Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 22:58
Static task
static1
General
-
Target
4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe
-
Size
943KB
-
MD5
0be38c8049a981f9f6bf3731c77e1214
-
SHA1
452ccf57334511719d8bfa822b01c3fb5a74733f
-
SHA256
4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f
-
SHA512
c0e69cee85262cdc6946bb6dc4c6a4ffb46f711e1b1a71fd553eec803dd86814b8283e48bec0519f4c2fbcd9aeae5d0a421b213de9fc29b4843c4ef019441fde
-
SSDEEP
24576:HyNwDNZqKUcKiGHuLjubGAwpy7+pD8ZGIkgv4xXKL5:S+DnFNtnAwpyapJIkYyXK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr332836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr332836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr332836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr332836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr332836.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr332836.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si016474.exe -
Executes dropped EXE 9 IoCs
pid Process 1912 un078998.exe 4668 un281963.exe 3788 pr332836.exe 836 qu512710.exe 908 rk816166.exe 680 si016474.exe 5000 oneetx.exe 3456 oneetx.exe 3844 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr332836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr332836.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un078998.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un281963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un281963.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un078998.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 2100 3788 WerFault.exe 84 3356 836 WerFault.exe 93 4896 680 WerFault.exe 99 1800 680 WerFault.exe 99 4952 680 WerFault.exe 99 1264 680 WerFault.exe 99 4884 680 WerFault.exe 99 1868 680 WerFault.exe 99 1988 680 WerFault.exe 99 2844 680 WerFault.exe 99 2980 680 WerFault.exe 99 2760 680 WerFault.exe 99 2352 5000 WerFault.exe 118 2752 5000 WerFault.exe 118 3376 5000 WerFault.exe 118 2420 5000 WerFault.exe 118 1544 5000 WerFault.exe 118 3340 5000 WerFault.exe 118 1236 5000 WerFault.exe 118 3752 5000 WerFault.exe 118 2972 5000 WerFault.exe 118 3772 5000 WerFault.exe 118 548 5000 WerFault.exe 118 4432 5000 WerFault.exe 118 4712 5000 WerFault.exe 118 4960 5000 WerFault.exe 118 4840 3456 WerFault.exe 159 2440 5000 WerFault.exe 118 2112 5000 WerFault.exe 118 5060 5000 WerFault.exe 118 4072 3844 WerFault.exe 169 5104 5000 WerFault.exe 118 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3788 pr332836.exe 3788 pr332836.exe 836 qu512710.exe 836 qu512710.exe 908 rk816166.exe 908 rk816166.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3788 pr332836.exe Token: SeDebugPrivilege 836 qu512710.exe Token: SeDebugPrivilege 908 rk816166.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 680 si016474.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1912 2512 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe 82 PID 2512 wrote to memory of 1912 2512 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe 82 PID 2512 wrote to memory of 1912 2512 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe 82 PID 1912 wrote to memory of 4668 1912 un078998.exe 83 PID 1912 wrote to memory of 4668 1912 un078998.exe 83 PID 1912 wrote to memory of 4668 1912 un078998.exe 83 PID 4668 wrote to memory of 3788 4668 un281963.exe 84 PID 4668 wrote to memory of 3788 4668 un281963.exe 84 PID 4668 wrote to memory of 3788 4668 un281963.exe 84 PID 4668 wrote to memory of 836 4668 un281963.exe 93 PID 4668 wrote to memory of 836 4668 un281963.exe 93 PID 4668 wrote to memory of 836 4668 un281963.exe 93 PID 1912 wrote to memory of 908 1912 un078998.exe 97 PID 1912 wrote to memory of 908 1912 un078998.exe 97 PID 1912 wrote to memory of 908 1912 un078998.exe 97 PID 2512 wrote to memory of 680 2512 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe 99 PID 2512 wrote to memory of 680 2512 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe 99 PID 2512 wrote to memory of 680 2512 4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe 99 PID 680 wrote to memory of 5000 680 si016474.exe 118 PID 680 wrote to memory of 5000 680 si016474.exe 118 PID 680 wrote to memory of 5000 680 si016474.exe 118 PID 5000 wrote to memory of 2228 5000 oneetx.exe 135 PID 5000 wrote to memory of 2228 5000 oneetx.exe 135 PID 5000 wrote to memory of 2228 5000 oneetx.exe 135 PID 5000 wrote to memory of 3812 5000 oneetx.exe 141 PID 5000 wrote to memory of 3812 5000 oneetx.exe 141 PID 5000 wrote to memory of 3812 5000 oneetx.exe 141 PID 3812 wrote to memory of 3896 3812 cmd.exe 145 PID 3812 wrote to memory of 3896 3812 cmd.exe 145 PID 3812 wrote to memory of 3896 3812 cmd.exe 145 PID 3812 wrote to memory of 1668 3812 cmd.exe 146 PID 3812 wrote to memory of 1668 3812 cmd.exe 146 PID 3812 wrote to memory of 1668 3812 cmd.exe 146 PID 3812 wrote to memory of 3180 3812 cmd.exe 147 PID 3812 wrote to memory of 3180 3812 cmd.exe 147 PID 3812 wrote to memory of 3180 3812 cmd.exe 147 PID 3812 wrote to memory of 4548 3812 cmd.exe 148 PID 3812 wrote to memory of 4548 3812 cmd.exe 148 PID 3812 wrote to memory of 4548 3812 cmd.exe 148 PID 3812 wrote to memory of 3220 3812 cmd.exe 149 PID 3812 wrote to memory of 3220 3812 cmd.exe 149 PID 3812 wrote to memory of 3220 3812 cmd.exe 149 PID 3812 wrote to memory of 4780 3812 cmd.exe 150 PID 3812 wrote to memory of 4780 3812 cmd.exe 150 PID 3812 wrote to memory of 4780 3812 cmd.exe 150 PID 5000 wrote to memory of 2660 5000 oneetx.exe 166 PID 5000 wrote to memory of 2660 5000 oneetx.exe 166 PID 5000 wrote to memory of 2660 5000 oneetx.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe"C:\Users\Admin\AppData\Local\Temp\4a64b611e345156c7df3296ad8b3ed996b2b08ad43a07cad16926b33a95bb44f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078998.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un281963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un281963.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr332836.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr332836.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 10965⤵
- Program crash
PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu512710.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu512710.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 10445⤵
- Program crash
PID:3356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk816166.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016474.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 6963⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 7803⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 8123⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 9683⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 9883⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 8683⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 12163⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 12323⤵
- Program crash
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 13123⤵
- Program crash
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 6924⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 8644⤵
- Program crash
PID:2752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 8924⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10524⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10724⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10724⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 11324⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 9924⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 10644⤵
- Program crash
PID:2972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4548
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 8884⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 7244⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 8884⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 7204⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 14364⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 11804⤵
- Program crash
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 16244⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 15124⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 16404⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 13643⤵
- Program crash
PID:2760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3788 -ip 37881⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 836 -ip 8361⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 680 -ip 6801⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 680 -ip 6801⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 680 -ip 6801⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 680 -ip 6801⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 680 -ip 6801⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 680 -ip 6801⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 680 -ip 6801⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 680 -ip 6801⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 680 -ip 6801⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 680 -ip 6801⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5000 -ip 50001⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5000 -ip 50001⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5000 -ip 50001⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5000 -ip 50001⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5000 -ip 50001⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5000 -ip 50001⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5000 -ip 50001⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5000 -ip 50001⤵PID:904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5000 -ip 50001⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5000 -ip 50001⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5000 -ip 50001⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5000 -ip 50001⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5000 -ip 50001⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5000 -ip 50001⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 3122⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3456 -ip 34561⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5000 -ip 50001⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5000 -ip 50001⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5000 -ip 50001⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 3162⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3844 -ip 38441⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5000 -ip 50001⤵PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
695KB
MD56b547dd261ef5f166bef821692dd1c0e
SHA1907163fdcf3cbb6b8599c30ca57af76803eeec72
SHA256e7210aaeb052c7c721c05ff3f5164d0528981a74c0da7fbb474563232da2007c
SHA512656c55658cc4454b330f02d48813f7e5f85c57a25ec1db6202c03c90835a64f5e34de3a9d9769cf773f443b3db9c3efc8ce8a51cc3093f1c57e67ac3c321fcc4
-
Filesize
695KB
MD56b547dd261ef5f166bef821692dd1c0e
SHA1907163fdcf3cbb6b8599c30ca57af76803eeec72
SHA256e7210aaeb052c7c721c05ff3f5164d0528981a74c0da7fbb474563232da2007c
SHA512656c55658cc4454b330f02d48813f7e5f85c57a25ec1db6202c03c90835a64f5e34de3a9d9769cf773f443b3db9c3efc8ce8a51cc3093f1c57e67ac3c321fcc4
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
541KB
MD5405e2cb5230c75e72e3b0e2f151c2d1e
SHA1d3b565bd65e7a0ee58dabf3fb068c4efc319f4ef
SHA2567d10fc4dc2ff9adc6d39470362b3e1dacb1ade585c7150ac613cb18ba2563f1e
SHA512977e505282acc1fe2fd6860766d1eeda71d7264865e7d954144d96ea7b0d8e7773d293a0f81452498da290537f9f2b35fd09e1818ffad9a091ccb8a1cf0326b2
-
Filesize
541KB
MD5405e2cb5230c75e72e3b0e2f151c2d1e
SHA1d3b565bd65e7a0ee58dabf3fb068c4efc319f4ef
SHA2567d10fc4dc2ff9adc6d39470362b3e1dacb1ade585c7150ac613cb18ba2563f1e
SHA512977e505282acc1fe2fd6860766d1eeda71d7264865e7d954144d96ea7b0d8e7773d293a0f81452498da290537f9f2b35fd09e1818ffad9a091ccb8a1cf0326b2
-
Filesize
277KB
MD5efab5f5c6b59e73364fc7ecd79f100f7
SHA1b4971761374ac26f6ea758dfd647fbdcd145dafc
SHA25667279037d00aa13e75f9a3d3e3f523d8def432c62084e689da7c1606762d7440
SHA51272b16b7e46fd782aa240877be2e921c368bf241b461b40765814123edecc11a143158b6457f1b2cdacd33c4ced84a0f4c8de78698958ecd092dd286a8e5569a2
-
Filesize
277KB
MD5efab5f5c6b59e73364fc7ecd79f100f7
SHA1b4971761374ac26f6ea758dfd647fbdcd145dafc
SHA25667279037d00aa13e75f9a3d3e3f523d8def432c62084e689da7c1606762d7440
SHA51272b16b7e46fd782aa240877be2e921c368bf241b461b40765814123edecc11a143158b6457f1b2cdacd33c4ced84a0f4c8de78698958ecd092dd286a8e5569a2
-
Filesize
360KB
MD5922b4a3c006153ec497b7b4a2657d7c9
SHA12f0987e0f5e395a316acdbd70e7490822477b94d
SHA2561c64696c4694ba09da8c8a853611f4d9599945ab6c71342e4fa62a292579cb79
SHA512590254c36e2d30c8996723af3b3919ab921378ba76af86b900427591fd100c4b403e6038903877dd7195c5ca6c1e1ee8a29140c8e1aae61b14cf85d5c3debcba
-
Filesize
360KB
MD5922b4a3c006153ec497b7b4a2657d7c9
SHA12f0987e0f5e395a316acdbd70e7490822477b94d
SHA2561c64696c4694ba09da8c8a853611f4d9599945ab6c71342e4fa62a292579cb79
SHA512590254c36e2d30c8996723af3b3919ab921378ba76af86b900427591fd100c4b403e6038903877dd7195c5ca6c1e1ee8a29140c8e1aae61b14cf85d5c3debcba
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
256KB
MD5903e941e29f5ce93e8d8a9379103ed58
SHA10aaa82944a8cb6df2acd23687f8b5908364d12cc
SHA25627b22bb18d3fb7bb4c5caead21c6db65ddf1587e47074258c89f0fc4d3730a4a
SHA512825bf3f42a9bbba5b55e96e87f5a2181c1bd67e2a6b3b4be035bbb5d4f51d8a9f7078208b43221f0d37e6511655f313bd664ec155bc6f6a2c9775f40ba560e87
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5