Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 06:17
Static task
static1
General
-
Target
d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe
-
Size
966KB
-
MD5
8889f62871b2a6b0156e56ffdc292eb4
-
SHA1
f8641d064ee6bbc138bf4797f6ca3ed72bdc1a01
-
SHA256
d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3
-
SHA512
d9ceb04b9d2b2f7cb8803e28df80d283fba841a0f38d7182431f979779c1cdfdf915efa2db5b4367bd4aa39c159ac5eac47e9083854edf68a168ae29073a9885
-
SSDEEP
24576:syFN7RmJT4ubaajFrDzcVT36lBfRJFypGGJ:bFhRmR4ubacwVmlH7YD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr060380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr060380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr060380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr060380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr060380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr060380.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si871996.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4828 un721120.exe 4516 un793401.exe 2588 pr060380.exe 2620 qu624072.exe 2492 rk120511.exe 2456 si871996.exe 872 oneetx.exe 4000 oneetx.exe 3552 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3412 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr060380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr060380.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un721120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un721120.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un793401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un793401.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 460 2588 WerFault.exe 88 3220 2620 WerFault.exe 94 1288 2456 WerFault.exe 99 1084 2456 WerFault.exe 99 4976 2456 WerFault.exe 99 3868 2456 WerFault.exe 99 3984 2456 WerFault.exe 99 1504 2456 WerFault.exe 99 4880 2456 WerFault.exe 99 1428 2456 WerFault.exe 99 4900 2456 WerFault.exe 99 4604 2456 WerFault.exe 99 4608 872 WerFault.exe 122 536 872 WerFault.exe 122 3732 872 WerFault.exe 122 3344 872 WerFault.exe 122 4256 872 WerFault.exe 122 1252 872 WerFault.exe 122 4044 872 WerFault.exe 122 2516 872 WerFault.exe 122 1716 872 WerFault.exe 122 2100 872 WerFault.exe 122 1292 872 WerFault.exe 122 1084 872 WerFault.exe 122 1588 872 WerFault.exe 122 3104 4000 WerFault.exe 161 824 872 WerFault.exe 122 4540 872 WerFault.exe 122 1788 872 WerFault.exe 122 744 3552 WerFault.exe 171 3260 872 WerFault.exe 122 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2588 pr060380.exe 2588 pr060380.exe 2620 qu624072.exe 2620 qu624072.exe 2492 rk120511.exe 2492 rk120511.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2588 pr060380.exe Token: SeDebugPrivilege 2620 qu624072.exe Token: SeDebugPrivilege 2492 rk120511.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 si871996.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4640 wrote to memory of 4828 4640 d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe 86 PID 4640 wrote to memory of 4828 4640 d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe 86 PID 4640 wrote to memory of 4828 4640 d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe 86 PID 4828 wrote to memory of 4516 4828 un721120.exe 87 PID 4828 wrote to memory of 4516 4828 un721120.exe 87 PID 4828 wrote to memory of 4516 4828 un721120.exe 87 PID 4516 wrote to memory of 2588 4516 un793401.exe 88 PID 4516 wrote to memory of 2588 4516 un793401.exe 88 PID 4516 wrote to memory of 2588 4516 un793401.exe 88 PID 4516 wrote to memory of 2620 4516 un793401.exe 94 PID 4516 wrote to memory of 2620 4516 un793401.exe 94 PID 4516 wrote to memory of 2620 4516 un793401.exe 94 PID 4828 wrote to memory of 2492 4828 un721120.exe 97 PID 4828 wrote to memory of 2492 4828 un721120.exe 97 PID 4828 wrote to memory of 2492 4828 un721120.exe 97 PID 4640 wrote to memory of 2456 4640 d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe 99 PID 4640 wrote to memory of 2456 4640 d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe 99 PID 4640 wrote to memory of 2456 4640 d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe 99 PID 2456 wrote to memory of 872 2456 si871996.exe 122 PID 2456 wrote to memory of 872 2456 si871996.exe 122 PID 2456 wrote to memory of 872 2456 si871996.exe 122 PID 872 wrote to memory of 4076 872 oneetx.exe 139 PID 872 wrote to memory of 4076 872 oneetx.exe 139 PID 872 wrote to memory of 4076 872 oneetx.exe 139 PID 872 wrote to memory of 404 872 oneetx.exe 145 PID 872 wrote to memory of 404 872 oneetx.exe 145 PID 872 wrote to memory of 404 872 oneetx.exe 145 PID 404 wrote to memory of 4532 404 cmd.exe 148 PID 404 wrote to memory of 4532 404 cmd.exe 148 PID 404 wrote to memory of 4532 404 cmd.exe 148 PID 404 wrote to memory of 4104 404 cmd.exe 150 PID 404 wrote to memory of 4104 404 cmd.exe 150 PID 404 wrote to memory of 4104 404 cmd.exe 150 PID 404 wrote to memory of 2360 404 cmd.exe 151 PID 404 wrote to memory of 2360 404 cmd.exe 151 PID 404 wrote to memory of 2360 404 cmd.exe 151 PID 404 wrote to memory of 4492 404 cmd.exe 152 PID 404 wrote to memory of 4492 404 cmd.exe 152 PID 404 wrote to memory of 4492 404 cmd.exe 152 PID 404 wrote to memory of 2644 404 cmd.exe 153 PID 404 wrote to memory of 2644 404 cmd.exe 153 PID 404 wrote to memory of 2644 404 cmd.exe 153 PID 404 wrote to memory of 2528 404 cmd.exe 154 PID 404 wrote to memory of 2528 404 cmd.exe 154 PID 404 wrote to memory of 2528 404 cmd.exe 154 PID 872 wrote to memory of 3412 872 oneetx.exe 168 PID 872 wrote to memory of 3412 872 oneetx.exe 168 PID 872 wrote to memory of 3412 872 oneetx.exe 168
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe"C:\Users\Admin\AppData\Local\Temp\d0a8dd24b511b9106e2444799274cb04c5d0ea31bf36c12b3fc92dd50e6172c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un721120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un721120.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un793401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un793401.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr060380.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr060380.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10845⤵
- Program crash
PID:460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624072.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624072.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 13285⤵
- Program crash
PID:3220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk120511.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk120511.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871996.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871996.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 6963⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 7723⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 8563⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 9763⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 9603⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 9643⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 12123⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 12243⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 13163⤵
- Program crash
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 6924⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 8804⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 9124⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 10524⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 10924⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 10684⤵
- Program crash
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 11324⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 9924⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 12604⤵
- Program crash
PID:1716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4492
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 9924⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 8804⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 7804⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 9244⤵
- Program crash
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 11524⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 16084⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 11524⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 16204⤵
- Program crash
PID:3260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 7483⤵
- Program crash
PID:4604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2588 -ip 25881⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2620 -ip 26201⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2456 -ip 24561⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2456 -ip 24561⤵PID:716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2456 -ip 24561⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2456 -ip 24561⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2456 -ip 24561⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2456 -ip 24561⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2456 -ip 24561⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2456 -ip 24561⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2456 -ip 24561⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2456 -ip 24561⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 872 -ip 8721⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 872 -ip 8721⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 872 -ip 8721⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 872 -ip 8721⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 872 -ip 8721⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 872 -ip 8721⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 872 -ip 8721⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 872 -ip 8721⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 872 -ip 8721⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 872 -ip 8721⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 872 -ip 8721⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 872 -ip 8721⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 872 -ip 8721⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 3202⤵
- Program crash
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4000 -ip 40001⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 872 -ip 8721⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 872 -ip 8721⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 872 -ip 8721⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 3162⤵
- Program crash
PID:744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3552 -ip 35521⤵PID:708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 872 -ip 8721⤵PID:3000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
706KB
MD5a921cb88b6ed5adda0bec3fa0f91e170
SHA19a42eb9c8d9e92c6e9e58865733453b678418893
SHA2561b12a7c1a9fb13f9b0aaba1624aeecf884e5c5a22590d0189d1c966966e1501f
SHA5129c330ff5780aa257a07b0b2a68c4eb030df107c537b366b8051a42d330c4343ea6f6e402d077b62b423cdf013108c07ed6167cccf96287865ac2952b4c35dd20
-
Filesize
706KB
MD5a921cb88b6ed5adda0bec3fa0f91e170
SHA19a42eb9c8d9e92c6e9e58865733453b678418893
SHA2561b12a7c1a9fb13f9b0aaba1624aeecf884e5c5a22590d0189d1c966966e1501f
SHA5129c330ff5780aa257a07b0b2a68c4eb030df107c537b366b8051a42d330c4343ea6f6e402d077b62b423cdf013108c07ed6167cccf96287865ac2952b4c35dd20
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD5605781de66e9c03aee2c0d5e93369186
SHA168bb4abbefec0ce38783f89573d95f08edbd4fc0
SHA25610435a289bd062eaae38951175c9b8d6927f65a8e5389fda8f90dbd0265bd53e
SHA512026b4f17b6769c161807c7ab4fbb2e44aa355e039ecba0f807c37fc2ba4d1a2d5122b55769e20f6755d21bbc505f60b3453d67d6d58a2023e94f400cd740b25a
-
Filesize
552KB
MD5605781de66e9c03aee2c0d5e93369186
SHA168bb4abbefec0ce38783f89573d95f08edbd4fc0
SHA25610435a289bd062eaae38951175c9b8d6927f65a8e5389fda8f90dbd0265bd53e
SHA512026b4f17b6769c161807c7ab4fbb2e44aa355e039ecba0f807c37fc2ba4d1a2d5122b55769e20f6755d21bbc505f60b3453d67d6d58a2023e94f400cd740b25a
-
Filesize
299KB
MD52b45c2941c719fa0342aa9c93a83355d
SHA167592adcc9cb22fd13f125217c02f3ba709d3fcc
SHA256754a6b3e90aa29a03e78ad4d40dc519e79a8116170f699c04ac8d8e59d70dbc6
SHA51273444b82edb4be1a8280bda807e0982b160b598b1ae87162a0fafc7736f87b886ff2bd757cadfeefd3d17de65eba02eadfe698f8da5e0868d947ee323faab4e7
-
Filesize
299KB
MD52b45c2941c719fa0342aa9c93a83355d
SHA167592adcc9cb22fd13f125217c02f3ba709d3fcc
SHA256754a6b3e90aa29a03e78ad4d40dc519e79a8116170f699c04ac8d8e59d70dbc6
SHA51273444b82edb4be1a8280bda807e0982b160b598b1ae87162a0fafc7736f87b886ff2bd757cadfeefd3d17de65eba02eadfe698f8da5e0868d947ee323faab4e7
-
Filesize
382KB
MD5f63f11a2f552179f678d1efecca157d4
SHA1a593f57462519d29a95a9c44b81dde35a19e930d
SHA256b3e74c1b9a5a8ed24f401cfe77a2b70bff0727ebd7a401ab59a35a2a075010ce
SHA51296997587d8fa738fd74c34c1b0eb28f642455a1ad7f61641a1e45c659c714c459b60a062f84fab54801cc9eca80446c9ef854d621544b58095e33122b2c16453
-
Filesize
382KB
MD5f63f11a2f552179f678d1efecca157d4
SHA1a593f57462519d29a95a9c44b81dde35a19e930d
SHA256b3e74c1b9a5a8ed24f401cfe77a2b70bff0727ebd7a401ab59a35a2a075010ce
SHA51296997587d8fa738fd74c34c1b0eb28f642455a1ad7f61641a1e45c659c714c459b60a062f84fab54801cc9eca80446c9ef854d621544b58095e33122b2c16453
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
278KB
MD5f5341a066f1d3fda832cde03694ec57f
SHA1ac57bf79029e6802e4dc2c741c669990ed595079
SHA256adc3f82bca3944b1e8dea6333dcb36ec51f609f376cb27135e3b6941e6342605
SHA512a29918461d696198da7aec7c5dd2c6582560cfdecf895015634ac5411dadf3199851d6b2ea7902521dbae2c36de384907a781f6637f01c1ede98c7abcf0d8f74
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5