Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 23:45
Static task
static1
General
-
Target
b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe
-
Size
943KB
-
MD5
0adfbf633985285825a00c6b11c08e2f
-
SHA1
de1f08ea9c6a178579860c8e4502ba244bd2ea6e
-
SHA256
b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42
-
SHA512
970b58b53dd712b0dc60f6b3911d010e34e2f4958cb70528808ab9562be2ec1228fd295cf4a71237e484647185857ba594c776506880cd7a8cff89f7d621f004
-
SSDEEP
24576:eyx/CkpNf16oR/5knWLIQpd+Bp0q/gGRkr7cLZt6utT:tx/CkpNjRQWLIQpdIpzkrQLZ8u
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr251708.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr251708.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr251708.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr251708.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr251708.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr251708.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation si567005.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2672 un088028.exe 1436 un624195.exe 4256 pr251708.exe 4768 qu472402.exe 3224 rk597508.exe 1192 si567005.exe 2256 oneetx.exe 4700 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr251708.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr251708.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un088028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un088028.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un624195.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un624195.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3832 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 1896 4256 WerFault.exe 86 1400 4768 WerFault.exe 92 3820 1192 WerFault.exe 97 236 1192 WerFault.exe 97 3068 1192 WerFault.exe 97 4004 1192 WerFault.exe 97 4040 1192 WerFault.exe 97 4784 1192 WerFault.exe 97 2320 1192 WerFault.exe 97 2500 1192 WerFault.exe 97 1144 1192 WerFault.exe 97 3432 1192 WerFault.exe 97 4084 2256 WerFault.exe 117 1544 2256 WerFault.exe 117 2280 2256 WerFault.exe 117 3544 2256 WerFault.exe 117 4636 2256 WerFault.exe 117 4408 2256 WerFault.exe 117 3136 2256 WerFault.exe 117 4488 2256 WerFault.exe 117 5044 2256 WerFault.exe 117 2188 2256 WerFault.exe 117 2164 2256 WerFault.exe 117 4812 2256 WerFault.exe 117 2784 2256 WerFault.exe 117 564 2256 WerFault.exe 117 3740 2256 WerFault.exe 117 3048 2256 WerFault.exe 117 1160 2256 WerFault.exe 117 3320 4700 WerFault.exe 168 1376 2256 WerFault.exe 117 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4256 pr251708.exe 4256 pr251708.exe 4768 qu472402.exe 4768 qu472402.exe 3224 rk597508.exe 3224 rk597508.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4256 pr251708.exe Token: SeDebugPrivilege 4768 qu472402.exe Token: SeDebugPrivilege 3224 rk597508.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 si567005.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3948 wrote to memory of 2672 3948 b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe 84 PID 3948 wrote to memory of 2672 3948 b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe 84 PID 3948 wrote to memory of 2672 3948 b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe 84 PID 2672 wrote to memory of 1436 2672 un088028.exe 85 PID 2672 wrote to memory of 1436 2672 un088028.exe 85 PID 2672 wrote to memory of 1436 2672 un088028.exe 85 PID 1436 wrote to memory of 4256 1436 un624195.exe 86 PID 1436 wrote to memory of 4256 1436 un624195.exe 86 PID 1436 wrote to memory of 4256 1436 un624195.exe 86 PID 1436 wrote to memory of 4768 1436 un624195.exe 92 PID 1436 wrote to memory of 4768 1436 un624195.exe 92 PID 1436 wrote to memory of 4768 1436 un624195.exe 92 PID 2672 wrote to memory of 3224 2672 un088028.exe 95 PID 2672 wrote to memory of 3224 2672 un088028.exe 95 PID 2672 wrote to memory of 3224 2672 un088028.exe 95 PID 3948 wrote to memory of 1192 3948 b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe 97 PID 3948 wrote to memory of 1192 3948 b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe 97 PID 3948 wrote to memory of 1192 3948 b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe 97 PID 1192 wrote to memory of 2256 1192 si567005.exe 117 PID 1192 wrote to memory of 2256 1192 si567005.exe 117 PID 1192 wrote to memory of 2256 1192 si567005.exe 117 PID 2256 wrote to memory of 4476 2256 oneetx.exe 137 PID 2256 wrote to memory of 4476 2256 oneetx.exe 137 PID 2256 wrote to memory of 4476 2256 oneetx.exe 137 PID 2256 wrote to memory of 4768 2256 oneetx.exe 143 PID 2256 wrote to memory of 4768 2256 oneetx.exe 143 PID 2256 wrote to memory of 4768 2256 oneetx.exe 143 PID 4768 wrote to memory of 4520 4768 cmd.exe 146 PID 4768 wrote to memory of 4520 4768 cmd.exe 146 PID 4768 wrote to memory of 4520 4768 cmd.exe 146 PID 4768 wrote to memory of 1744 4768 cmd.exe 147 PID 4768 wrote to memory of 1744 4768 cmd.exe 147 PID 4768 wrote to memory of 1744 4768 cmd.exe 147 PID 4768 wrote to memory of 4232 4768 cmd.exe 149 PID 4768 wrote to memory of 4232 4768 cmd.exe 149 PID 4768 wrote to memory of 4232 4768 cmd.exe 149 PID 4768 wrote to memory of 2308 4768 cmd.exe 150 PID 4768 wrote to memory of 2308 4768 cmd.exe 150 PID 4768 wrote to memory of 2308 4768 cmd.exe 150 PID 4768 wrote to memory of 2116 4768 cmd.exe 151 PID 4768 wrote to memory of 2116 4768 cmd.exe 151 PID 4768 wrote to memory of 2116 4768 cmd.exe 151 PID 4768 wrote to memory of 3156 4768 cmd.exe 152 PID 4768 wrote to memory of 3156 4768 cmd.exe 152 PID 4768 wrote to memory of 3156 4768 cmd.exe 152 PID 2256 wrote to memory of 2196 2256 oneetx.exe 165 PID 2256 wrote to memory of 2196 2256 oneetx.exe 165 PID 2256 wrote to memory of 2196 2256 oneetx.exe 165
Processes
-
C:\Users\Admin\AppData\Local\Temp\b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe"C:\Users\Admin\AppData\Local\Temp\b65f01e77c105765db696b5e1dccb76497511b7b48409b2b73d08d24aa665c42.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088028.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un624195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un624195.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr251708.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr251708.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 10885⤵
- Program crash
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu472402.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu472402.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 13205⤵
- Program crash
PID:1400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk597508.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk597508.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si567005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si567005.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 6963⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7803⤵
- Program crash
PID:236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 8563⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 9523⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 9763⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 10083⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 11563⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 12323⤵
- Program crash
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 13203⤵
- Program crash
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 6924⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 8604⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 9124⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 10524⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 10724⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 10724⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 10524⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 9924⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 9364⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 13244⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 12804⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 12964⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 13204⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 15404⤵
- Program crash
PID:564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 11364⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 16324⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 15484⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 16484⤵
- Program crash
PID:1376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 13603⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4256 -ip 42561⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4768 -ip 47681⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1192 -ip 11921⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1192 -ip 11921⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1192 -ip 11921⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1192 -ip 11921⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1192 -ip 11921⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1192 -ip 11921⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1192 -ip 11921⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1192 -ip 11921⤵PID:2688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1192 -ip 11921⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1192 -ip 11921⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2256 -ip 22561⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2256 -ip 22561⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2256 -ip 22561⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2256 -ip 22561⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2256 -ip 22561⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 2256 -ip 22561⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2256 -ip 22561⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2256 -ip 22561⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2256 -ip 22561⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2256 -ip 22561⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2256 -ip 22561⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2256 -ip 22561⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2256 -ip 22561⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2256 -ip 22561⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2256 -ip 22561⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2256 -ip 22561⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2256 -ip 22561⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 3282⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4700 -ip 47001⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2256 -ip 22561⤵PID:3472
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD52d45da554342c012dc86abb0775ac725
SHA1e3b3edd1e5f90b45c417731413ead224ff890cce
SHA2560e0f3d19566650ee24123d2e944098adb7f721782e8aa0583b18aaf7d73154cd
SHA512128e6f9714ea405f9af2df64a0a4f961de2ccb41136dc95ae35ad5d60ef521d0f0f0b9dd033d7e02fed2343f196570dbdff9db2ff0fe23f7290f91aa276c3627
-
Filesize
256KB
MD52d45da554342c012dc86abb0775ac725
SHA1e3b3edd1e5f90b45c417731413ead224ff890cce
SHA2560e0f3d19566650ee24123d2e944098adb7f721782e8aa0583b18aaf7d73154cd
SHA512128e6f9714ea405f9af2df64a0a4f961de2ccb41136dc95ae35ad5d60ef521d0f0f0b9dd033d7e02fed2343f196570dbdff9db2ff0fe23f7290f91aa276c3627
-
Filesize
695KB
MD50b5b72808ce4fc70e90cf3b31b796570
SHA18370d4c9594f7933b12fa35848b44ab8d65bcc2a
SHA2563304981b43021e8f8297f1224b4a31f6062616fd2aade08dceb85d0925fe91de
SHA51254ea6cff447c50a6b7dcea93aa77aedb26e3249ae93bc96442261510c58998bdc6d1bb19b59328e2a2e92420111c910132ae58199ad9cdc124e9f02d94daacc8
-
Filesize
695KB
MD50b5b72808ce4fc70e90cf3b31b796570
SHA18370d4c9594f7933b12fa35848b44ab8d65bcc2a
SHA2563304981b43021e8f8297f1224b4a31f6062616fd2aade08dceb85d0925fe91de
SHA51254ea6cff447c50a6b7dcea93aa77aedb26e3249ae93bc96442261510c58998bdc6d1bb19b59328e2a2e92420111c910132ae58199ad9cdc124e9f02d94daacc8
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
541KB
MD56ec3c0d9dd34c77b982450354be8cbdc
SHA1962addcd1a182d1a57b2c40a4130ee1fe3723af0
SHA2566c228239b694602d42c91cb9f020a300cf3c550514c8e48d67b9f915990508b6
SHA5124041a6b470c9ae76a055104bd849748e11045fe860293d3b2fd307f94e8fc3bc1871a04c5ac5846f6955e1ed5d730f60a448450da98c0369e3a8afba25fcf188
-
Filesize
541KB
MD56ec3c0d9dd34c77b982450354be8cbdc
SHA1962addcd1a182d1a57b2c40a4130ee1fe3723af0
SHA2566c228239b694602d42c91cb9f020a300cf3c550514c8e48d67b9f915990508b6
SHA5124041a6b470c9ae76a055104bd849748e11045fe860293d3b2fd307f94e8fc3bc1871a04c5ac5846f6955e1ed5d730f60a448450da98c0369e3a8afba25fcf188
-
Filesize
277KB
MD5cd9ca464d9814fbb0864c6e12c1ea508
SHA1f7b5bd2a618cd83d349aa1b76c5dcf57d4e38374
SHA25652857cf8e1ce2809b236b0f42bf99b2d591a6ae99a4a21ed88795efb080dbdd9
SHA512ed6d61f758c9ce1fbd4b6f4e93ad318314a0367082fa1d7424f404b2074d7d22ffc69d86c00be1df7b582412313934ec31058772c553148d47a35bd7231ebb82
-
Filesize
277KB
MD5cd9ca464d9814fbb0864c6e12c1ea508
SHA1f7b5bd2a618cd83d349aa1b76c5dcf57d4e38374
SHA25652857cf8e1ce2809b236b0f42bf99b2d591a6ae99a4a21ed88795efb080dbdd9
SHA512ed6d61f758c9ce1fbd4b6f4e93ad318314a0367082fa1d7424f404b2074d7d22ffc69d86c00be1df7b582412313934ec31058772c553148d47a35bd7231ebb82
-
Filesize
360KB
MD57bc6a67341228c6a1aaf89a47daeb01d
SHA11febfce40f78e10e07468a00dc4a3dee9e4f7c13
SHA2569a2679fbe90b8e6fdc0457cca4ecaf2ff7afdafc42aa6ad76fe00bbcd558e377
SHA5123f546209ba64063801955fba5fa7eeed27e84a3726bfe543e5e442b8ebb4681f8fe23be7011f294e3581b5b8908ce6543fa247d1fb38288767ec914eea6cd20f
-
Filesize
360KB
MD57bc6a67341228c6a1aaf89a47daeb01d
SHA11febfce40f78e10e07468a00dc4a3dee9e4f7c13
SHA2569a2679fbe90b8e6fdc0457cca4ecaf2ff7afdafc42aa6ad76fe00bbcd558e377
SHA5123f546209ba64063801955fba5fa7eeed27e84a3726bfe543e5e442b8ebb4681f8fe23be7011f294e3581b5b8908ce6543fa247d1fb38288767ec914eea6cd20f
-
Filesize
256KB
MD52d45da554342c012dc86abb0775ac725
SHA1e3b3edd1e5f90b45c417731413ead224ff890cce
SHA2560e0f3d19566650ee24123d2e944098adb7f721782e8aa0583b18aaf7d73154cd
SHA512128e6f9714ea405f9af2df64a0a4f961de2ccb41136dc95ae35ad5d60ef521d0f0f0b9dd033d7e02fed2343f196570dbdff9db2ff0fe23f7290f91aa276c3627
-
Filesize
256KB
MD52d45da554342c012dc86abb0775ac725
SHA1e3b3edd1e5f90b45c417731413ead224ff890cce
SHA2560e0f3d19566650ee24123d2e944098adb7f721782e8aa0583b18aaf7d73154cd
SHA512128e6f9714ea405f9af2df64a0a4f961de2ccb41136dc95ae35ad5d60ef521d0f0f0b9dd033d7e02fed2343f196570dbdff9db2ff0fe23f7290f91aa276c3627
-
Filesize
256KB
MD52d45da554342c012dc86abb0775ac725
SHA1e3b3edd1e5f90b45c417731413ead224ff890cce
SHA2560e0f3d19566650ee24123d2e944098adb7f721782e8aa0583b18aaf7d73154cd
SHA512128e6f9714ea405f9af2df64a0a4f961de2ccb41136dc95ae35ad5d60ef521d0f0f0b9dd033d7e02fed2343f196570dbdff9db2ff0fe23f7290f91aa276c3627
-
Filesize
256KB
MD52d45da554342c012dc86abb0775ac725
SHA1e3b3edd1e5f90b45c417731413ead224ff890cce
SHA2560e0f3d19566650ee24123d2e944098adb7f721782e8aa0583b18aaf7d73154cd
SHA512128e6f9714ea405f9af2df64a0a4f961de2ccb41136dc95ae35ad5d60ef521d0f0f0b9dd033d7e02fed2343f196570dbdff9db2ff0fe23f7290f91aa276c3627
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5