Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 07:17
Static task
static1
General
-
Target
0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe
-
Size
828KB
-
MD5
dbbca4915f3337b43bde10103030573c
-
SHA1
6ecef2061e6cef70a44fc1a4b0d272cc908b4242
-
SHA256
0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5
-
SHA512
6a2f98088483b8f7e9c5a5f060f4fb851b3b98d24c89ed9815049832b3ea798ea92199186fdba933a0fbbcc9996d5e882f3b9c4d06c3ee53c96fc4fc999bf99c
-
SSDEEP
24576:9yblim1bFenLfYt0iXjCOGdqh09+uI/rB:Y53Agt0vOGdwb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it044705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it044705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it044705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it044705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it044705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it044705.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr699981.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2268 zivv7918.exe 4416 ziCA2562.exe 3544 it044705.exe 1956 jr427728.exe 1264 kp543986.exe 1100 lr699981.exe 520 oneetx.exe 1956 oneetx.exe 1808 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it044705.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziCA2562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziCA2562.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivv7918.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivv7918.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 3208 1956 WerFault.exe 87 3456 1100 WerFault.exe 91 3380 1100 WerFault.exe 91 1368 1100 WerFault.exe 91 3440 1100 WerFault.exe 91 3604 1100 WerFault.exe 91 996 1100 WerFault.exe 91 3848 1100 WerFault.exe 91 456 1100 WerFault.exe 91 4008 1100 WerFault.exe 91 620 1100 WerFault.exe 91 396 520 WerFault.exe 111 2936 520 WerFault.exe 111 3956 520 WerFault.exe 111 3764 520 WerFault.exe 111 1928 520 WerFault.exe 111 3388 520 WerFault.exe 111 1964 520 WerFault.exe 111 5104 520 WerFault.exe 111 1912 520 WerFault.exe 111 4128 520 WerFault.exe 111 2120 520 WerFault.exe 111 4716 520 WerFault.exe 111 420 520 WerFault.exe 111 1332 520 WerFault.exe 111 4392 1956 WerFault.exe 152 2972 520 WerFault.exe 111 1368 520 WerFault.exe 111 3604 520 WerFault.exe 111 1452 1808 WerFault.exe 162 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3544 it044705.exe 3544 it044705.exe 1956 jr427728.exe 1956 jr427728.exe 1264 kp543986.exe 1264 kp543986.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3544 it044705.exe Token: SeDebugPrivilege 1956 jr427728.exe Token: SeDebugPrivilege 1264 kp543986.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1100 lr699981.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3304 wrote to memory of 2268 3304 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe 84 PID 3304 wrote to memory of 2268 3304 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe 84 PID 3304 wrote to memory of 2268 3304 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe 84 PID 2268 wrote to memory of 4416 2268 zivv7918.exe 85 PID 2268 wrote to memory of 4416 2268 zivv7918.exe 85 PID 2268 wrote to memory of 4416 2268 zivv7918.exe 85 PID 4416 wrote to memory of 3544 4416 ziCA2562.exe 86 PID 4416 wrote to memory of 3544 4416 ziCA2562.exe 86 PID 4416 wrote to memory of 1956 4416 ziCA2562.exe 87 PID 4416 wrote to memory of 1956 4416 ziCA2562.exe 87 PID 4416 wrote to memory of 1956 4416 ziCA2562.exe 87 PID 2268 wrote to memory of 1264 2268 zivv7918.exe 90 PID 2268 wrote to memory of 1264 2268 zivv7918.exe 90 PID 2268 wrote to memory of 1264 2268 zivv7918.exe 90 PID 3304 wrote to memory of 1100 3304 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe 91 PID 3304 wrote to memory of 1100 3304 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe 91 PID 3304 wrote to memory of 1100 3304 0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe 91 PID 1100 wrote to memory of 520 1100 lr699981.exe 111 PID 1100 wrote to memory of 520 1100 lr699981.exe 111 PID 1100 wrote to memory of 520 1100 lr699981.exe 111 PID 520 wrote to memory of 3732 520 oneetx.exe 128 PID 520 wrote to memory of 3732 520 oneetx.exe 128 PID 520 wrote to memory of 3732 520 oneetx.exe 128 PID 520 wrote to memory of 2488 520 oneetx.exe 134 PID 520 wrote to memory of 2488 520 oneetx.exe 134 PID 520 wrote to memory of 2488 520 oneetx.exe 134 PID 2488 wrote to memory of 4720 2488 cmd.exe 138 PID 2488 wrote to memory of 4720 2488 cmd.exe 138 PID 2488 wrote to memory of 4720 2488 cmd.exe 138 PID 2488 wrote to memory of 4336 2488 cmd.exe 139 PID 2488 wrote to memory of 4336 2488 cmd.exe 139 PID 2488 wrote to memory of 4336 2488 cmd.exe 139 PID 2488 wrote to memory of 4088 2488 cmd.exe 140 PID 2488 wrote to memory of 4088 2488 cmd.exe 140 PID 2488 wrote to memory of 4088 2488 cmd.exe 140 PID 2488 wrote to memory of 3316 2488 cmd.exe 141 PID 2488 wrote to memory of 3316 2488 cmd.exe 141 PID 2488 wrote to memory of 3316 2488 cmd.exe 141 PID 2488 wrote to memory of 4872 2488 cmd.exe 142 PID 2488 wrote to memory of 4872 2488 cmd.exe 142 PID 2488 wrote to memory of 4872 2488 cmd.exe 142 PID 2488 wrote to memory of 2796 2488 cmd.exe 143 PID 2488 wrote to memory of 2796 2488 cmd.exe 143 PID 2488 wrote to memory of 2796 2488 cmd.exe 143 PID 520 wrote to memory of 1680 520 oneetx.exe 157 PID 520 wrote to memory of 1680 520 oneetx.exe 157 PID 520 wrote to memory of 1680 520 oneetx.exe 157
Processes
-
C:\Users\Admin\AppData\Local\Temp\0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe"C:\Users\Admin\AppData\Local\Temp\0374ac8ae4a2ea0b3a63638d41f1aa086d432016b86c53a5a6c92456c96c5af5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivv7918.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivv7918.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCA2562.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCA2562.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it044705.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it044705.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr427728.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr427728.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 15445⤵
- Program crash
PID:3208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp543986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp543986.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr699981.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr699981.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 6963⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 7243⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 7963⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 8043⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 10003⤵
- Program crash
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 10003⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 12163⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 12323⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 13163⤵
- Program crash
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 6924⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 8444⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 9364⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 10524⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 10884⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 11084⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 10844⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 9924⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 7604⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 9444⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 7804⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 12924⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 7684⤵
- Program crash
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 11044⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 16364⤵
- Program crash
PID:2972
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 11244⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 16524⤵
- Program crash
PID:3604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 13563⤵
- Program crash
PID:620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1956 -ip 19561⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1100 -ip 11001⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1100 -ip 11001⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1100 -ip 11001⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1100 -ip 11001⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1100 -ip 11001⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1100 -ip 11001⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1100 -ip 11001⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1100 -ip 11001⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1100 -ip 11001⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1100 -ip 11001⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 520 -ip 5201⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 520 -ip 5201⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 520 -ip 5201⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 520 -ip 5201⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 520 -ip 5201⤵PID:812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 520 -ip 5201⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 520 -ip 5201⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 520 -ip 5201⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 520 -ip 5201⤵PID:4900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 520 -ip 5201⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 520 -ip 5201⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 520 -ip 5201⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 520 -ip 5201⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 520 -ip 5201⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 3322⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1956 -ip 19561⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 520 -ip 5201⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 520 -ip 5201⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 520 -ip 5201⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 3122⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1808 -ip 18081⤵PID:2128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
569KB
MD5c32ac7bfda34d03a7f7dd68a5bb3b56f
SHA1274fe6de1a1dc7f3f8eabcc4bbf3a1ac48501984
SHA25673925f3c666b44e3db456c386f2d4a33e48482eafa856bc05a5eb5384bfd8bf9
SHA51239d53ad807d082cc80c29e1d7c5b16f684e58581442df5215bc383f26c5980c10b4ca637f65ad556e52e0263bfc24fd65398d6cdac9e282726aa7f6bb6552dd4
-
Filesize
569KB
MD5c32ac7bfda34d03a7f7dd68a5bb3b56f
SHA1274fe6de1a1dc7f3f8eabcc4bbf3a1ac48501984
SHA25673925f3c666b44e3db456c386f2d4a33e48482eafa856bc05a5eb5384bfd8bf9
SHA51239d53ad807d082cc80c29e1d7c5b16f684e58581442df5215bc383f26c5980c10b4ca637f65ad556e52e0263bfc24fd65398d6cdac9e282726aa7f6bb6552dd4
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD5e381f4196d745cb151102bc6c908344a
SHA1344d5ec3a2b58a9e1b9e9a6af300d0b9463da36a
SHA256f5447750768535d53b17a60df102ad1eca55cf05992725c5b0d1a23cc1326187
SHA512325149e53a9ca6053218fe8ad1045bd6e17ca5d18272ebaa0e4011408eb1c53ce9f0787ccdae4364b226ba12c50425593e5666d3f19a39923c19f270105fca8f
-
Filesize
415KB
MD5e381f4196d745cb151102bc6c908344a
SHA1344d5ec3a2b58a9e1b9e9a6af300d0b9463da36a
SHA256f5447750768535d53b17a60df102ad1eca55cf05992725c5b0d1a23cc1326187
SHA512325149e53a9ca6053218fe8ad1045bd6e17ca5d18272ebaa0e4011408eb1c53ce9f0787ccdae4364b226ba12c50425593e5666d3f19a39923c19f270105fca8f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD53aab20b5bbac39be5649db2835c083a9
SHA1b2ab7c1226eec9dc65039d1a4e421382ac275a7b
SHA2560feb7fdc14e1dec1319e69a95d19cbd79a39c78a161e3270ff12d0b32610fea8
SHA5125124eb2b01c88bec50190721d80ff9dccf74ada77105b6f583f9d54536557448dd79f83f2ad43f49b0ab280a98b4a594a049060fd957a220ea742ad13180f520
-
Filesize
382KB
MD53aab20b5bbac39be5649db2835c083a9
SHA1b2ab7c1226eec9dc65039d1a4e421382ac275a7b
SHA2560feb7fdc14e1dec1319e69a95d19cbd79a39c78a161e3270ff12d0b32610fea8
SHA5125124eb2b01c88bec50190721d80ff9dccf74ada77105b6f583f9d54536557448dd79f83f2ad43f49b0ab280a98b4a594a049060fd957a220ea742ad13180f520
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
278KB
MD50c58f234bbc8c96ebfa30d7d0c1e909c
SHA152bdbcbb71768bf8fb78d7e829b3ceec76f22086
SHA2566edca0e2f3f0c99f11272a312dafb659a4f264eafd43ce413c8eef2c4d24391a
SHA512d8aa44782f91bf893a9e4bca709e6f11bbb946e389df766a5c70628411f60017f5d6fa06b95d2d8acff709d48902d8ecdbc93348a1308d6326955329bba3b6f5
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5