Analysis
-
max time kernel
143s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 20:05
Static task
static1
General
-
Target
73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe
-
Size
920KB
-
MD5
54b62eeff04f102d58e7c2583233a5e3
-
SHA1
811eba79ebf46dbb737a8ec9dbadc1fbc8a47de7
-
SHA256
73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065
-
SHA512
b1b50462c71256431712e56dbc4777afefe16742b421534581b947ecf0d9334de870a228af1b86f0b96791b6c7cf3d9022b3ee9dd087930d3c3515e1e4f2111c
-
SSDEEP
12288:xy90EVrAfxTtcqIKeqSSETCvQuHbINR3eeqa9KHDoP7U8I4ph+nQcRbLopv200tB:xyVrExtTtSSEqRHUEa9KcYXzpL8pa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it857452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it857452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it857452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it857452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it857452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it857452.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lr658166.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4868 zidG1366.exe 4896 zivF9887.exe 4756 it857452.exe 4488 jr925120.exe 3952 kp144822.exe 3764 lr658166.exe 1500 oneetx.exe 3524 oneetx.exe 3904 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it857452.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivF9887.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zivF9887.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidG1366.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidG1366.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 512 4488 WerFault.exe 92 4964 3764 WerFault.exe 101 856 3764 WerFault.exe 101 2240 3764 WerFault.exe 101 1596 3764 WerFault.exe 101 1516 3764 WerFault.exe 101 2772 3764 WerFault.exe 101 4620 3764 WerFault.exe 101 3576 3764 WerFault.exe 101 5092 3764 WerFault.exe 101 5000 3764 WerFault.exe 101 3412 1500 WerFault.exe 121 4468 1500 WerFault.exe 121 4376 1500 WerFault.exe 121 388 1500 WerFault.exe 121 2664 1500 WerFault.exe 121 2792 1500 WerFault.exe 121 2672 1500 WerFault.exe 121 3484 1500 WerFault.exe 121 2564 1500 WerFault.exe 121 4132 1500 WerFault.exe 121 3976 1500 WerFault.exe 121 856 1500 WerFault.exe 121 2240 1500 WerFault.exe 121 1088 3524 WerFault.exe 160 2268 1500 WerFault.exe 121 4412 1500 WerFault.exe 121 3364 1500 WerFault.exe 121 4300 3904 WerFault.exe 170 3764 1500 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4756 it857452.exe 4756 it857452.exe 4488 jr925120.exe 4488 jr925120.exe 3952 kp144822.exe 3952 kp144822.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4756 it857452.exe Token: SeDebugPrivilege 4488 jr925120.exe Token: SeDebugPrivilege 3952 kp144822.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3764 lr658166.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4868 1940 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe 85 PID 1940 wrote to memory of 4868 1940 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe 85 PID 1940 wrote to memory of 4868 1940 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe 85 PID 4868 wrote to memory of 4896 4868 zidG1366.exe 86 PID 4868 wrote to memory of 4896 4868 zidG1366.exe 86 PID 4868 wrote to memory of 4896 4868 zidG1366.exe 86 PID 4896 wrote to memory of 4756 4896 zivF9887.exe 87 PID 4896 wrote to memory of 4756 4896 zivF9887.exe 87 PID 4896 wrote to memory of 4488 4896 zivF9887.exe 92 PID 4896 wrote to memory of 4488 4896 zivF9887.exe 92 PID 4896 wrote to memory of 4488 4896 zivF9887.exe 92 PID 4868 wrote to memory of 3952 4868 zidG1366.exe 100 PID 4868 wrote to memory of 3952 4868 zidG1366.exe 100 PID 4868 wrote to memory of 3952 4868 zidG1366.exe 100 PID 1940 wrote to memory of 3764 1940 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe 101 PID 1940 wrote to memory of 3764 1940 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe 101 PID 1940 wrote to memory of 3764 1940 73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe 101 PID 3764 wrote to memory of 1500 3764 lr658166.exe 121 PID 3764 wrote to memory of 1500 3764 lr658166.exe 121 PID 3764 wrote to memory of 1500 3764 lr658166.exe 121 PID 1500 wrote to memory of 652 1500 oneetx.exe 138 PID 1500 wrote to memory of 652 1500 oneetx.exe 138 PID 1500 wrote to memory of 652 1500 oneetx.exe 138 PID 1500 wrote to memory of 4896 1500 oneetx.exe 144 PID 1500 wrote to memory of 4896 1500 oneetx.exe 144 PID 1500 wrote to memory of 4896 1500 oneetx.exe 144 PID 4896 wrote to memory of 4268 4896 cmd.exe 148 PID 4896 wrote to memory of 4268 4896 cmd.exe 148 PID 4896 wrote to memory of 4268 4896 cmd.exe 148 PID 4896 wrote to memory of 4360 4896 cmd.exe 149 PID 4896 wrote to memory of 4360 4896 cmd.exe 149 PID 4896 wrote to memory of 4360 4896 cmd.exe 149 PID 4896 wrote to memory of 1264 4896 cmd.exe 150 PID 4896 wrote to memory of 1264 4896 cmd.exe 150 PID 4896 wrote to memory of 1264 4896 cmd.exe 150 PID 4896 wrote to memory of 4732 4896 cmd.exe 151 PID 4896 wrote to memory of 4732 4896 cmd.exe 151 PID 4896 wrote to memory of 4732 4896 cmd.exe 151 PID 4896 wrote to memory of 3620 4896 cmd.exe 152 PID 4896 wrote to memory of 3620 4896 cmd.exe 152 PID 4896 wrote to memory of 3620 4896 cmd.exe 152 PID 4896 wrote to memory of 4188 4896 cmd.exe 153 PID 4896 wrote to memory of 4188 4896 cmd.exe 153 PID 4896 wrote to memory of 4188 4896 cmd.exe 153 PID 1500 wrote to memory of 2496 1500 oneetx.exe 167 PID 1500 wrote to memory of 2496 1500 oneetx.exe 167 PID 1500 wrote to memory of 2496 1500 oneetx.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe"C:\Users\Admin\AppData\Local\Temp\73ace5f4094ee0a1bc6ecbe694f3b9eff0c37b35c296c3400bfd27938ead1065.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidG1366.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidG1366.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivF9887.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivF9887.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it857452.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it857452.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr925120.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr925120.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 12965⤵
- Program crash
PID:512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp144822.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp144822.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr658166.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr658166.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 6963⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 7803⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 8563⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 9683⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 8563⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 8563⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 12043⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 12323⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13123⤵
- Program crash
PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 6924⤵
- Program crash
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 7924⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 7884⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10524⤵
- Program crash
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10884⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10884⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 11204⤵
- Program crash
PID:2672
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10084⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 7644⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 12684⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 7924⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 6924⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10084⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10924⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 16164⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 16004⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 16084⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 14323⤵
- Program crash
PID:5000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4488 -ip 44881⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3764 -ip 37641⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3764 -ip 37641⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3764 -ip 37641⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3764 -ip 37641⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3764 -ip 37641⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3764 -ip 37641⤵PID:3132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3764 -ip 37641⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3764 -ip 37641⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3764 -ip 37641⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3764 -ip 37641⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1500 -ip 15001⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1500 -ip 15001⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1500 -ip 15001⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1500 -ip 15001⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1500 -ip 15001⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1500 -ip 15001⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1500 -ip 15001⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1500 -ip 15001⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1500 -ip 15001⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1500 -ip 15001⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1500 -ip 15001⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1500 -ip 15001⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1500 -ip 15001⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 3162⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3524 -ip 35241⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1500 -ip 15001⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1500 -ip 15001⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1500 -ip 15001⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 3122⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3904 -ip 39041⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1500 -ip 15001⤵PID:2580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
616KB
MD5acfddecde56f436e8c969ec0b7e21b2a
SHA1ff57a17e02f95f8958f042d792b665cab3e7024f
SHA256bc56cc1ba62bdec905c79cdd5a6bcc5c3beb7fcee3398bc8efb9b30d99fabd69
SHA51224f97cbc35aee1616dda71959f1bfe8c7325bc944552bb83f54c87126c17ae0a3ed51851d879a8bbb7b55d511edbc0fee2fd325e4a2fd2af30fd6966c4f55b0c
-
Filesize
616KB
MD5acfddecde56f436e8c969ec0b7e21b2a
SHA1ff57a17e02f95f8958f042d792b665cab3e7024f
SHA256bc56cc1ba62bdec905c79cdd5a6bcc5c3beb7fcee3398bc8efb9b30d99fabd69
SHA51224f97cbc35aee1616dda71959f1bfe8c7325bc944552bb83f54c87126c17ae0a3ed51851d879a8bbb7b55d511edbc0fee2fd325e4a2fd2af30fd6966c4f55b0c
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
461KB
MD5be06311c59d350e5ec4e1b31ba594e2f
SHA1eafb567e317e86b31d723a890a3fc99595c6bce2
SHA25690f26dd74dfa7b319655e465d648b3178188368d3109e22e3e3c8e38dd7ec538
SHA512f562f7b7dfdf7eab8e65b2959fb4d15f437c701c7057575b1ec185aba6896a6b7c5a007845d4245cda4a37a66ec4f5bfcef0f00e61453f934615f152b24ff4cf
-
Filesize
461KB
MD5be06311c59d350e5ec4e1b31ba594e2f
SHA1eafb567e317e86b31d723a890a3fc99595c6bce2
SHA25690f26dd74dfa7b319655e465d648b3178188368d3109e22e3e3c8e38dd7ec538
SHA512f562f7b7dfdf7eab8e65b2959fb4d15f437c701c7057575b1ec185aba6896a6b7c5a007845d4245cda4a37a66ec4f5bfcef0f00e61453f934615f152b24ff4cf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
472KB
MD5cbc48164b819413e3d1f515077fa2571
SHA1442d51ffc2b5480d7a91d11449d882998f53fdaa
SHA256142b92f9a145456da679b15776e0cec00700cdfdfba55e26d7e810573af493a4
SHA512c73566d3201780bcaf67b3608736fb095c28b1c7f562862e555576c286648caf700af31f0817507f9932948af9920f814daa1c03e967c0d67cae5c33af046685
-
Filesize
472KB
MD5cbc48164b819413e3d1f515077fa2571
SHA1442d51ffc2b5480d7a91d11449d882998f53fdaa
SHA256142b92f9a145456da679b15776e0cec00700cdfdfba55e26d7e810573af493a4
SHA512c73566d3201780bcaf67b3608736fb095c28b1c7f562862e555576c286648caf700af31f0817507f9932948af9920f814daa1c03e967c0d67cae5c33af046685
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
367KB
MD598bc3d46fe5df01b31e8ab14e691c5bc
SHA18a23d25e327a8665a00e0ab49c4faf9be0c046bd
SHA2560d43431f47b97e158ee6272cbe65348a91216ce2c673e6a8962497c179c80c19
SHA512f0d555b090bda0842a9d80b5347c82185069cedf75b63dcc5b04f57f53a2094ddc024b88f412c42f985cf70456e3af6d70d14ad548cd6ebb7ddadaab06b208f9
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5