Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 04:53
Static task
static1
General
-
Target
3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe
-
Size
965KB
-
MD5
bae598df46c0253ad00217ba39fd7530
-
SHA1
b045f9211833d44894f3a4a55eb4c1861b825766
-
SHA256
3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3
-
SHA512
4cf7a85871f72d8ccda265e9699c8013ea57b7a0982628452abf9c290501b9ff30f2903ae9ca1f4015953c535bb564ee85f87177b82cdcf033e1f45c657215dc
-
SSDEEP
24576:+yokLrBFfr6+muRW5Sj85xrfEcUHX20cWu3l:Nokhtwj5xJU32yu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr020729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr020729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr020729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr020729.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr020729.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr020729.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si271034.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 3788 un028461.exe 4644 un108372.exe 4000 pr020729.exe 1880 qu558629.exe 2748 rk303467.exe 640 si271034.exe 1620 oneetx.exe 4028 oneetx.exe 3124 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3380 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr020729.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr020729.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un028461.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un028461.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un108372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un108372.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 2548 4000 WerFault.exe 87 2388 1880 WerFault.exe 93 3984 640 WerFault.exe 98 3996 640 WerFault.exe 98 4212 640 WerFault.exe 98 4860 640 WerFault.exe 98 3188 640 WerFault.exe 98 800 640 WerFault.exe 98 1968 640 WerFault.exe 98 3480 640 WerFault.exe 98 1092 640 WerFault.exe 98 2160 640 WerFault.exe 98 1496 1620 WerFault.exe 118 5112 1620 WerFault.exe 118 1280 1620 WerFault.exe 118 5108 1620 WerFault.exe 118 2040 1620 WerFault.exe 118 2336 1620 WerFault.exe 118 4132 1620 WerFault.exe 118 1704 1620 WerFault.exe 118 4748 1620 WerFault.exe 118 5080 1620 WerFault.exe 118 4984 1620 WerFault.exe 118 4024 1620 WerFault.exe 118 2576 1620 WerFault.exe 118 4476 1620 WerFault.exe 118 5024 4028 WerFault.exe 162 1896 1620 WerFault.exe 118 1576 1620 WerFault.exe 118 2312 1620 WerFault.exe 118 3168 3124 WerFault.exe 172 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4000 pr020729.exe 4000 pr020729.exe 1880 qu558629.exe 1880 qu558629.exe 2748 rk303467.exe 2748 rk303467.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4000 pr020729.exe Token: SeDebugPrivilege 1880 qu558629.exe Token: SeDebugPrivilege 2748 rk303467.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 640 si271034.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3812 wrote to memory of 3788 3812 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe 85 PID 3812 wrote to memory of 3788 3812 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe 85 PID 3812 wrote to memory of 3788 3812 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe 85 PID 3788 wrote to memory of 4644 3788 un028461.exe 86 PID 3788 wrote to memory of 4644 3788 un028461.exe 86 PID 3788 wrote to memory of 4644 3788 un028461.exe 86 PID 4644 wrote to memory of 4000 4644 un108372.exe 87 PID 4644 wrote to memory of 4000 4644 un108372.exe 87 PID 4644 wrote to memory of 4000 4644 un108372.exe 87 PID 4644 wrote to memory of 1880 4644 un108372.exe 93 PID 4644 wrote to memory of 1880 4644 un108372.exe 93 PID 4644 wrote to memory of 1880 4644 un108372.exe 93 PID 3788 wrote to memory of 2748 3788 un028461.exe 96 PID 3788 wrote to memory of 2748 3788 un028461.exe 96 PID 3788 wrote to memory of 2748 3788 un028461.exe 96 PID 3812 wrote to memory of 640 3812 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe 98 PID 3812 wrote to memory of 640 3812 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe 98 PID 3812 wrote to memory of 640 3812 3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe 98 PID 640 wrote to memory of 1620 640 si271034.exe 118 PID 640 wrote to memory of 1620 640 si271034.exe 118 PID 640 wrote to memory of 1620 640 si271034.exe 118 PID 1620 wrote to memory of 4848 1620 oneetx.exe 138 PID 1620 wrote to memory of 4848 1620 oneetx.exe 138 PID 1620 wrote to memory of 4848 1620 oneetx.exe 138 PID 1620 wrote to memory of 4656 1620 oneetx.exe 144 PID 1620 wrote to memory of 4656 1620 oneetx.exe 144 PID 1620 wrote to memory of 4656 1620 oneetx.exe 144 PID 4656 wrote to memory of 2900 4656 cmd.exe 149 PID 4656 wrote to memory of 2900 4656 cmd.exe 149 PID 4656 wrote to memory of 2900 4656 cmd.exe 149 PID 4656 wrote to memory of 4892 4656 cmd.exe 148 PID 4656 wrote to memory of 4892 4656 cmd.exe 148 PID 4656 wrote to memory of 4892 4656 cmd.exe 148 PID 4656 wrote to memory of 2084 4656 cmd.exe 150 PID 4656 wrote to memory of 2084 4656 cmd.exe 150 PID 4656 wrote to memory of 2084 4656 cmd.exe 150 PID 4656 wrote to memory of 2624 4656 cmd.exe 152 PID 4656 wrote to memory of 2624 4656 cmd.exe 152 PID 4656 wrote to memory of 2624 4656 cmd.exe 152 PID 4656 wrote to memory of 1252 4656 cmd.exe 151 PID 4656 wrote to memory of 1252 4656 cmd.exe 151 PID 4656 wrote to memory of 1252 4656 cmd.exe 151 PID 4656 wrote to memory of 516 4656 cmd.exe 153 PID 4656 wrote to memory of 516 4656 cmd.exe 153 PID 4656 wrote to memory of 516 4656 cmd.exe 153 PID 1620 wrote to memory of 3380 1620 oneetx.exe 167 PID 1620 wrote to memory of 3380 1620 oneetx.exe 167 PID 1620 wrote to memory of 3380 1620 oneetx.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe"C:\Users\Admin\AppData\Local\Temp\3d244ae9d728e0bdc90a21f0db1e1b134d740f8156e52221a2bfea73211219f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028461.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un108372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un108372.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr020729.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr020729.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10805⤵
- Program crash
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu558629.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu558629.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 13205⤵
- Program crash
PID:2388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk303467.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk303467.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271034.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6963⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7923⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7923⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 9683⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 9643⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 9643⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 12163⤵
- Program crash
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 12523⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 13123⤵
- Program crash
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 6964⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 8444⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 8524⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 10524⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 10924⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 10924⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 11124⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 9924⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 12884⤵
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 7724⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 13124⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 7764⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 12964⤵
- Program crash
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 11444⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 16124⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 15524⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 16284⤵
- Program crash
PID:2312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 13123⤵
- Program crash
PID:2160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4000 -ip 40001⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1880 -ip 18801⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 640 -ip 6401⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 640 -ip 6401⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 640 -ip 6401⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 640 -ip 6401⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 640 -ip 6401⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 640 -ip 6401⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 640 -ip 6401⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 640 -ip 6401⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 640 -ip 6401⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 640 -ip 6401⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1620 -ip 16201⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1620 -ip 16201⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1620 -ip 16201⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1620 -ip 16201⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1620 -ip 16201⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1620 -ip 16201⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1620 -ip 16201⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1620 -ip 16201⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1620 -ip 16201⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1620 -ip 16201⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1620 -ip 16201⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1620 -ip 16201⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1620 -ip 16201⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1620 -ip 16201⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 3162⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4028 -ip 40281⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1620 -ip 16201⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1620 -ip 16201⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1620 -ip 16201⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 2162⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3124 -ip 31241⤵PID:1860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
706KB
MD51ba1807fc6bcf2987a3a0956b0482ac5
SHA13671d9569442f6f04bfdbd24bb9069b94e2636d7
SHA25673a6818328e82f8e6e3b80aae74e9ecb8b1b4dce61ff4758ef00ba9840ab6e6c
SHA512845f10ee0686caaa5581286c2babc76a15ab1aba743da29da810df788b46bd617eb8ef98286964f4bebec027d4d2011dba018176b8f0960e3f62363f5ab5533f
-
Filesize
706KB
MD51ba1807fc6bcf2987a3a0956b0482ac5
SHA13671d9569442f6f04bfdbd24bb9069b94e2636d7
SHA25673a6818328e82f8e6e3b80aae74e9ecb8b1b4dce61ff4758ef00ba9840ab6e6c
SHA512845f10ee0686caaa5581286c2babc76a15ab1aba743da29da810df788b46bd617eb8ef98286964f4bebec027d4d2011dba018176b8f0960e3f62363f5ab5533f
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD53dc97c37c502f54d1e9e94f042ebdc9d
SHA171a166132487ed8c8d0e5c06e4da3a531424fb01
SHA256befb58b92c031083c8912ee50a6a8cc346c40a49f12236e3c386cb3c413ffc5b
SHA512e7237a483668a3bddfe40e337acc6603cdc438183137a34cde36813d6e86805242c5130df3d7493fd6a2ab1dc4354963c1d4cdced325a80d51d21a49664f8da6
-
Filesize
552KB
MD53dc97c37c502f54d1e9e94f042ebdc9d
SHA171a166132487ed8c8d0e5c06e4da3a531424fb01
SHA256befb58b92c031083c8912ee50a6a8cc346c40a49f12236e3c386cb3c413ffc5b
SHA512e7237a483668a3bddfe40e337acc6603cdc438183137a34cde36813d6e86805242c5130df3d7493fd6a2ab1dc4354963c1d4cdced325a80d51d21a49664f8da6
-
Filesize
299KB
MD5f7cdf7db063ce0eef8af7f43d582bdf3
SHA15aa3000af1cdc40a868ecf476ce6c7dfd01a5c3e
SHA256e9d77aad0af839152c46065c1794f0bb40b778e3bfedeca36640bd231081d9bf
SHA5123e59e8b245c342e4f8212413da4f1e6c5e09e869b428497cd78f95f5f5314d11d3a781f7245f17ec7eaaac44ee9777a962c85c46c9c31f553d03314fbea59ef2
-
Filesize
299KB
MD5f7cdf7db063ce0eef8af7f43d582bdf3
SHA15aa3000af1cdc40a868ecf476ce6c7dfd01a5c3e
SHA256e9d77aad0af839152c46065c1794f0bb40b778e3bfedeca36640bd231081d9bf
SHA5123e59e8b245c342e4f8212413da4f1e6c5e09e869b428497cd78f95f5f5314d11d3a781f7245f17ec7eaaac44ee9777a962c85c46c9c31f553d03314fbea59ef2
-
Filesize
382KB
MD569bf3672d246beb8e0389c1fd5223443
SHA1130ab806f7357be699eb62e1a05dcde14de1c5a1
SHA256d2a67502cb439dfc0de9306453496e401f23a6faf5cef65d51e7f525f080a3eb
SHA512ec3f03bb9faf711305838bf3902efec022240127bf88446861b811e187d5aa7fb48852a1ee1367df80df0d7a938212d3a782645a86cce7763c9eee7c46e08515
-
Filesize
382KB
MD569bf3672d246beb8e0389c1fd5223443
SHA1130ab806f7357be699eb62e1a05dcde14de1c5a1
SHA256d2a67502cb439dfc0de9306453496e401f23a6faf5cef65d51e7f525f080a3eb
SHA512ec3f03bb9faf711305838bf3902efec022240127bf88446861b811e187d5aa7fb48852a1ee1367df80df0d7a938212d3a782645a86cce7763c9eee7c46e08515
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
278KB
MD5a6c9844cdd03046e8db1fc57072c0c3c
SHA1cba4c4ef057c5b098c2ec0def1a681a928a287ef
SHA256be9902b4f8f4f66653261ca97082b85f89c27fee3d30eccf6515fefd1cd3963f
SHA512b1d8da2052d25db94216364c74288a581feedd25465762e13a20284a9959e422be46d315ebf72fc25385bb4a66359eaf52137705f4bd50b5bf6ef69bd589d74c
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5