Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 00:21
Static task
static1
General
-
Target
c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe
-
Size
827KB
-
MD5
6884aeb644f0dc3421f09fe4f4552c7e
-
SHA1
c48e41372caafb960cfa087a998029ba16424135
-
SHA256
c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46
-
SHA512
0f60df55aa959106e49e1005b8355f3634da73c29f927f489b03cc0ee33edb78eb8d5fbabd6cf66c8a01b9e4a98e899e935ae08cde27d86eeff0fecf2e04cbbc
-
SSDEEP
12288:1y90LWg0ZUuFKDEKM/DN4r0iwKOGmLd21LPhaOYbEKBaLqxL8HP:1yIWg0ZZKM/DowK9dl0KLqhS
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it924969.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it924969.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it924969.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it924969.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it924969.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it924969.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr331344.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 5060 ziJD9318.exe 5088 zimr7735.exe 4960 it924969.exe 1364 jr134888.exe 5100 kp027815.exe 4104 lr331344.exe 4768 oneetx.exe 3564 oneetx.exe 2972 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4124 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it924969.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJD9318.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimr7735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zimr7735.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJD9318.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4924 1364 WerFault.exe 85 4088 4104 WerFault.exe 90 3428 4104 WerFault.exe 90 3836 4104 WerFault.exe 90 3796 4104 WerFault.exe 90 4328 4104 WerFault.exe 90 3920 4104 WerFault.exe 90 1420 4104 WerFault.exe 90 1072 4104 WerFault.exe 90 4476 4104 WerFault.exe 90 2852 4104 WerFault.exe 90 4600 4768 WerFault.exe 110 1812 4768 WerFault.exe 110 3580 4768 WerFault.exe 110 112 4768 WerFault.exe 110 1944 4768 WerFault.exe 110 3628 4768 WerFault.exe 110 4932 4768 WerFault.exe 110 3188 4768 WerFault.exe 110 2296 4768 WerFault.exe 110 1368 4768 WerFault.exe 110 2252 4768 WerFault.exe 110 2956 4768 WerFault.exe 110 3296 4768 WerFault.exe 110 4372 4768 WerFault.exe 110 4812 3564 WerFault.exe 151 4100 4768 WerFault.exe 110 840 4768 WerFault.exe 110 3720 4768 WerFault.exe 110 4292 2972 WerFault.exe 161 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4960 it924969.exe 4960 it924969.exe 1364 jr134888.exe 1364 jr134888.exe 5100 kp027815.exe 5100 kp027815.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4960 it924969.exe Token: SeDebugPrivilege 1364 jr134888.exe Token: SeDebugPrivilege 5100 kp027815.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4104 lr331344.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3924 wrote to memory of 5060 3924 c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe 82 PID 3924 wrote to memory of 5060 3924 c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe 82 PID 3924 wrote to memory of 5060 3924 c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe 82 PID 5060 wrote to memory of 5088 5060 ziJD9318.exe 83 PID 5060 wrote to memory of 5088 5060 ziJD9318.exe 83 PID 5060 wrote to memory of 5088 5060 ziJD9318.exe 83 PID 5088 wrote to memory of 4960 5088 zimr7735.exe 84 PID 5088 wrote to memory of 4960 5088 zimr7735.exe 84 PID 5088 wrote to memory of 1364 5088 zimr7735.exe 85 PID 5088 wrote to memory of 1364 5088 zimr7735.exe 85 PID 5088 wrote to memory of 1364 5088 zimr7735.exe 85 PID 5060 wrote to memory of 5100 5060 ziJD9318.exe 89 PID 5060 wrote to memory of 5100 5060 ziJD9318.exe 89 PID 5060 wrote to memory of 5100 5060 ziJD9318.exe 89 PID 3924 wrote to memory of 4104 3924 c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe 90 PID 3924 wrote to memory of 4104 3924 c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe 90 PID 3924 wrote to memory of 4104 3924 c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe 90 PID 4104 wrote to memory of 4768 4104 lr331344.exe 110 PID 4104 wrote to memory of 4768 4104 lr331344.exe 110 PID 4104 wrote to memory of 4768 4104 lr331344.exe 110 PID 4768 wrote to memory of 2072 4768 oneetx.exe 127 PID 4768 wrote to memory of 2072 4768 oneetx.exe 127 PID 4768 wrote to memory of 2072 4768 oneetx.exe 127 PID 4768 wrote to memory of 2804 4768 oneetx.exe 133 PID 4768 wrote to memory of 2804 4768 oneetx.exe 133 PID 4768 wrote to memory of 2804 4768 oneetx.exe 133 PID 2804 wrote to memory of 1560 2804 cmd.exe 137 PID 2804 wrote to memory of 1560 2804 cmd.exe 137 PID 2804 wrote to memory of 1560 2804 cmd.exe 137 PID 2804 wrote to memory of 3704 2804 cmd.exe 138 PID 2804 wrote to memory of 3704 2804 cmd.exe 138 PID 2804 wrote to memory of 3704 2804 cmd.exe 138 PID 2804 wrote to memory of 392 2804 cmd.exe 139 PID 2804 wrote to memory of 392 2804 cmd.exe 139 PID 2804 wrote to memory of 392 2804 cmd.exe 139 PID 2804 wrote to memory of 4828 2804 cmd.exe 140 PID 2804 wrote to memory of 4828 2804 cmd.exe 140 PID 2804 wrote to memory of 4828 2804 cmd.exe 140 PID 2804 wrote to memory of 2076 2804 cmd.exe 141 PID 2804 wrote to memory of 2076 2804 cmd.exe 141 PID 2804 wrote to memory of 2076 2804 cmd.exe 141 PID 2804 wrote to memory of 940 2804 cmd.exe 142 PID 2804 wrote to memory of 940 2804 cmd.exe 142 PID 2804 wrote to memory of 940 2804 cmd.exe 142 PID 4768 wrote to memory of 4124 4768 oneetx.exe 156 PID 4768 wrote to memory of 4124 4768 oneetx.exe 156 PID 4768 wrote to memory of 4124 4768 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe"C:\Users\Admin\AppData\Local\Temp\c620adeea472e1cc7dc797385cd865c677fd30af1421f9ca3a7014db96169f46.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJD9318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJD9318.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimr7735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimr7735.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it924969.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it924969.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr134888.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr134888.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 16925⤵
- Program crash
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp027815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp027815.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr331344.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr331344.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 7003⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 7563⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 8083⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 9523⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 8123⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 9963⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 12043⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 12283⤵
- Program crash
PID:1072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 13163⤵
- Program crash
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 6924⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8764⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 8884⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10524⤵
- Program crash
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10724⤵
- Program crash
PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10724⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 11124⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 10004⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7204⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 12564⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7684⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 12484⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7444⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 11004⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 15764⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 11004⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 15844⤵
- Program crash
PID:3720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 13603⤵
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1364 -ip 13641⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4104 -ip 41041⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4104 -ip 41041⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4104 -ip 41041⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4104 -ip 41041⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4104 -ip 41041⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4104 -ip 41041⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4104 -ip 41041⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4104 -ip 41041⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4104 -ip 41041⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4104 -ip 41041⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4768 -ip 47681⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4768 -ip 47681⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4768 -ip 47681⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4768 -ip 47681⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4768 -ip 47681⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4768 -ip 47681⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4768 -ip 47681⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4768 -ip 47681⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4768 -ip 47681⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4768 -ip 47681⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4768 -ip 47681⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4768 -ip 47681⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4768 -ip 47681⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4768 -ip 47681⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 3122⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3564 -ip 35641⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4768 -ip 47681⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4768 -ip 47681⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4768 -ip 47681⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 3162⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2972 -ip 29721⤵PID:3332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
568KB
MD56b695c3f4f879473cf7005ef5a749d47
SHA1b26a2d872f82a3323af2f74f35f4d9a519cdc8ee
SHA25617a9bf7d81ccd8929d6adb4e6f04e6e2cb7bfdb842c981bfb1f179607a74296a
SHA512d4c928ea25a81b545e353d0c7a0204706f65653d1747b0e1c684f875b3a7ddf5e1453f3c50c172573b4240ea9eb11cc4bcbf074b008de876e3d67625e4c61353
-
Filesize
568KB
MD56b695c3f4f879473cf7005ef5a749d47
SHA1b26a2d872f82a3323af2f74f35f4d9a519cdc8ee
SHA25617a9bf7d81ccd8929d6adb4e6f04e6e2cb7bfdb842c981bfb1f179607a74296a
SHA512d4c928ea25a81b545e353d0c7a0204706f65653d1747b0e1c684f875b3a7ddf5e1453f3c50c172573b4240ea9eb11cc4bcbf074b008de876e3d67625e4c61353
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
414KB
MD5f0324322764974351882662691c9656f
SHA102f1c5e38364824456ac80ea94863bd53116cdb0
SHA256dcdc18cf7c39af561a225fbee765abda976b08b960e89480c08ca382539159a4
SHA51224ad38bc558451bd393b27a6291f97c53edd5eb846e89090901336588c102486dc2b1bbbd1d2e6803bf4e9ce3a96d6da88bbc4c7cf7934bc40e4c26d8453f6a7
-
Filesize
414KB
MD5f0324322764974351882662691c9656f
SHA102f1c5e38364824456ac80ea94863bd53116cdb0
SHA256dcdc18cf7c39af561a225fbee765abda976b08b960e89480c08ca382539159a4
SHA51224ad38bc558451bd393b27a6291f97c53edd5eb846e89090901336588c102486dc2b1bbbd1d2e6803bf4e9ce3a96d6da88bbc4c7cf7934bc40e4c26d8453f6a7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
381KB
MD5c355e44fc9b6e419038a6d977f905701
SHA136c9cd1af0503b27fbde8449634e39c1a3f5ed6f
SHA256acf4b2cd46c83393e160fc27c5742e23f9a938722a782a317a9eb5823a299b36
SHA512c6aca4d466e98ce884e141bab3c9255197bd6a6a7dc4ec1d1ce59ff1c11e56afbb06f30426f2a60723aa01cfb661c6a44d1df55e5a62bcb199fa16cfed8f6844
-
Filesize
381KB
MD5c355e44fc9b6e419038a6d977f905701
SHA136c9cd1af0503b27fbde8449634e39c1a3f5ed6f
SHA256acf4b2cd46c83393e160fc27c5742e23f9a938722a782a317a9eb5823a299b36
SHA512c6aca4d466e98ce884e141bab3c9255197bd6a6a7dc4ec1d1ce59ff1c11e56afbb06f30426f2a60723aa01cfb661c6a44d1df55e5a62bcb199fa16cfed8f6844
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
277KB
MD562c3b10900352158b5f701c27f520c83
SHA1257655c051e1a23f79bae4485defc7a31efcb7cb
SHA256c52a6cd3d78d2cc5246c0fa1d745828c8b102f436d5721c56783560075cbfffd
SHA512aedbf3a68088f3a26bc7bd7c2ebdb36db7775df8f522e098c6ce5a2ce04f81131dc4dca58868c27ca97bacde7dd5e29e53dd6f4a2473626cd4f7495ebfe016c3
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5