Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 04:22
Static task
static1
General
-
Target
f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe
-
Size
923KB
-
MD5
2d7d439989e732d218a0383f5b781869
-
SHA1
37e7bcb61b6e7ce1aba067c4909a41fd950f7ba4
-
SHA256
f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1
-
SHA512
41801b77a15da9f64fce4590933bb85164fd5540c4367f0c010b4c25bb58b463a2d88033d143e026e1a196ca66dc809097b7be035e6bf5af55defba849072f68
-
SSDEEP
24576:kyueLBt4fyQmRZG3oe+7/2Zq1Z5iShl9Mj:zjhQQZkoPwqNiw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it145908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it145908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it145908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it145908.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it145908.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it145908.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr210848.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2148 ziJd3869.exe 1868 ziya8134.exe 4564 it145908.exe 4520 jr373663.exe 2336 kp088832.exe 2916 lr210848.exe 3604 oneetx.exe 692 oneetx.exe 3200 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it145908.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJd3869.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJd3869.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziya8134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziya8134.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4292 4520 WerFault.exe 91 1268 2916 WerFault.exe 96 3180 2916 WerFault.exe 96 3420 2916 WerFault.exe 96 4656 2916 WerFault.exe 96 2748 2916 WerFault.exe 96 4272 2916 WerFault.exe 96 3456 2916 WerFault.exe 96 5028 2916 WerFault.exe 96 684 2916 WerFault.exe 96 1188 2916 WerFault.exe 96 3844 3604 WerFault.exe 116 1876 3604 WerFault.exe 116 2744 3604 WerFault.exe 116 2036 3604 WerFault.exe 116 1748 3604 WerFault.exe 116 2540 3604 WerFault.exe 116 3376 3604 WerFault.exe 116 4584 3604 WerFault.exe 116 1556 3604 WerFault.exe 116 512 3604 WerFault.exe 116 112 3604 WerFault.exe 116 4520 3604 WerFault.exe 116 1468 3604 WerFault.exe 116 3332 3604 WerFault.exe 116 4480 692 WerFault.exe 157 4196 3604 WerFault.exe 116 1724 3604 WerFault.exe 116 1120 3604 WerFault.exe 116 4952 3200 WerFault.exe 167 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4564 it145908.exe 4564 it145908.exe 4520 jr373663.exe 4520 jr373663.exe 2336 kp088832.exe 2336 kp088832.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4564 it145908.exe Token: SeDebugPrivilege 4520 jr373663.exe Token: SeDebugPrivilege 2336 kp088832.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 lr210848.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2148 2704 f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe 82 PID 2704 wrote to memory of 2148 2704 f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe 82 PID 2704 wrote to memory of 2148 2704 f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe 82 PID 2148 wrote to memory of 1868 2148 ziJd3869.exe 83 PID 2148 wrote to memory of 1868 2148 ziJd3869.exe 83 PID 2148 wrote to memory of 1868 2148 ziJd3869.exe 83 PID 1868 wrote to memory of 4564 1868 ziya8134.exe 84 PID 1868 wrote to memory of 4564 1868 ziya8134.exe 84 PID 1868 wrote to memory of 4520 1868 ziya8134.exe 91 PID 1868 wrote to memory of 4520 1868 ziya8134.exe 91 PID 1868 wrote to memory of 4520 1868 ziya8134.exe 91 PID 2148 wrote to memory of 2336 2148 ziJd3869.exe 95 PID 2148 wrote to memory of 2336 2148 ziJd3869.exe 95 PID 2148 wrote to memory of 2336 2148 ziJd3869.exe 95 PID 2704 wrote to memory of 2916 2704 f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe 96 PID 2704 wrote to memory of 2916 2704 f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe 96 PID 2704 wrote to memory of 2916 2704 f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe 96 PID 2916 wrote to memory of 3604 2916 lr210848.exe 116 PID 2916 wrote to memory of 3604 2916 lr210848.exe 116 PID 2916 wrote to memory of 3604 2916 lr210848.exe 116 PID 3604 wrote to memory of 1360 3604 oneetx.exe 133 PID 3604 wrote to memory of 1360 3604 oneetx.exe 133 PID 3604 wrote to memory of 1360 3604 oneetx.exe 133 PID 3604 wrote to memory of 3384 3604 oneetx.exe 139 PID 3604 wrote to memory of 3384 3604 oneetx.exe 139 PID 3604 wrote to memory of 3384 3604 oneetx.exe 139 PID 3384 wrote to memory of 564 3384 cmd.exe 143 PID 3384 wrote to memory of 564 3384 cmd.exe 143 PID 3384 wrote to memory of 564 3384 cmd.exe 143 PID 3384 wrote to memory of 4256 3384 cmd.exe 144 PID 3384 wrote to memory of 4256 3384 cmd.exe 144 PID 3384 wrote to memory of 4256 3384 cmd.exe 144 PID 3384 wrote to memory of 2712 3384 cmd.exe 145 PID 3384 wrote to memory of 2712 3384 cmd.exe 145 PID 3384 wrote to memory of 2712 3384 cmd.exe 145 PID 3384 wrote to memory of 1364 3384 cmd.exe 146 PID 3384 wrote to memory of 1364 3384 cmd.exe 146 PID 3384 wrote to memory of 1364 3384 cmd.exe 146 PID 3384 wrote to memory of 4756 3384 cmd.exe 147 PID 3384 wrote to memory of 4756 3384 cmd.exe 147 PID 3384 wrote to memory of 4756 3384 cmd.exe 147 PID 3384 wrote to memory of 2668 3384 cmd.exe 148 PID 3384 wrote to memory of 2668 3384 cmd.exe 148 PID 3384 wrote to memory of 2668 3384 cmd.exe 148 PID 3604 wrote to memory of 1636 3604 oneetx.exe 162 PID 3604 wrote to memory of 1636 3604 oneetx.exe 162 PID 3604 wrote to memory of 1636 3604 oneetx.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe"C:\Users\Admin\AppData\Local\Temp\f77d29c1dd6de0bf5b7f5a228fb2519883f09baec18eabb763102da9205d40e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJd3869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJd3869.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziya8134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziya8134.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it145908.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it145908.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr373663.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr373663.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 17045⤵
- Program crash
PID:4292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp088832.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp088832.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr210848.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr210848.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 6963⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 7523⤵
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 8563⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 8603⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 9723⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 8603⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 12163⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 12483⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 13123⤵
- Program crash
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 6924⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 8444⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 8924⤵
- Program crash
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 10604⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 10884⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 10804⤵
- Program crash
PID:2540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 11084⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 9924⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 8924⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 12244⤵
- Program crash
PID:512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 12844⤵
- Program crash
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 7164⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 7604⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 11244⤵
- Program crash
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 16164⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 11244⤵
- Program crash
PID:1724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 16284⤵
- Program crash
PID:1120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 13403⤵
- Program crash
PID:1188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4520 -ip 45201⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2916 -ip 29161⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2916 -ip 29161⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2916 -ip 29161⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2916 -ip 29161⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2916 -ip 29161⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2916 -ip 29161⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2916 -ip 29161⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2916 -ip 29161⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2916 -ip 29161⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2916 -ip 29161⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3604 -ip 36041⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3604 -ip 36041⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3604 -ip 36041⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3604 -ip 36041⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3604 -ip 36041⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3604 -ip 36041⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3604 -ip 36041⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3604 -ip 36041⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3604 -ip 36041⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3604 -ip 36041⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3604 -ip 36041⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3604 -ip 36041⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3604 -ip 36041⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3604 -ip 36041⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 3122⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 692 -ip 6921⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3604 -ip 36041⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3604 -ip 36041⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3604 -ip 36041⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 3122⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3200 -ip 32001⤵PID:4120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
617KB
MD5c716af9d2b137ef2d9ded3c830b60d71
SHA14dab27cca3244477e4ef1f51566a3a3ebcf5044d
SHA2564d982105c806b982716251987c5631c92fbac3da35dcac8333ceeb37c91c7abd
SHA512960d856b9fe298acac73f983d62995acc9028a330cca2e42d46742fed28171b80db3ad4cf01ad1db88c3fb37b6a99079cd579cb35114fe712dc4840703cbd46c
-
Filesize
617KB
MD5c716af9d2b137ef2d9ded3c830b60d71
SHA14dab27cca3244477e4ef1f51566a3a3ebcf5044d
SHA2564d982105c806b982716251987c5631c92fbac3da35dcac8333ceeb37c91c7abd
SHA512960d856b9fe298acac73f983d62995acc9028a330cca2e42d46742fed28171b80db3ad4cf01ad1db88c3fb37b6a99079cd579cb35114fe712dc4840703cbd46c
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
462KB
MD5c3bd10deb5754fd5fa4025239f72c526
SHA15f8b8693533d12ebb4e88e97de2e843f0bac759a
SHA2569ca419857733cf9705ad8f704894c67c8179dd551d4b2812638df240a24b34ff
SHA5120375aba8d1a917b2cfac7f13460a86cc589ddd2eb5286bc6dd2c87a901b631faed37ad12db7eee30869a2cf9d5c08afd8cde2bb05303454c477d81bc04b8fe22
-
Filesize
462KB
MD5c3bd10deb5754fd5fa4025239f72c526
SHA15f8b8693533d12ebb4e88e97de2e843f0bac759a
SHA2569ca419857733cf9705ad8f704894c67c8179dd551d4b2812638df240a24b34ff
SHA5120375aba8d1a917b2cfac7f13460a86cc589ddd2eb5286bc6dd2c87a901b631faed37ad12db7eee30869a2cf9d5c08afd8cde2bb05303454c477d81bc04b8fe22
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
474KB
MD53c6dc46b7639985c53b087ba14a4baff
SHA1e01ac33175f752c2de9e0bebf55d996fbb24bc66
SHA25680d56fea58d87209f630e64cc37ab742617812c8286dd6236eb387c4f1e7aea7
SHA512808fc425d239c8d760f79232654240d003407ed8045904aa254bbb638587c2d91433294698844a14ba51cb557f90d9bbdee9f1d4c2d513298bfd0db3e817d3a0
-
Filesize
474KB
MD53c6dc46b7639985c53b087ba14a4baff
SHA1e01ac33175f752c2de9e0bebf55d996fbb24bc66
SHA25680d56fea58d87209f630e64cc37ab742617812c8286dd6236eb387c4f1e7aea7
SHA512808fc425d239c8d760f79232654240d003407ed8045904aa254bbb638587c2d91433294698844a14ba51cb557f90d9bbdee9f1d4c2d513298bfd0db3e817d3a0
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
370KB
MD5e367d0b2c728bb0a662b4243f5b10094
SHA1652eb25609b6c040b6d46baf1c73abc25460cddc
SHA2562af4d35aebb1898725cf8c2fb4b0d659a0f2a7f5282e5237d6045c881f29b747
SHA512de3ea9800dfbc391fc308bfdcf9e00da662943cef589582183824e1ff86c83da9fda235521bcbbadf2785820b312e9e230c43edfe6cb8e406d1bdb6cf671443b
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5