Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 00:15
Static task
static1
General
-
Target
dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe
-
Size
965KB
-
MD5
b18665d3803a68230dab83202f6fd361
-
SHA1
ed58322f91b04704be3a93fb2487bbb60033f69d
-
SHA256
dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b
-
SHA512
a619bbcb3d10a1f4da542605f2d61e14640d2ec0a3442d5c7860af578cb93e0a5f31b3044f322d70863391aec6a6fc562a91c900ed440ff76a9782e9e150ac48
-
SSDEEP
24576:4yh/I3Z/rDSO+WCF23jVJrtUt1BpTNT4C6dZ:/h/Y/SF0rtUBp6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr941409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr941409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr941409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr941409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr941409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr941409.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation si313900.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 3680 un401276.exe 808 un776191.exe 376 pr941409.exe 4424 qu272431.exe 1952 rk085819.exe 2636 si313900.exe 1844 oneetx.exe 3480 oneetx.exe 3144 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr941409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr941409.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un401276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un401276.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un776191.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un776191.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 4344 376 WerFault.exe 84 912 4424 WerFault.exe 90 1528 2636 WerFault.exe 95 2036 2636 WerFault.exe 95 1504 2636 WerFault.exe 95 1708 2636 WerFault.exe 95 5100 2636 WerFault.exe 95 1856 2636 WerFault.exe 95 2788 2636 WerFault.exe 95 4508 2636 WerFault.exe 95 3440 2636 WerFault.exe 95 2196 2636 WerFault.exe 95 4804 1844 WerFault.exe 115 3752 1844 WerFault.exe 115 2660 1844 WerFault.exe 115 4792 1844 WerFault.exe 115 1224 1844 WerFault.exe 115 2700 1844 WerFault.exe 115 2600 1844 WerFault.exe 115 3892 1844 WerFault.exe 115 3128 1844 WerFault.exe 115 1300 1844 WerFault.exe 115 808 1844 WerFault.exe 115 3816 1844 WerFault.exe 115 2096 1844 WerFault.exe 115 4016 3480 WerFault.exe 157 2912 1844 WerFault.exe 115 5056 1844 WerFault.exe 115 1736 1844 WerFault.exe 115 4436 1844 WerFault.exe 115 3616 3144 WerFault.exe 167 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 376 pr941409.exe 376 pr941409.exe 4424 qu272431.exe 4424 qu272431.exe 1952 rk085819.exe 1952 rk085819.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 376 pr941409.exe Token: SeDebugPrivilege 4424 qu272431.exe Token: SeDebugPrivilege 1952 rk085819.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 si313900.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3680 2960 dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe 82 PID 2960 wrote to memory of 3680 2960 dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe 82 PID 2960 wrote to memory of 3680 2960 dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe 82 PID 3680 wrote to memory of 808 3680 un401276.exe 83 PID 3680 wrote to memory of 808 3680 un401276.exe 83 PID 3680 wrote to memory of 808 3680 un401276.exe 83 PID 808 wrote to memory of 376 808 un776191.exe 84 PID 808 wrote to memory of 376 808 un776191.exe 84 PID 808 wrote to memory of 376 808 un776191.exe 84 PID 808 wrote to memory of 4424 808 un776191.exe 90 PID 808 wrote to memory of 4424 808 un776191.exe 90 PID 808 wrote to memory of 4424 808 un776191.exe 90 PID 3680 wrote to memory of 1952 3680 un401276.exe 93 PID 3680 wrote to memory of 1952 3680 un401276.exe 93 PID 3680 wrote to memory of 1952 3680 un401276.exe 93 PID 2960 wrote to memory of 2636 2960 dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe 95 PID 2960 wrote to memory of 2636 2960 dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe 95 PID 2960 wrote to memory of 2636 2960 dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe 95 PID 2636 wrote to memory of 1844 2636 si313900.exe 115 PID 2636 wrote to memory of 1844 2636 si313900.exe 115 PID 2636 wrote to memory of 1844 2636 si313900.exe 115 PID 1844 wrote to memory of 1692 1844 oneetx.exe 135 PID 1844 wrote to memory of 1692 1844 oneetx.exe 135 PID 1844 wrote to memory of 1692 1844 oneetx.exe 135 PID 1844 wrote to memory of 3272 1844 oneetx.exe 141 PID 1844 wrote to memory of 3272 1844 oneetx.exe 141 PID 1844 wrote to memory of 3272 1844 oneetx.exe 141 PID 3272 wrote to memory of 2180 3272 cmd.exe 145 PID 3272 wrote to memory of 2180 3272 cmd.exe 145 PID 3272 wrote to memory of 2180 3272 cmd.exe 145 PID 3272 wrote to memory of 1076 3272 cmd.exe 146 PID 3272 wrote to memory of 1076 3272 cmd.exe 146 PID 3272 wrote to memory of 1076 3272 cmd.exe 146 PID 3272 wrote to memory of 1088 3272 cmd.exe 147 PID 3272 wrote to memory of 1088 3272 cmd.exe 147 PID 3272 wrote to memory of 1088 3272 cmd.exe 147 PID 3272 wrote to memory of 1376 3272 cmd.exe 148 PID 3272 wrote to memory of 1376 3272 cmd.exe 148 PID 3272 wrote to memory of 1376 3272 cmd.exe 148 PID 3272 wrote to memory of 1372 3272 cmd.exe 149 PID 3272 wrote to memory of 1372 3272 cmd.exe 149 PID 3272 wrote to memory of 1372 3272 cmd.exe 149 PID 3272 wrote to memory of 3180 3272 cmd.exe 150 PID 3272 wrote to memory of 3180 3272 cmd.exe 150 PID 3272 wrote to memory of 3180 3272 cmd.exe 150 PID 1844 wrote to memory of 2872 1844 oneetx.exe 164 PID 1844 wrote to memory of 2872 1844 oneetx.exe 164 PID 1844 wrote to memory of 2872 1844 oneetx.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe"C:\Users\Admin\AppData\Local\Temp\dfbcb6b95dcd881940e1309604c0374a6077e3d19c020b97bee17e33279aec3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401276.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un776191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un776191.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr941409.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr941409.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 11005⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu272431.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu272431.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 13085⤵
- Program crash
PID:912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk085819.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk085819.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si313900.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si313900.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 6963⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 7803⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 7963⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 9763⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 10123⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 9603⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 12163⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 12043⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 13163⤵
- Program crash
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 6924⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 8884⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 9164⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 10524⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 10684⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 10884⤵
- Program crash
PID:2700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 10644⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 7764⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 7844⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:3180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 12844⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 7764⤵
- Program crash
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 7484⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 7764⤵
- Program crash
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 11084⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 15444⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 11084⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 16444⤵
- Program crash
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 15483⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 376 -ip 3761⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4424 -ip 44241⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2636 -ip 26361⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2636 -ip 26361⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2636 -ip 26361⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2636 -ip 26361⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2636 -ip 26361⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2636 -ip 26361⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2636 -ip 26361⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2636 -ip 26361⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2636 -ip 26361⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2636 -ip 26361⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1844 -ip 18441⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1844 -ip 18441⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1844 -ip 18441⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1844 -ip 18441⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1844 -ip 18441⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1844 -ip 18441⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1844 -ip 18441⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1844 -ip 18441⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1844 -ip 18441⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1844 -ip 18441⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1844 -ip 18441⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1844 -ip 18441⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1844 -ip 18441⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 3122⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3480 -ip 34801⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1844 -ip 18441⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1844 -ip 18441⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1844 -ip 18441⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 3122⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 1844 -ip 18441⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3144 -ip 31441⤵PID:3216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
706KB
MD5937d2fe4e768649fb7b4656d01493ebd
SHA1060c60f2f137324a47614d15950485e62b863134
SHA25634db717d6300309e586ea920a3766a909cd6af1174079ff32a66c646d2c664e9
SHA51267571a9ec08cdfef1524287b555e0b7d339669e4ab4b41e1bcade2b95ba050af423ef5f525b4b4d7821990c90eaa412ca831bb379da0eb404405a530ae418a1b
-
Filesize
706KB
MD5937d2fe4e768649fb7b4656d01493ebd
SHA1060c60f2f137324a47614d15950485e62b863134
SHA25634db717d6300309e586ea920a3766a909cd6af1174079ff32a66c646d2c664e9
SHA51267571a9ec08cdfef1524287b555e0b7d339669e4ab4b41e1bcade2b95ba050af423ef5f525b4b4d7821990c90eaa412ca831bb379da0eb404405a530ae418a1b
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD533b89028c340cc9919c06d3ae2910ed1
SHA1807bebb9e5c1a55e4545ad139e3c4e8486588748
SHA256af4bc34f455daf6aed02b35b2d49a31cb062abfc115648b1021af57ecedd62c3
SHA512a196b8aa33c0bea23581774c396f18e31d23e709e7fb5c968dfc4a198fa7fbe32a7b9f6fe33ff4254ff74f60a33a237fca478d3563b2129b778d5ca26072287e
-
Filesize
552KB
MD533b89028c340cc9919c06d3ae2910ed1
SHA1807bebb9e5c1a55e4545ad139e3c4e8486588748
SHA256af4bc34f455daf6aed02b35b2d49a31cb062abfc115648b1021af57ecedd62c3
SHA512a196b8aa33c0bea23581774c396f18e31d23e709e7fb5c968dfc4a198fa7fbe32a7b9f6fe33ff4254ff74f60a33a237fca478d3563b2129b778d5ca26072287e
-
Filesize
299KB
MD5eab95263ebc1a144e50e846e306f3cf5
SHA1538a97cc9bf96a36884cf022619c235219acbf82
SHA256a3fdf70d301a054afc4c01a40ee7ba056682dbfab2ab8c145db0b14239450d9c
SHA512b719d7dd02bd2d48f2068a773b9ed7cc9a68301a8bf53337ca43faa2eb4904d3dc9780abae5cbee956834a4a955cdcb6a3cd7d0cc67f808311933bc046964a39
-
Filesize
299KB
MD5eab95263ebc1a144e50e846e306f3cf5
SHA1538a97cc9bf96a36884cf022619c235219acbf82
SHA256a3fdf70d301a054afc4c01a40ee7ba056682dbfab2ab8c145db0b14239450d9c
SHA512b719d7dd02bd2d48f2068a773b9ed7cc9a68301a8bf53337ca43faa2eb4904d3dc9780abae5cbee956834a4a955cdcb6a3cd7d0cc67f808311933bc046964a39
-
Filesize
381KB
MD555fb1bcbe875f542ffe490361f401fa4
SHA1ac31328cf88f02309e2a53b5b560e81ae974b86d
SHA256b5d8bcd983fcf6fbea2de10bbda833943ccb1bb0d087b0991350ff6001e363b2
SHA5129dde5c22985c4c02089e1c957e54d8ee79ae446b110c2ce87ad6c0d8d7c5115a1a593cff2e3bf5246471c97451328f022cac169ba400f52e2e29fe8d51aa6563
-
Filesize
381KB
MD555fb1bcbe875f542ffe490361f401fa4
SHA1ac31328cf88f02309e2a53b5b560e81ae974b86d
SHA256b5d8bcd983fcf6fbea2de10bbda833943ccb1bb0d087b0991350ff6001e363b2
SHA5129dde5c22985c4c02089e1c957e54d8ee79ae446b110c2ce87ad6c0d8d7c5115a1a593cff2e3bf5246471c97451328f022cac169ba400f52e2e29fe8d51aa6563
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
277KB
MD5a917a25d43863938168098c37233169f
SHA1010b14486d565a4fd7f9764ae46568e04dee7e2e
SHA25647e0a8f528a42247c10da998cfa245185aecbcc8a15b5de5ae636a11a307059b
SHA51267ff0d004287e6d5654a462a4bdffb529aa3ddd1a0238647b548d606ca7c37a00751dbb6a4b70256e24a220049e58caea4c5964102e278a30554551313dcd53e
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5