Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 07:05
Static task
static1
General
-
Target
d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe
-
Size
828KB
-
MD5
24a7367100b366d52b975f1e66a57a20
-
SHA1
22290ae5b466490fcbb1e65ed1ce665609ed115a
-
SHA256
d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4
-
SHA512
36129a0021c422fff6b1c884060d6a6b7007342e193611dbe88b9035b018fa662b30133dec3ee6ba9e6ce03ea00ad3e037973f1c3c4fb2b4bd0ec5817f7f1b58
-
SSDEEP
24576:Ay49y4UafPFZfghUFzGex7YPmZaE/V6gLRH:H43UafYhzexEPKB/VfR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it990444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it990444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it990444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it990444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it990444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it990444.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr028816.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1532 ziUV3038.exe 2300 ziSw3815.exe 1560 it990444.exe 4088 jr119578.exe 212 kp255200.exe 3088 lr028816.exe 3360 oneetx.exe 1360 oneetx.exe 936 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it990444.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziSw3815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziSw3815.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziUV3038.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUV3038.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 2388 4088 WerFault.exe 87 4224 3088 WerFault.exe 91 4352 3088 WerFault.exe 91 4648 3088 WerFault.exe 91 1352 3088 WerFault.exe 91 2624 3088 WerFault.exe 91 4244 3088 WerFault.exe 91 4896 3088 WerFault.exe 91 1472 3088 WerFault.exe 91 4960 3088 WerFault.exe 91 4376 3088 WerFault.exe 91 1180 3360 WerFault.exe 110 3704 3360 WerFault.exe 110 3484 3360 WerFault.exe 110 876 3360 WerFault.exe 110 3856 3360 WerFault.exe 110 3996 3360 WerFault.exe 110 3516 3360 WerFault.exe 110 2504 3360 WerFault.exe 110 1812 3360 WerFault.exe 110 1584 3360 WerFault.exe 110 636 3360 WerFault.exe 110 3928 3360 WerFault.exe 110 3944 3360 WerFault.exe 110 2424 1360 WerFault.exe 149 3816 3360 WerFault.exe 110 4356 3360 WerFault.exe 110 2664 3360 WerFault.exe 110 2216 936 WerFault.exe 159 5040 3360 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1560 it990444.exe 1560 it990444.exe 4088 jr119578.exe 4088 jr119578.exe 212 kp255200.exe 212 kp255200.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1560 it990444.exe Token: SeDebugPrivilege 4088 jr119578.exe Token: SeDebugPrivilege 212 kp255200.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3088 lr028816.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1532 4996 d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe 82 PID 4996 wrote to memory of 1532 4996 d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe 82 PID 4996 wrote to memory of 1532 4996 d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe 82 PID 1532 wrote to memory of 2300 1532 ziUV3038.exe 83 PID 1532 wrote to memory of 2300 1532 ziUV3038.exe 83 PID 1532 wrote to memory of 2300 1532 ziUV3038.exe 83 PID 2300 wrote to memory of 1560 2300 ziSw3815.exe 84 PID 2300 wrote to memory of 1560 2300 ziSw3815.exe 84 PID 2300 wrote to memory of 4088 2300 ziSw3815.exe 87 PID 2300 wrote to memory of 4088 2300 ziSw3815.exe 87 PID 2300 wrote to memory of 4088 2300 ziSw3815.exe 87 PID 1532 wrote to memory of 212 1532 ziUV3038.exe 90 PID 1532 wrote to memory of 212 1532 ziUV3038.exe 90 PID 1532 wrote to memory of 212 1532 ziUV3038.exe 90 PID 4996 wrote to memory of 3088 4996 d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe 91 PID 4996 wrote to memory of 3088 4996 d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe 91 PID 4996 wrote to memory of 3088 4996 d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe 91 PID 3088 wrote to memory of 3360 3088 lr028816.exe 110 PID 3088 wrote to memory of 3360 3088 lr028816.exe 110 PID 3088 wrote to memory of 3360 3088 lr028816.exe 110 PID 3360 wrote to memory of 692 3360 oneetx.exe 127 PID 3360 wrote to memory of 692 3360 oneetx.exe 127 PID 3360 wrote to memory of 692 3360 oneetx.exe 127 PID 3360 wrote to memory of 4184 3360 oneetx.exe 133 PID 3360 wrote to memory of 4184 3360 oneetx.exe 133 PID 3360 wrote to memory of 4184 3360 oneetx.exe 133 PID 4184 wrote to memory of 4280 4184 cmd.exe 137 PID 4184 wrote to memory of 4280 4184 cmd.exe 137 PID 4184 wrote to memory of 4280 4184 cmd.exe 137 PID 4184 wrote to memory of 1664 4184 cmd.exe 138 PID 4184 wrote to memory of 1664 4184 cmd.exe 138 PID 4184 wrote to memory of 1664 4184 cmd.exe 138 PID 4184 wrote to memory of 2816 4184 cmd.exe 139 PID 4184 wrote to memory of 2816 4184 cmd.exe 139 PID 4184 wrote to memory of 2816 4184 cmd.exe 139 PID 4184 wrote to memory of 2688 4184 cmd.exe 140 PID 4184 wrote to memory of 2688 4184 cmd.exe 140 PID 4184 wrote to memory of 2688 4184 cmd.exe 140 PID 4184 wrote to memory of 4520 4184 cmd.exe 141 PID 4184 wrote to memory of 4520 4184 cmd.exe 141 PID 4184 wrote to memory of 4520 4184 cmd.exe 141 PID 4184 wrote to memory of 1396 4184 cmd.exe 142 PID 4184 wrote to memory of 1396 4184 cmd.exe 142 PID 4184 wrote to memory of 1396 4184 cmd.exe 142 PID 3360 wrote to memory of 2968 3360 oneetx.exe 156 PID 3360 wrote to memory of 2968 3360 oneetx.exe 156 PID 3360 wrote to memory of 2968 3360 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe"C:\Users\Admin\AppData\Local\Temp\d1833ba50253d60bbd8fef00c36371716f74b6dc4c29c960e4e797c10c67fed4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUV3038.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUV3038.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziSw3815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziSw3815.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it990444.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it990444.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr119578.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr119578.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 17085⤵
- Program crash
PID:2388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp255200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp255200.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr028816.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr028816.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 6963⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 7563⤵
- Program crash
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8563⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8643⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8683⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8683⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 12083⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 12443⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 13163⤵
- Program crash
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 6924⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 8164⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 9364⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10524⤵
- Program crash
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10524⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10524⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10844⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 9924⤵
- Program crash
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 7644⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 7764⤵
- Program crash
PID:1584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 13244⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 7444⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 7524⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 11164⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 16164⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 11404⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 16284⤵
- Program crash
PID:5040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 15643⤵
- Program crash
PID:4376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4088 -ip 40881⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3088 -ip 30881⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3088 -ip 30881⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3088 -ip 30881⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3088 -ip 30881⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3088 -ip 30881⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3088 -ip 30881⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3088 -ip 30881⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3088 -ip 30881⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3088 -ip 30881⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3088 -ip 30881⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3360 -ip 33601⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3360 -ip 33601⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3360 -ip 33601⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3360 -ip 33601⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3360 -ip 33601⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3360 -ip 33601⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3360 -ip 33601⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3360 -ip 33601⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3360 -ip 33601⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3360 -ip 33601⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3360 -ip 33601⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3360 -ip 33601⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3360 -ip 33601⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 3282⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1360 -ip 13601⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3360 -ip 33601⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3360 -ip 33601⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3360 -ip 33601⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 3202⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 936 -ip 9361⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3360 -ip 33601⤵PID:3184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
569KB
MD5264d770812aec7e97a760c2917d16c2d
SHA1d3af9bf4abcacc60c4413e83f551b5c286c69595
SHA256e97f09597852bcf11e4b7b4f6b28104814673b54326ca97f52944b0e3673711f
SHA51201eeed6f0ec2eb72ab51ddb637787bb72ebd609287a25492cfbd8610bd3aceb0b6c6531ee3d82c1bd7691d7e9de71bb2d926b5ece59478e6de5e4141be191d9b
-
Filesize
569KB
MD5264d770812aec7e97a760c2917d16c2d
SHA1d3af9bf4abcacc60c4413e83f551b5c286c69595
SHA256e97f09597852bcf11e4b7b4f6b28104814673b54326ca97f52944b0e3673711f
SHA51201eeed6f0ec2eb72ab51ddb637787bb72ebd609287a25492cfbd8610bd3aceb0b6c6531ee3d82c1bd7691d7e9de71bb2d926b5ece59478e6de5e4141be191d9b
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD549257d352ab929900467e42e3ea35486
SHA1d2522f305c48dd5d9c34dfee4d663dec388d7f7e
SHA25697d5785c85807cf98df5aaba4966a665654ed1619d32833fe8f90dc9ade506a8
SHA5125001da33114a6d26309a83c5de550004e2b4370fccfee5c7b3aa36ce2bf73d4a76b7644079643ebff448483ea5126e6d387e1f8091a2acac12b4af41776c4bc9
-
Filesize
415KB
MD549257d352ab929900467e42e3ea35486
SHA1d2522f305c48dd5d9c34dfee4d663dec388d7f7e
SHA25697d5785c85807cf98df5aaba4966a665654ed1619d32833fe8f90dc9ade506a8
SHA5125001da33114a6d26309a83c5de550004e2b4370fccfee5c7b3aa36ce2bf73d4a76b7644079643ebff448483ea5126e6d387e1f8091a2acac12b4af41776c4bc9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD5912097c90e9a1c87815646dde6670f9a
SHA1c018ff855d26037922d2779fa59a368fd0717e36
SHA2563ec089d733dc21bae6432ae979d50ab7abaf839d83128cd8680305aaea2891d0
SHA512609bbc1d52d255d6ad0d5cb9c30e75500047710a2d6e61a03aa49223538075bc4d7efff1bcb734e7321fb35441488640e92053ef1ada3a1e5a4a04ee701b6370
-
Filesize
382KB
MD5912097c90e9a1c87815646dde6670f9a
SHA1c018ff855d26037922d2779fa59a368fd0717e36
SHA2563ec089d733dc21bae6432ae979d50ab7abaf839d83128cd8680305aaea2891d0
SHA512609bbc1d52d255d6ad0d5cb9c30e75500047710a2d6e61a03aa49223538075bc4d7efff1bcb734e7321fb35441488640e92053ef1ada3a1e5a4a04ee701b6370
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
278KB
MD5985bdf3a183fb3fb808f300bbc41b905
SHA14cdcafc4109c72db146dd2716fb8f58740109c7a
SHA256d0987775b75a6919cc6577e7db3d3e37cde1197e7268a453380d2621ecb42a6c
SHA5126ae196dabfc8464a50c1c5e317cf6d745b0fc209873ee97c0050d3364850e590f86f3ae8726cc20526972fbae19f8636057c3c560d7ea91d3e03be7c9fdadeb3
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5