd.exe 148 PID 1432 wrote to memory of 2588 1432 oneetx.exe 162 PID 1432 wrote to memory of 2588 1432 oneetx.exe 162 PID 1432 wrote to memory of 2588 1432 oneetx.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe"C:\Users\Admin\AppData\Local\Temp\c3ea5ee0bef23d2f3b7b1af46c7dd0450159136b5554616c28e451eff0270a63.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidC8603.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidC8603.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zize9894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zize9894.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it685775.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it685775.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr464358.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr464358.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 20325⤵
- Program crash
PID:3816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp992354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp992354.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr043300.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr043300.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 6963⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 7563⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 8563⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 9723⤵
- Program crash
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 9683⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 10043⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12083⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12363⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 12523⤵
- Program crash
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 6924⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 8364⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 8964⤵
- Program crash
PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 10524⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 10604⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 11084⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 10724⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 9924⤵
- Program crash
PID:744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 7924⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 8764⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 7284⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 1324⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 7284⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 11124⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 16404⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 15844⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 16564⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 13643⤵
- Program crash
PID:3356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 208 -ip 2081⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3140 -ip 31401⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3140 -ip 31401⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3140 -ip 31401⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3140 -ip 31401⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3140 -ip 31401⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3140 -ip 31401⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3140 -ip 31401⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3140 -ip 31401⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3140 -ip 31401⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3140 -ip 31401⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1432 -ip 14321⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1432 -ip 14321⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1432 -ip 14321⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1432 -ip 14321⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1432 -ip 14321⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1432 -ip 14321⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1432 -ip 14321⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1432 -ip 14321⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1432 -ip 14321⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1432 -ip 14321⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1432 -ip 14321⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 3122⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1432 -ip 14321⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1432 -ip 14321⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3968 -ip 39681⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1432 -ip 14321⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1432 -ip 14321⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1432 -ip 14321⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 3162⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2092 -ip 20921⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1432 -ip 14321⤵PID:2928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
616KB
MD5b3257ec393602df2041f03f4d35394d2
SHA1f1d5dd32236c2dbdedb11cbd9e52bb693f850676
SHA25628b5c0c85edd4970ae494389b52980d52a341a934e1a0124e3cb2a899f24ecbe
SHA512c8f6487bd5247f2fbd4d103b4b783967aaffd935442a2d4b936d33ce724919152a29668ff7870c86611b63a5b57be2b16ccca7c761061db9b81bd74234259e4f
-
Filesize
616KB
MD5b3257ec393602df2041f03f4d35394d2
SHA1f1d5dd32236c2dbdedb11cbd9e52bb693f850676
SHA25628b5c0c85edd4970ae494389b52980d52a341a934e1a0124e3cb2a899f24ecbe
SHA512c8f6487bd5247f2fbd4d103b4b783967aaffd935442a2d4b936d33ce724919152a29668ff7870c86611b63a5b57be2b16ccca7c761061db9b81bd74234259e4f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
461KB
MD52bb2cf279aecac886ed023b5436c4f44
SHA15c68fc74d0cee86de899f5278904c1d6492ccc24
SHA25630d01474b62cd45fadfd7d7bdcf78c2271e5880a8fc683dbcdfc11d94f0b2f82
SHA51237233fc951fbee3fa8306ac862f6b2fcaf5e3d7819cde2f58692f827a285062509552d4f2e8a24db0ef968e5dfd3d469a7cc74628de6aaea8e6885508369c4a4
-
Filesize
461KB
MD52bb2cf279aecac886ed023b5436c4f44
SHA15c68fc74d0cee86de899f5278904c1d6492ccc24
SHA25630d01474b62cd45fadfd7d7bdcf78c2271e5880a8fc683dbcdfc11d94f0b2f82
SHA51237233fc951fbee3fa8306ac862f6b2fcaf5e3d7819cde2f58692f827a285062509552d4f2e8a24db0ef968e5dfd3d469a7cc74628de6aaea8e6885508369c4a4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
472KB
MD5c5d53b3db01a5a3afc5e5edf9483076d
SHA1a6644dfb56d4f5710b7637238d82da87c2ad5ed3
SHA256d4ce3f3854349a7acda02a6fc6b2b87e896e4d1aec1f9ee411f29f0d2b368a43
SHA512cce0fa91acc38b1a8a100a4ea33c794a0e9e448fe2ee535607b29e7ef12bcd371e3f30cd77f9b8bafe2139a987c44378a62421bd0992314e052cc3ef5113c083
-
Filesize
472KB
MD5c5d53b3db01a5a3afc5e5edf9483076d
SHA1a6644dfb56d4f5710b7637238d82da87c2ad5ed3
SHA256d4ce3f3854349a7acda02a6fc6b2b87e896e4d1aec1f9ee411f29f0d2b368a43
SHA512cce0fa91acc38b1a8a100a4ea33c794a0e9e448fe2ee535607b29e7ef12bcd371e3f30cd77f9b8bafe2139a987c44378a62421bd0992314e052cc3ef5113c083
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
367KB
MD5dbe54e0eb3d0eed236e736f746d06f90
SHA1009f5de21f2853e5fb1b95516e20347a479c1fea
SHA2565166be0ed96b47a518bcab277fef5957301e1cac00caed9d807670f819fd24ab
SHA512d070736abbdc2c7b984930a24e911aaa621dce84ce8e2ba8dda734259025c9a20fa17ea86567957ee998996e34caf7255f146f5448a424deb23d94eb059be56b
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5