Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 22:24
Static task
static1
General
-
Target
fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe
-
Size
807KB
-
MD5
7db01eda6fdfff55ef4cafe0db6ff4f5
-
SHA1
86d552b01a560f40f2058ad97cbdddc13aaf2457
-
SHA256
fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f
-
SHA512
3e65555e93a9fd5c3cd876f3f58689f46b407e822c50bd125afb7b28fd2da232cf7fc141a015adbded81a8d82749b092ad3e8bec038166413948ccb1748a3c14
-
SSDEEP
12288:6y90j3ZXTAT2fmN7Czg5eypPFGwD4fvixuBYGqp5LwUY6eTwCzen4LH:6yU3ZXkSRwdMycza5sl6eTPK4LH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it625296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it625296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it625296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it625296.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it625296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it625296.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr234299.exe -
Executes dropped EXE 9 IoCs
pid Process 392 ziQZ6051.exe 1536 ziDq4893.exe 2648 it625296.exe 228 jr664901.exe 4492 kp056236.exe 4924 lr234299.exe 1072 oneetx.exe 1524 oneetx.exe 536 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it625296.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQZ6051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQZ6051.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDq4893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziDq4893.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 2708 228 WerFault.exe 90 2076 4924 WerFault.exe 97 4440 4924 WerFault.exe 97 4164 4924 WerFault.exe 97 3608 4924 WerFault.exe 97 1052 4924 WerFault.exe 97 3580 4924 WerFault.exe 97 4348 4924 WerFault.exe 97 4368 4924 WerFault.exe 97 4424 4924 WerFault.exe 97 3820 4924 WerFault.exe 97 3008 1072 WerFault.exe 117 3936 1072 WerFault.exe 117 3660 1072 WerFault.exe 117 3244 1072 WerFault.exe 117 2728 1072 WerFault.exe 117 4268 1072 WerFault.exe 117 1704 1072 WerFault.exe 117 1860 1072 WerFault.exe 117 628 1072 WerFault.exe 117 2988 1072 WerFault.exe 117 3064 1072 WerFault.exe 117 2136 1072 WerFault.exe 117 2256 1072 WerFault.exe 117 4944 1524 WerFault.exe 156 3300 1072 WerFault.exe 117 5100 1072 WerFault.exe 117 1608 1072 WerFault.exe 117 4744 536 WerFault.exe 166 5076 1072 WerFault.exe 117 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2648 it625296.exe 2648 it625296.exe 228 jr664901.exe 228 jr664901.exe 4492 kp056236.exe 4492 kp056236.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2648 it625296.exe Token: SeDebugPrivilege 228 jr664901.exe Token: SeDebugPrivilege 4492 kp056236.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4924 lr234299.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2796 wrote to memory of 392 2796 fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe 83 PID 2796 wrote to memory of 392 2796 fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe 83 PID 2796 wrote to memory of 392 2796 fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe 83 PID 392 wrote to memory of 1536 392 ziQZ6051.exe 84 PID 392 wrote to memory of 1536 392 ziQZ6051.exe 84 PID 392 wrote to memory of 1536 392 ziQZ6051.exe 84 PID 1536 wrote to memory of 2648 1536 ziDq4893.exe 85 PID 1536 wrote to memory of 2648 1536 ziDq4893.exe 85 PID 1536 wrote to memory of 228 1536 ziDq4893.exe 90 PID 1536 wrote to memory of 228 1536 ziDq4893.exe 90 PID 1536 wrote to memory of 228 1536 ziDq4893.exe 90 PID 392 wrote to memory of 4492 392 ziQZ6051.exe 96 PID 392 wrote to memory of 4492 392 ziQZ6051.exe 96 PID 392 wrote to memory of 4492 392 ziQZ6051.exe 96 PID 2796 wrote to memory of 4924 2796 fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe 97 PID 2796 wrote to memory of 4924 2796 fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe 97 PID 2796 wrote to memory of 4924 2796 fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe 97 PID 4924 wrote to memory of 1072 4924 lr234299.exe 117 PID 4924 wrote to memory of 1072 4924 lr234299.exe 117 PID 4924 wrote to memory of 1072 4924 lr234299.exe 117 PID 1072 wrote to memory of 4720 1072 oneetx.exe 134 PID 1072 wrote to memory of 4720 1072 oneetx.exe 134 PID 1072 wrote to memory of 4720 1072 oneetx.exe 134 PID 1072 wrote to memory of 1396 1072 oneetx.exe 140 PID 1072 wrote to memory of 1396 1072 oneetx.exe 140 PID 1072 wrote to memory of 1396 1072 oneetx.exe 140 PID 1396 wrote to memory of 3648 1396 cmd.exe 144 PID 1396 wrote to memory of 3648 1396 cmd.exe 144 PID 1396 wrote to memory of 3648 1396 cmd.exe 144 PID 1396 wrote to memory of 2944 1396 cmd.exe 145 PID 1396 wrote to memory of 2944 1396 cmd.exe 145 PID 1396 wrote to memory of 2944 1396 cmd.exe 145 PID 1396 wrote to memory of 4292 1396 cmd.exe 146 PID 1396 wrote to memory of 4292 1396 cmd.exe 146 PID 1396 wrote to memory of 4292 1396 cmd.exe 146 PID 1396 wrote to memory of 4500 1396 cmd.exe 147 PID 1396 wrote to memory of 4500 1396 cmd.exe 147 PID 1396 wrote to memory of 4500 1396 cmd.exe 147 PID 1396 wrote to memory of 3896 1396 cmd.exe 148 PID 1396 wrote to memory of 3896 1396 cmd.exe 148 PID 1396 wrote to memory of 3896 1396 cmd.exe 148 PID 1396 wrote to memory of 1556 1396 cmd.exe 149 PID 1396 wrote to memory of 1556 1396 cmd.exe 149 PID 1396 wrote to memory of 1556 1396 cmd.exe 149 PID 1072 wrote to memory of 2936 1072 oneetx.exe 163 PID 1072 wrote to memory of 2936 1072 oneetx.exe 163 PID 1072 wrote to memory of 2936 1072 oneetx.exe 163
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe"C:\Users\Admin\AppData\Local\Temp\fec34bbf7a90d35fa277c9149fefb1f309494b89f87fd4b02a4e98f6c52acb0f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQZ6051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQZ6051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDq4893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDq4893.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it625296.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it625296.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr664901.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr664901.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 17525⤵
- Program crash
PID:2708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp056236.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp056236.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr234299.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr234299.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 6963⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7803⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8003⤵
- Program crash
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9683⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9603⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9483⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 12163⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 12403⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 13123⤵
- Program crash
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 6964⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 8524⤵
- Program crash
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 9164⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 10604⤵
- Program crash
PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 10884⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 11004⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 11444⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 9924⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 12884⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 8524⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 13044⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 12964⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 9164⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 11884⤵
- Program crash
PID:3300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 16164⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 11164⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 16284⤵
- Program crash
PID:5076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 14043⤵
- Program crash
PID:3820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 228 -ip 2281⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4924 -ip 49241⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4924 -ip 49241⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4924 -ip 49241⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4924 -ip 49241⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4924 -ip 49241⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4924 -ip 49241⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4924 -ip 49241⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4924 -ip 49241⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4924 -ip 49241⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4924 -ip 49241⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1072 -ip 10721⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1072 -ip 10721⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1072 -ip 10721⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1072 -ip 10721⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1072 -ip 10721⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1072 -ip 10721⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1072 -ip 10721⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1072 -ip 10721⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1072 -ip 10721⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1072 -ip 10721⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1072 -ip 10721⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1072 -ip 10721⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1072 -ip 10721⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 3202⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1524 -ip 15241⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1072 -ip 10721⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1072 -ip 10721⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1072 -ip 10721⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 3202⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 536 -ip 5361⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1072 -ip 10721⤵PID:732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
558KB
MD5d7de453a4e108513fe066ac198484177
SHA1ada981248c50ddd6f0d891f7fed468705d5e9ecd
SHA256343273ac02d7a8e0f7db7d281119fa97ca60d833a27c7aecf55723df47c56188
SHA512cfc36d811acc3c61dc80b719337b31a595276bc2db7829ca1ccc8baa16844b01b887916a1276c11a80978c0c458349fbccb01c22d46d13f6a4836cd864cb6df6
-
Filesize
558KB
MD5d7de453a4e108513fe066ac198484177
SHA1ada981248c50ddd6f0d891f7fed468705d5e9ecd
SHA256343273ac02d7a8e0f7db7d281119fa97ca60d833a27c7aecf55723df47c56188
SHA512cfc36d811acc3c61dc80b719337b31a595276bc2db7829ca1ccc8baa16844b01b887916a1276c11a80978c0c458349fbccb01c22d46d13f6a4836cd864cb6df6
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
404KB
MD50c5d905874019c7143e741fba7d64279
SHA16a403b5b35fd20b1d3e49a7bb4b383e32b2ea3e9
SHA256d288f909462549cd511380a1b1ea833ec2cafaf20b2003bd5a6050c25c7db938
SHA512a3dae93d5d8a27a067654ad35b430897a4ea21d1bc3b0869dc1a632007de532288e38e83af71c9080402ec83f9234a11cec0513a86355e9d2aa18f521cbacc83
-
Filesize
404KB
MD50c5d905874019c7143e741fba7d64279
SHA16a403b5b35fd20b1d3e49a7bb4b383e32b2ea3e9
SHA256d288f909462549cd511380a1b1ea833ec2cafaf20b2003bd5a6050c25c7db938
SHA512a3dae93d5d8a27a067654ad35b430897a4ea21d1bc3b0869dc1a632007de532288e38e83af71c9080402ec83f9234a11cec0513a86355e9d2aa18f521cbacc83
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD523298acef92acc3a87e8a578dbd1522d
SHA114ace4a3ba765816a9e11d08f113700f9af7a6ba
SHA2564389dc1a41ffff850e866395d2d41261271a742367f4df2d951d33c40b7df843
SHA51254de2227984060fbcae50b4a876810a13ba71d14d67791e4f88ce9ee428685665781fe7f720f71ce1bc2dfb28b7d22dcd62041ddde1a6666b6495d57417c622c
-
Filesize
361KB
MD523298acef92acc3a87e8a578dbd1522d
SHA114ace4a3ba765816a9e11d08f113700f9af7a6ba
SHA2564389dc1a41ffff850e866395d2d41261271a742367f4df2d951d33c40b7df843
SHA51254de2227984060fbcae50b4a876810a13ba71d14d67791e4f88ce9ee428685665781fe7f720f71ce1bc2dfb28b7d22dcd62041ddde1a6666b6495d57417c622c
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
257KB
MD5fc3d10ec0ef18b7beace9be06d66a86b
SHA1ea2ad41820498f29ffaaef595bd3e05bb40cefde
SHA256d69749ed30e830e34e077daa3e96882d004229106e3da8810b972e01a38c3838
SHA512264b4b9e7b8bf97bf881ff876ee4365f7380f404213c8fb5695055de06a50b998f0b7b166586cf98c00dfaa15594ec17a3be91f9a0692c97a77a7b8ac3cf79fc
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5