Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 00:00
Static task
static1
General
-
Target
b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe
-
Size
830KB
-
MD5
30b05fcbcd23896e795468eda9b40ad6
-
SHA1
c87b299142fe60f8300637ffe1f19ecdf0b27dd0
-
SHA256
b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819
-
SHA512
b6b4fc160f6623ec44d8c41befd9e023119814528bee11d1e4f112d27ebe5a875f972075de0f0c47e403b36be22cfc21a0214c57a7088ce0067ea8044233a061
-
SSDEEP
12288:9y90vvAl22LIX80GmTistfg/hOr2iYpOR4BxB3oUeslyt6KcvdZ4Y6:9yYvC22IMg4/oYpy4/B95ygKcvdZ4Y6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it663573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it663573.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it663573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it663573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it663573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it663573.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lr271853.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2732 ziuT2427.exe 1692 ziYx0279.exe 1000 it663573.exe 736 jr731406.exe 2656 kp529387.exe 5044 lr271853.exe 3800 oneetx.exe 2564 oneetx.exe 3820 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it663573.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziuT2427.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuT2427.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYx0279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziYx0279.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 384 736 WerFault.exe 87 4152 5044 WerFault.exe 91 2788 5044 WerFault.exe 91 3784 5044 WerFault.exe 91 4076 5044 WerFault.exe 91 4052 5044 WerFault.exe 91 1272 5044 WerFault.exe 91 228 5044 WerFault.exe 91 4356 5044 WerFault.exe 91 4700 5044 WerFault.exe 91 3740 5044 WerFault.exe 91 2476 3800 WerFault.exe 111 4320 3800 WerFault.exe 111 2836 3800 WerFault.exe 111 4640 3800 WerFault.exe 111 752 3800 WerFault.exe 111 3916 3800 WerFault.exe 111 2128 3800 WerFault.exe 111 3932 3800 WerFault.exe 111 3660 3800 WerFault.exe 111 1856 3800 WerFault.exe 111 3476 3800 WerFault.exe 111 4276 3800 WerFault.exe 111 4220 3800 WerFault.exe 111 2896 3800 WerFault.exe 111 2492 2564 WerFault.exe 152 856 3800 WerFault.exe 111 1528 3800 WerFault.exe 111 4816 3800 WerFault.exe 111 860 3820 WerFault.exe 162 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1000 it663573.exe 1000 it663573.exe 736 jr731406.exe 736 jr731406.exe 2656 kp529387.exe 2656 kp529387.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1000 it663573.exe Token: SeDebugPrivilege 736 jr731406.exe Token: SeDebugPrivilege 2656 kp529387.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5044 lr271853.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2732 2072 b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe 82 PID 2072 wrote to memory of 2732 2072 b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe 82 PID 2072 wrote to memory of 2732 2072 b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe 82 PID 2732 wrote to memory of 1692 2732 ziuT2427.exe 83 PID 2732 wrote to memory of 1692 2732 ziuT2427.exe 83 PID 2732 wrote to memory of 1692 2732 ziuT2427.exe 83 PID 1692 wrote to memory of 1000 1692 ziYx0279.exe 84 PID 1692 wrote to memory of 1000 1692 ziYx0279.exe 84 PID 1692 wrote to memory of 736 1692 ziYx0279.exe 87 PID 1692 wrote to memory of 736 1692 ziYx0279.exe 87 PID 1692 wrote to memory of 736 1692 ziYx0279.exe 87 PID 2732 wrote to memory of 2656 2732 ziuT2427.exe 90 PID 2732 wrote to memory of 2656 2732 ziuT2427.exe 90 PID 2732 wrote to memory of 2656 2732 ziuT2427.exe 90 PID 2072 wrote to memory of 5044 2072 b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe 91 PID 2072 wrote to memory of 5044 2072 b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe 91 PID 2072 wrote to memory of 5044 2072 b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe 91 PID 5044 wrote to memory of 3800 5044 lr271853.exe 111 PID 5044 wrote to memory of 3800 5044 lr271853.exe 111 PID 5044 wrote to memory of 3800 5044 lr271853.exe 111 PID 3800 wrote to memory of 2196 3800 oneetx.exe 128 PID 3800 wrote to memory of 2196 3800 oneetx.exe 128 PID 3800 wrote to memory of 2196 3800 oneetx.exe 128 PID 3800 wrote to memory of 5024 3800 oneetx.exe 134 PID 3800 wrote to memory of 5024 3800 oneetx.exe 134 PID 3800 wrote to memory of 5024 3800 oneetx.exe 134 PID 5024 wrote to memory of 4664 5024 cmd.exe 138 PID 5024 wrote to memory of 4664 5024 cmd.exe 138 PID 5024 wrote to memory of 4664 5024 cmd.exe 138 PID 5024 wrote to memory of 1356 5024 cmd.exe 139 PID 5024 wrote to memory of 1356 5024 cmd.exe 139 PID 5024 wrote to memory of 1356 5024 cmd.exe 139 PID 5024 wrote to memory of 824 5024 cmd.exe 140 PID 5024 wrote to memory of 824 5024 cmd.exe 140 PID 5024 wrote to memory of 824 5024 cmd.exe 140 PID 5024 wrote to memory of 3040 5024 cmd.exe 141 PID 5024 wrote to memory of 3040 5024 cmd.exe 141 PID 5024 wrote to memory of 3040 5024 cmd.exe 141 PID 5024 wrote to memory of 3600 5024 cmd.exe 142 PID 5024 wrote to memory of 3600 5024 cmd.exe 142 PID 5024 wrote to memory of 3600 5024 cmd.exe 142 PID 5024 wrote to memory of 4948 5024 cmd.exe 143 PID 5024 wrote to memory of 4948 5024 cmd.exe 143 PID 5024 wrote to memory of 4948 5024 cmd.exe 143 PID 3800 wrote to memory of 2656 3800 oneetx.exe 157 PID 3800 wrote to memory of 2656 3800 oneetx.exe 157 PID 3800 wrote to memory of 2656 3800 oneetx.exe 157
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe"C:\Users\Admin\AppData\Local\Temp\b1f80b04b8d9fb69f7ba06d4759a669aa5617f2a6cc4175641c40cdf981df819.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuT2427.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuT2427.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziYx0279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziYx0279.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it663573.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it663573.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr731406.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr731406.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 13125⤵
- Program crash
PID:384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp529387.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp529387.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr271853.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr271853.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 6963⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 7683⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 8003⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9603⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9523⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 8123⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 12163⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 12323⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 13123⤵
- Program crash
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 6924⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 8364⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 9124⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 10524⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 10724⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 10724⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 11124⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 7804⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 6924⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:3600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 13124⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 7284⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 9964⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 12844⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 11284⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 16524⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 11284⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 16684⤵
- Program crash
PID:4816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 13123⤵
- Program crash
PID:3740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 736 -ip 7361⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5044 -ip 50441⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5044 -ip 50441⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5044 -ip 50441⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5044 -ip 50441⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5044 -ip 50441⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5044 -ip 50441⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 5044 -ip 50441⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 5044 -ip 50441⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 5044 -ip 50441⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5044 -ip 50441⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3800 -ip 38001⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3800 -ip 38001⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3800 -ip 38001⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3800 -ip 38001⤵PID:920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3800 -ip 38001⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3800 -ip 38001⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3800 -ip 38001⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3800 -ip 38001⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3800 -ip 38001⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3800 -ip 38001⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3800 -ip 38001⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3800 -ip 38001⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3800 -ip 38001⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3800 -ip 38001⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 3202⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2564 -ip 25641⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3800 -ip 38001⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3800 -ip 38001⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3800 -ip 38001⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 3162⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3820 -ip 38201⤵PID:3276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
568KB
MD52a0d62e7604fd38dff774fe2bb0fa817
SHA112d703045410800ad844e69dfe3670bec4b7a754
SHA256fefe054ddaf1007d1c06f010810f637aa3a804fb0f913e170fb09eee5ec14c94
SHA512331cbc013caea4c353815a42fa63e0cf3c1c1cabea676acd8122f171a39416dabd1ab2451331cd74abc9e0c706d6e87feab0008ecf02ed7a412849243908419a
-
Filesize
568KB
MD52a0d62e7604fd38dff774fe2bb0fa817
SHA112d703045410800ad844e69dfe3670bec4b7a754
SHA256fefe054ddaf1007d1c06f010810f637aa3a804fb0f913e170fb09eee5ec14c94
SHA512331cbc013caea4c353815a42fa63e0cf3c1c1cabea676acd8122f171a39416dabd1ab2451331cd74abc9e0c706d6e87feab0008ecf02ed7a412849243908419a
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
414KB
MD5973b1fc1927d480d9e6ef0354e53b8cc
SHA1b2a76044d69255cce10d800a43b886339a5c81da
SHA2562257b73e3369e0c042fe3bfb4ab6f4f7916f7ce380ee612b33e0a87949c71318
SHA512a738e2a5f1334973c30648fe9f1f7ad91dc5874384b3a0b65cb5b118eff2f1afc0e5e3f85f45e564393e052080e6934691c23552022a2fa8541c153d48eb87a7
-
Filesize
414KB
MD5973b1fc1927d480d9e6ef0354e53b8cc
SHA1b2a76044d69255cce10d800a43b886339a5c81da
SHA2562257b73e3369e0c042fe3bfb4ab6f4f7916f7ce380ee612b33e0a87949c71318
SHA512a738e2a5f1334973c30648fe9f1f7ad91dc5874384b3a0b65cb5b118eff2f1afc0e5e3f85f45e564393e052080e6934691c23552022a2fa8541c153d48eb87a7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
381KB
MD59aeb5d7e2edde344155691062df0937a
SHA1f6e798a6c4756793e5c51071065be58257c1310c
SHA256ac6938ba79c2ac9cc5995757ac06f50f8019497e9a8e90edff18af764003b2a6
SHA5127582f153bc4e1a762190a134adc6087d6067162e3ca587d7c2e6e48da45dee9597d131087abc44964c73f981f2b025ccec469c5d74a3c2e8d45e22248eecbd2c
-
Filesize
381KB
MD59aeb5d7e2edde344155691062df0937a
SHA1f6e798a6c4756793e5c51071065be58257c1310c
SHA256ac6938ba79c2ac9cc5995757ac06f50f8019497e9a8e90edff18af764003b2a6
SHA5127582f153bc4e1a762190a134adc6087d6067162e3ca587d7c2e6e48da45dee9597d131087abc44964c73f981f2b025ccec469c5d74a3c2e8d45e22248eecbd2c
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
277KB
MD50cc95b63c57cbf4a473a8d71c366339d
SHA1cad48c95aa13ca5570161145f0c9718cf9187e26
SHA2565e24d58e5d84135841a740f95fb70667479e72f7751bfe66f7948040f5abc4a5
SHA5123b1a83d82f2b7820854d839cfff0c934725483656e2cead4aa2f5b0306de6b1d0f5f5fe2f9f6fe0ba27051108e3188814ba717bf4408a6a29507efc4b6791aa1
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5