Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 04:01
Static task
static1
General
-
Target
0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe
-
Size
922KB
-
MD5
54ee93e2e57195c964dbdd7a460a785b
-
SHA1
cd029bd52eab241e1281a0c147b5622f13cb727f
-
SHA256
0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3
-
SHA512
29acc978fc1df9a353be65274bfb760611adce0eaed13bee94ad26574d7278201120d8c425cde5bad8ce1ea4121ac16c828433421a243f72f3919de3d721ccda
-
SSDEEP
24576:zyyNV8arq2i54kHbq/Z5oRHEp77ttDdFyXXwYD4:GyNVot4gCZyAtTuXV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it031072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it031072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it031072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it031072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it031072.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it031072.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lr347387.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 4556 ziTU1018.exe 408 zied2578.exe 2304 it031072.exe 640 jr239129.exe 4908 kp786389.exe 2212 lr347387.exe 4572 oneetx.exe 4712 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1192 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it031072.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTU1018.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTU1018.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zied2578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zied2578.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 4152 640 WerFault.exe 90 5092 2212 WerFault.exe 97 3016 2212 WerFault.exe 97 4316 2212 WerFault.exe 97 4360 2212 WerFault.exe 97 1480 2212 WerFault.exe 97 3664 2212 WerFault.exe 97 2268 2212 WerFault.exe 97 4820 2212 WerFault.exe 97 3244 2212 WerFault.exe 97 2336 2212 WerFault.exe 97 3636 4572 WerFault.exe 117 3976 4572 WerFault.exe 117 1336 4572 WerFault.exe 117 2092 4572 WerFault.exe 117 1084 4572 WerFault.exe 117 2804 4572 WerFault.exe 117 1052 4572 WerFault.exe 117 4460 4572 WerFault.exe 117 4988 4572 WerFault.exe 117 4388 4572 WerFault.exe 117 3468 4572 WerFault.exe 117 1664 4572 WerFault.exe 117 4556 4572 WerFault.exe 117 5008 4572 WerFault.exe 117 4564 4572 WerFault.exe 117 4828 4572 WerFault.exe 117 3288 4712 WerFault.exe 163 4032 4572 WerFault.exe 117 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2304 it031072.exe 2304 it031072.exe 640 jr239129.exe 640 jr239129.exe 4908 kp786389.exe 4908 kp786389.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2304 it031072.exe Token: SeDebugPrivilege 640 jr239129.exe Token: SeDebugPrivilege 4908 kp786389.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 lr347387.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4556 4680 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe 83 PID 4680 wrote to memory of 4556 4680 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe 83 PID 4680 wrote to memory of 4556 4680 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe 83 PID 4556 wrote to memory of 408 4556 ziTU1018.exe 84 PID 4556 wrote to memory of 408 4556 ziTU1018.exe 84 PID 4556 wrote to memory of 408 4556 ziTU1018.exe 84 PID 408 wrote to memory of 2304 408 zied2578.exe 85 PID 408 wrote to memory of 2304 408 zied2578.exe 85 PID 408 wrote to memory of 640 408 zied2578.exe 90 PID 408 wrote to memory of 640 408 zied2578.exe 90 PID 408 wrote to memory of 640 408 zied2578.exe 90 PID 4556 wrote to memory of 4908 4556 ziTU1018.exe 96 PID 4556 wrote to memory of 4908 4556 ziTU1018.exe 96 PID 4556 wrote to memory of 4908 4556 ziTU1018.exe 96 PID 4680 wrote to memory of 2212 4680 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe 97 PID 4680 wrote to memory of 2212 4680 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe 97 PID 4680 wrote to memory of 2212 4680 0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe 97 PID 2212 wrote to memory of 4572 2212 lr347387.exe 117 PID 2212 wrote to memory of 4572 2212 lr347387.exe 117 PID 2212 wrote to memory of 4572 2212 lr347387.exe 117 PID 4572 wrote to memory of 3472 4572 oneetx.exe 134 PID 4572 wrote to memory of 3472 4572 oneetx.exe 134 PID 4572 wrote to memory of 3472 4572 oneetx.exe 134 PID 4572 wrote to memory of 4432 4572 oneetx.exe 140 PID 4572 wrote to memory of 4432 4572 oneetx.exe 140 PID 4572 wrote to memory of 4432 4572 oneetx.exe 140 PID 4432 wrote to memory of 4296 4432 cmd.exe 144 PID 4432 wrote to memory of 4296 4432 cmd.exe 144 PID 4432 wrote to memory of 4296 4432 cmd.exe 144 PID 4432 wrote to memory of 624 4432 cmd.exe 145 PID 4432 wrote to memory of 624 4432 cmd.exe 145 PID 4432 wrote to memory of 624 4432 cmd.exe 145 PID 4432 wrote to memory of 3620 4432 cmd.exe 146 PID 4432 wrote to memory of 3620 4432 cmd.exe 146 PID 4432 wrote to memory of 3620 4432 cmd.exe 146 PID 4432 wrote to memory of 5056 4432 cmd.exe 147 PID 4432 wrote to memory of 5056 4432 cmd.exe 147 PID 4432 wrote to memory of 5056 4432 cmd.exe 147 PID 4432 wrote to memory of 3888 4432 cmd.exe 148 PID 4432 wrote to memory of 3888 4432 cmd.exe 148 PID 4432 wrote to memory of 3888 4432 cmd.exe 148 PID 4432 wrote to memory of 3424 4432 cmd.exe 149 PID 4432 wrote to memory of 3424 4432 cmd.exe 149 PID 4432 wrote to memory of 3424 4432 cmd.exe 149 PID 4572 wrote to memory of 1192 4572 oneetx.exe 160 PID 4572 wrote to memory of 1192 4572 oneetx.exe 160 PID 4572 wrote to memory of 1192 4572 oneetx.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe"C:\Users\Admin\AppData\Local\Temp\0c13dd66b47e6c353c33e6d4866ae26d542e2062d9dbc2237077adc2a328ddb3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTU1018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTU1018.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zied2578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zied2578.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it031072.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it031072.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr239129.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr239129.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 20805⤵
- Program crash
PID:4152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp786389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp786389.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr347387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr347387.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 6963⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 7803⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 8563⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 9523⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 8603⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 8603⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 12163⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 12083⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 13163⤵
- Program crash
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 6924⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 7924⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 8924⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 10604⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 10604⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 10604⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 10844⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 9924⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 9924⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 6924⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 12924⤵
- Program crash
PID:3468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 7804⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 7564⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 11324⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 16164⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 15604⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 16284⤵
- Program crash
PID:4032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 7883⤵
- Program crash
PID:2336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 640 -ip 6401⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2212 -ip 22121⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2212 -ip 22121⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2212 -ip 22121⤵PID:880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2212 -ip 22121⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2212 -ip 22121⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2212 -ip 22121⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2212 -ip 22121⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2212 -ip 22121⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2212 -ip 22121⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2212 -ip 22121⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4572 -ip 45721⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4572 -ip 45721⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4572 -ip 45721⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4572 -ip 45721⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4572 -ip 45721⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4572 -ip 45721⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4572 -ip 45721⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4572 -ip 45721⤵PID:332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4572 -ip 45721⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4572 -ip 45721⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4572 -ip 45721⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4572 -ip 45721⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4572 -ip 45721⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4572 -ip 45721⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4572 -ip 45721⤵PID:920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4572 -ip 45721⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 3162⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4712 -ip 47121⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4572 -ip 45721⤵PID:1596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD511d91b21a31a341fe91d0e6d6a544023
SHA10aa27608f1c8c616cb5ed74c615406c4224cd3b3
SHA256df8c417df3a9c8628f3ff196a0f67f3a2aec9b352673d25e310c54e7ea565749
SHA512337c33dbdf828eeb8ec9d45d41f7d826e173c5f0c7cbf68fc6f62367c84145a683d0b5bcf14ff0b78ae632a6c4ec28dd91f27a7a9d23edfa0e6c03095ec96702
-
Filesize
370KB
MD511d91b21a31a341fe91d0e6d6a544023
SHA10aa27608f1c8c616cb5ed74c615406c4224cd3b3
SHA256df8c417df3a9c8628f3ff196a0f67f3a2aec9b352673d25e310c54e7ea565749
SHA512337c33dbdf828eeb8ec9d45d41f7d826e173c5f0c7cbf68fc6f62367c84145a683d0b5bcf14ff0b78ae632a6c4ec28dd91f27a7a9d23edfa0e6c03095ec96702
-
Filesize
616KB
MD55753c18d45c2c04ef587ffcd4949ec18
SHA199c5e344bdd2c0936d68ccdfe5de26cd23070bfd
SHA256e2f970a0c024772cbfe77e619041ae2eb512136b0f1aba89bf7b28611ac20b4b
SHA51276c0ad82d037a8996fa5ccfbf05133ef9324645953eebdaf1525e44a324c78892ad597644bc2630b323778f1ba832dfda2d19d87482854e9b666305809798640
-
Filesize
616KB
MD55753c18d45c2c04ef587ffcd4949ec18
SHA199c5e344bdd2c0936d68ccdfe5de26cd23070bfd
SHA256e2f970a0c024772cbfe77e619041ae2eb512136b0f1aba89bf7b28611ac20b4b
SHA51276c0ad82d037a8996fa5ccfbf05133ef9324645953eebdaf1525e44a324c78892ad597644bc2630b323778f1ba832dfda2d19d87482854e9b666305809798640
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
462KB
MD5cbf1b54938da1ea989de87bf51e545be
SHA16013fd84396b07e9c915e93b72c656ff6ce5368e
SHA25693d43047bfbd52f67b4456ac514d405deb83b07a19d21b5f4216d19fd1166eab
SHA51274f9a79a9176cec59ee280e29388cb408719c58208bac6446ab6c7be9574ef3e88afff2609861af95592e5312c8bc2c40f8c148b6ea0372038fbd42d1bad6f2d
-
Filesize
462KB
MD5cbf1b54938da1ea989de87bf51e545be
SHA16013fd84396b07e9c915e93b72c656ff6ce5368e
SHA25693d43047bfbd52f67b4456ac514d405deb83b07a19d21b5f4216d19fd1166eab
SHA51274f9a79a9176cec59ee280e29388cb408719c58208bac6446ab6c7be9574ef3e88afff2609861af95592e5312c8bc2c40f8c148b6ea0372038fbd42d1bad6f2d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
474KB
MD5dbe496b6d97de6d49192ecc7fb7a88d1
SHA1b9bf617a70a360621d9b9092123497f7f755eab6
SHA256188db037fb2fc35117a88a97c1e659f1cf6624544995a534277b7072a464b5d8
SHA512ae2d240472e75e1075ade6fa9a6c29638f0f26288cb8dd0e8dc4ff94fda51f7734e701f12c5a6820ae17a736292d6add132ac886d932f63b6967e4adedb5f862
-
Filesize
474KB
MD5dbe496b6d97de6d49192ecc7fb7a88d1
SHA1b9bf617a70a360621d9b9092123497f7f755eab6
SHA256188db037fb2fc35117a88a97c1e659f1cf6624544995a534277b7072a464b5d8
SHA512ae2d240472e75e1075ade6fa9a6c29638f0f26288cb8dd0e8dc4ff94fda51f7734e701f12c5a6820ae17a736292d6add132ac886d932f63b6967e4adedb5f862
-
Filesize
370KB
MD511d91b21a31a341fe91d0e6d6a544023
SHA10aa27608f1c8c616cb5ed74c615406c4224cd3b3
SHA256df8c417df3a9c8628f3ff196a0f67f3a2aec9b352673d25e310c54e7ea565749
SHA512337c33dbdf828eeb8ec9d45d41f7d826e173c5f0c7cbf68fc6f62367c84145a683d0b5bcf14ff0b78ae632a6c4ec28dd91f27a7a9d23edfa0e6c03095ec96702
-
Filesize
370KB
MD511d91b21a31a341fe91d0e6d6a544023
SHA10aa27608f1c8c616cb5ed74c615406c4224cd3b3
SHA256df8c417df3a9c8628f3ff196a0f67f3a2aec9b352673d25e310c54e7ea565749
SHA512337c33dbdf828eeb8ec9d45d41f7d826e173c5f0c7cbf68fc6f62367c84145a683d0b5bcf14ff0b78ae632a6c4ec28dd91f27a7a9d23edfa0e6c03095ec96702
-
Filesize
370KB
MD511d91b21a31a341fe91d0e6d6a544023
SHA10aa27608f1c8c616cb5ed74c615406c4224cd3b3
SHA256df8c417df3a9c8628f3ff196a0f67f3a2aec9b352673d25e310c54e7ea565749
SHA512337c33dbdf828eeb8ec9d45d41f7d826e173c5f0c7cbf68fc6f62367c84145a683d0b5bcf14ff0b78ae632a6c4ec28dd91f27a7a9d23edfa0e6c03095ec96702
-
Filesize
370KB
MD511d91b21a31a341fe91d0e6d6a544023
SHA10aa27608f1c8c616cb5ed74c615406c4224cd3b3
SHA256df8c417df3a9c8628f3ff196a0f67f3a2aec9b352673d25e310c54e7ea565749
SHA512337c33dbdf828eeb8ec9d45d41f7d826e173c5f0c7cbf68fc6f62367c84145a683d0b5bcf14ff0b78ae632a6c4ec28dd91f27a7a9d23edfa0e6c03095ec96702
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5