Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 03:44
Static task
static1
General
-
Target
f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe
-
Size
1.0MB
-
MD5
85e2f92ebf28922761a78f55eda03ba4
-
SHA1
04a67a0c8caa13fe0e2593a40fa7829a10e7beed
-
SHA256
f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae
-
SHA512
26a70301af9d4eb3032f4b3459ddc61d2ccc28a57aaf5cde36fae490d09f3bb5688ac94d8cec0a5bbe66547cffe6e81ce352772902a538cf4e78822dbea6d971
-
SSDEEP
24576:HyfRsXEzMxJ7Jd31awPvYz2gsYo7C+StpZDmAT3kEAu3B:SAEI77JdLYz2gym+StLB3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr429898.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr429898.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si475598.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1452 un620763.exe 964 un503876.exe 1216 pr429898.exe 3868 qu770099.exe 2940 rk194853.exe 2724 si475598.exe 4900 oneetx.exe 2956 oneetx.exe 4120 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr429898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr429898.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un620763.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un503876.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un503876.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un620763.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 3688 1216 WerFault.exe 85 3976 3868 WerFault.exe 91 2408 2724 WerFault.exe 95 2568 2724 WerFault.exe 95 2636 2724 WerFault.exe 95 2716 2724 WerFault.exe 95 3608 2724 WerFault.exe 95 3780 2724 WerFault.exe 95 4112 2724 WerFault.exe 95 2692 2724 WerFault.exe 95 3984 2724 WerFault.exe 95 3296 2724 WerFault.exe 95 2268 4900 WerFault.exe 115 1420 4900 WerFault.exe 115 4684 4900 WerFault.exe 115 4400 4900 WerFault.exe 115 4916 4900 WerFault.exe 115 1480 4900 WerFault.exe 115 1680 4900 WerFault.exe 115 948 4900 WerFault.exe 115 1836 4900 WerFault.exe 115 1044 4900 WerFault.exe 115 1168 4900 WerFault.exe 115 3868 4900 WerFault.exe 115 4536 4900 WerFault.exe 115 1452 4900 WerFault.exe 115 3536 4900 WerFault.exe 115 3668 2956 WerFault.exe 162 1508 4900 WerFault.exe 115 4316 4900 WerFault.exe 115 3764 4900 WerFault.exe 115 1400 4120 WerFault.exe 172 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4388 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1216 pr429898.exe 1216 pr429898.exe 3868 qu770099.exe 3868 qu770099.exe 2940 rk194853.exe 2940 rk194853.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1216 pr429898.exe Token: SeDebugPrivilege 3868 qu770099.exe Token: SeDebugPrivilege 2940 rk194853.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 si475598.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1452 1516 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 83 PID 1516 wrote to memory of 1452 1516 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 83 PID 1516 wrote to memory of 1452 1516 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 83 PID 1452 wrote to memory of 964 1452 un620763.exe 84 PID 1452 wrote to memory of 964 1452 un620763.exe 84 PID 1452 wrote to memory of 964 1452 un620763.exe 84 PID 964 wrote to memory of 1216 964 un503876.exe 85 PID 964 wrote to memory of 1216 964 un503876.exe 85 PID 964 wrote to memory of 1216 964 un503876.exe 85 PID 964 wrote to memory of 3868 964 un503876.exe 91 PID 964 wrote to memory of 3868 964 un503876.exe 91 PID 964 wrote to memory of 3868 964 un503876.exe 91 PID 1452 wrote to memory of 2940 1452 un620763.exe 94 PID 1452 wrote to memory of 2940 1452 un620763.exe 94 PID 1452 wrote to memory of 2940 1452 un620763.exe 94 PID 1516 wrote to memory of 2724 1516 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 95 PID 1516 wrote to memory of 2724 1516 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 95 PID 1516 wrote to memory of 2724 1516 f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe 95 PID 2724 wrote to memory of 4900 2724 si475598.exe 115 PID 2724 wrote to memory of 4900 2724 si475598.exe 115 PID 2724 wrote to memory of 4900 2724 si475598.exe 115 PID 4900 wrote to memory of 4388 4900 oneetx.exe 133 PID 4900 wrote to memory of 4388 4900 oneetx.exe 133 PID 4900 wrote to memory of 4388 4900 oneetx.exe 133 PID 4900 wrote to memory of 4936 4900 oneetx.exe 139 PID 4900 wrote to memory of 4936 4900 oneetx.exe 139 PID 4900 wrote to memory of 4936 4900 oneetx.exe 139 PID 4936 wrote to memory of 1132 4936 cmd.exe 143 PID 4936 wrote to memory of 1132 4936 cmd.exe 143 PID 4936 wrote to memory of 1132 4936 cmd.exe 143 PID 4936 wrote to memory of 472 4936 cmd.exe 144 PID 4936 wrote to memory of 472 4936 cmd.exe 144 PID 4936 wrote to memory of 472 4936 cmd.exe 144 PID 4936 wrote to memory of 308 4936 cmd.exe 145 PID 4936 wrote to memory of 308 4936 cmd.exe 145 PID 4936 wrote to memory of 308 4936 cmd.exe 145 PID 4936 wrote to memory of 3784 4936 cmd.exe 146 PID 4936 wrote to memory of 3784 4936 cmd.exe 146 PID 4936 wrote to memory of 3784 4936 cmd.exe 146 PID 4936 wrote to memory of 208 4936 cmd.exe 147 PID 4936 wrote to memory of 208 4936 cmd.exe 147 PID 4936 wrote to memory of 208 4936 cmd.exe 147 PID 4936 wrote to memory of 3964 4936 cmd.exe 148 PID 4936 wrote to memory of 3964 4936 cmd.exe 148 PID 4936 wrote to memory of 3964 4936 cmd.exe 148 PID 4900 wrote to memory of 2652 4900 oneetx.exe 167 PID 4900 wrote to memory of 2652 4900 oneetx.exe 167 PID 4900 wrote to memory of 2652 4900 oneetx.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe"C:\Users\Admin\AppData\Local\Temp\f466928f67d7a69dee3b8804af32a3097a375e8d0abddd01f725e48dd41094ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un503876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un503876.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr429898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr429898.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10805⤵
- Program crash
PID:3688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu770099.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu770099.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 18165⤵
- Program crash
PID:3976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk194853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk194853.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475598.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 6963⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 7723⤵
- Program crash
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 8563⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 9603⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 9923⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 8603⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 12203⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 12403⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 13203⤵
- Program crash
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 6924⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 8284⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 8964⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 10524⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 10924⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 11124⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 11564⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 9924⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 7764⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 7524⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 7284⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 12964⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 7724⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 14564⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 11364⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 16284⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 14564⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 16444⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 17563⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1216 -ip 12161⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3868 -ip 38681⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2724 -ip 27241⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2724 -ip 27241⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2724 -ip 27241⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2724 -ip 27241⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2724 -ip 27241⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2724 -ip 27241⤵PID:516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2724 -ip 27241⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2724 -ip 27241⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2724 -ip 27241⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2724 -ip 27241⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4900 -ip 49001⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4900 -ip 49001⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4900 -ip 49001⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4900 -ip 49001⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4900 -ip 49001⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4900 -ip 49001⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4900 -ip 49001⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4900 -ip 49001⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4900 -ip 49001⤵PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4900 -ip 49001⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4900 -ip 49001⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4900 -ip 49001⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4900 -ip 49001⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4900 -ip 49001⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4900 -ip 49001⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 3162⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2956 -ip 29561⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4900 -ip 49001⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4900 -ip 49001⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4900 -ip 49001⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 3122⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4120 -ip 41201⤵PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
751KB
MD518aed745a55ca5c3b1ffbc547a8b2e5a
SHA123c34fe5a04be07a723d9e69d27802eceb4d2c3f
SHA256b8bae87744f953afa711e7679d0c0b25a2716f96841176fc1be87714d77d87c6
SHA512ce996c54dedeeec15490a216b68e90fe01aea5c7b94f26f59b81745d5685f454e9d5112f3b6018a90507c34d87de1e26077a3411764f54e595854fb79123b48e
-
Filesize
751KB
MD518aed745a55ca5c3b1ffbc547a8b2e5a
SHA123c34fe5a04be07a723d9e69d27802eceb4d2c3f
SHA256b8bae87744f953afa711e7679d0c0b25a2716f96841176fc1be87714d77d87c6
SHA512ce996c54dedeeec15490a216b68e90fe01aea5c7b94f26f59b81745d5685f454e9d5112f3b6018a90507c34d87de1e26077a3411764f54e595854fb79123b48e
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
597KB
MD58b62a01fe4cb8404215d14ad626d67b8
SHA11f19bd315132e6c062e85e9c23152bedfecbdcbc
SHA2568f25c37e18cae99c6cd03f833c9b20fec7570f0548920ac95c2fc0dea8eaaf3a
SHA512dcb737299fff027a284caba50e1809833b7fa859cccaddcb0b6077e7eb991a834e0a8cf77740d0c762ae9a8389f54b586b5e26e16933b974144661e6de4d4f01
-
Filesize
597KB
MD58b62a01fe4cb8404215d14ad626d67b8
SHA11f19bd315132e6c062e85e9c23152bedfecbdcbc
SHA2568f25c37e18cae99c6cd03f833c9b20fec7570f0548920ac95c2fc0dea8eaaf3a
SHA512dcb737299fff027a284caba50e1809833b7fa859cccaddcb0b6077e7eb991a834e0a8cf77740d0c762ae9a8389f54b586b5e26e16933b974144661e6de4d4f01
-
Filesize
391KB
MD5fd238a8f45d744e8ff4645753965af45
SHA1c6973d53c15ee021c96bb89ab98f4e4d4f38f505
SHA256ee09238596e64a9311e94795f8699fbda99512c3452758506d2bb034fd98f5f2
SHA512aea6a7b0c65e7caf09e81baddfc8d05f6a8db863793bd5a975fb7227f4c265a67643f18a92efe7a58c4c5599f7f1406f2555c90292282a3e9411dca566775b3c
-
Filesize
391KB
MD5fd238a8f45d744e8ff4645753965af45
SHA1c6973d53c15ee021c96bb89ab98f4e4d4f38f505
SHA256ee09238596e64a9311e94795f8699fbda99512c3452758506d2bb034fd98f5f2
SHA512aea6a7b0c65e7caf09e81baddfc8d05f6a8db863793bd5a975fb7227f4c265a67643f18a92efe7a58c4c5599f7f1406f2555c90292282a3e9411dca566775b3c
-
Filesize
474KB
MD5888afd8e210a0f3c731485f8424a6adf
SHA1738cde276eb95173521890b0a5e7c78ee018a210
SHA2564500762850fed43cb49788fbeb50839b4cb971b1956d1f149f2f21e21db9b02b
SHA5129d0a6a72f9458c0a6029772d150b0dc9da21c7b36d8eaec6190b9db4b4f195af1711bb98e5a3621cf7adde0bb0677aa6dc91d4b8a4eeee5c83b5e9e6b3ad5277
-
Filesize
474KB
MD5888afd8e210a0f3c731485f8424a6adf
SHA1738cde276eb95173521890b0a5e7c78ee018a210
SHA2564500762850fed43cb49788fbeb50839b4cb971b1956d1f149f2f21e21db9b02b
SHA5129d0a6a72f9458c0a6029772d150b0dc9da21c7b36d8eaec6190b9db4b4f195af1711bb98e5a3621cf7adde0bb0677aa6dc91d4b8a4eeee5c83b5e9e6b3ad5277
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
370KB
MD5ea31b769aaa2cb2ee0c5f2355e4e3605
SHA180c16f1c0a93cda0a2baebabe760c5558c21c43a
SHA25663428a8e51dd15eaa76f5c5cfc307b95c41b2a72ab669c31c4672a20dd3ec186
SHA5126a04722ba4a55eb03e2f04eaafe9029b9f4aa56e061805a25be9c56c29ac39c66753683a95bc1b0bb624e49882b45d581abb5ca4128dc70cf22ae1db082a7846
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5