Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 08:45
Static task
static1
General
-
Target
6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe
-
Size
828KB
-
MD5
50dfc1fefa499184e0fc14ac18245d98
-
SHA1
7febb507c595a259fd6378ed7a8b5841689fdc24
-
SHA256
6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728
-
SHA512
508d8f2a2bc36abdb2a2110d82bcd29cfabe6afd3263841541ceec2da3ece7e6f4634bbc03d07cf7fa6f8f34a1dc501d8dd6db4998a80cbc377e409e390d69f0
-
SSDEEP
24576:pyg7lIJ0kU1FiEPp4TB2+kED27SEb51ttZtU1N:cgIJMFiEB4sQ9Ev9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it831462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it831462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it831462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it831462.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it831462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it831462.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr455342.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4384 ziZn9545.exe 4604 ziyP3959.exe 4308 it831462.exe 4304 jr571078.exe 116 kp260827.exe 996 lr455342.exe 3292 oneetx.exe 3048 oneetx.exe 4932 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4556 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it831462.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziZn9545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZn9545.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyP3959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziyP3959.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 996 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4296 4304 WerFault.exe 89 4656 996 WerFault.exe 93 392 996 WerFault.exe 93 4532 996 WerFault.exe 93 1140 996 WerFault.exe 93 3004 996 WerFault.exe 93 1196 996 WerFault.exe 93 4292 996 WerFault.exe 93 1152 996 WerFault.exe 93 1768 996 WerFault.exe 93 4756 996 WerFault.exe 93 4232 3292 WerFault.exe 113 3860 3292 WerFault.exe 113 752 3292 WerFault.exe 113 4412 3292 WerFault.exe 113 1948 3292 WerFault.exe 113 484 3292 WerFault.exe 113 3084 3292 WerFault.exe 113 1448 3292 WerFault.exe 113 1408 3292 WerFault.exe 113 3932 3292 WerFault.exe 113 4416 3292 WerFault.exe 113 1200 3292 WerFault.exe 113 4604 3292 WerFault.exe 113 3092 3292 WerFault.exe 113 2664 3048 WerFault.exe 158 1240 3292 WerFault.exe 113 3404 3292 WerFault.exe 113 3712 3292 WerFault.exe 113 5096 4932 WerFault.exe 168 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4308 it831462.exe 4308 it831462.exe 4304 jr571078.exe 4304 jr571078.exe 116 kp260827.exe 116 kp260827.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4308 it831462.exe Token: SeDebugPrivilege 4304 jr571078.exe Token: SeDebugPrivilege 116 kp260827.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 996 lr455342.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1868 wrote to memory of 4384 1868 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe 83 PID 1868 wrote to memory of 4384 1868 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe 83 PID 1868 wrote to memory of 4384 1868 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe 83 PID 4384 wrote to memory of 4604 4384 ziZn9545.exe 84 PID 4384 wrote to memory of 4604 4384 ziZn9545.exe 84 PID 4384 wrote to memory of 4604 4384 ziZn9545.exe 84 PID 4604 wrote to memory of 4308 4604 ziyP3959.exe 85 PID 4604 wrote to memory of 4308 4604 ziyP3959.exe 85 PID 4604 wrote to memory of 4304 4604 ziyP3959.exe 89 PID 4604 wrote to memory of 4304 4604 ziyP3959.exe 89 PID 4604 wrote to memory of 4304 4604 ziyP3959.exe 89 PID 4384 wrote to memory of 116 4384 ziZn9545.exe 92 PID 4384 wrote to memory of 116 4384 ziZn9545.exe 92 PID 4384 wrote to memory of 116 4384 ziZn9545.exe 92 PID 1868 wrote to memory of 996 1868 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe 93 PID 1868 wrote to memory of 996 1868 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe 93 PID 1868 wrote to memory of 996 1868 6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe 93 PID 996 wrote to memory of 3292 996 lr455342.exe 113 PID 996 wrote to memory of 3292 996 lr455342.exe 113 PID 996 wrote to memory of 3292 996 lr455342.exe 113 PID 3292 wrote to memory of 4916 3292 oneetx.exe 131 PID 3292 wrote to memory of 4916 3292 oneetx.exe 131 PID 3292 wrote to memory of 4916 3292 oneetx.exe 131 PID 3292 wrote to memory of 1036 3292 oneetx.exe 137 PID 3292 wrote to memory of 1036 3292 oneetx.exe 137 PID 3292 wrote to memory of 1036 3292 oneetx.exe 137 PID 1036 wrote to memory of 2992 1036 cmd.exe 141 PID 1036 wrote to memory of 2992 1036 cmd.exe 141 PID 1036 wrote to memory of 2992 1036 cmd.exe 141 PID 1036 wrote to memory of 3440 1036 cmd.exe 142 PID 1036 wrote to memory of 3440 1036 cmd.exe 142 PID 1036 wrote to memory of 3440 1036 cmd.exe 142 PID 1036 wrote to memory of 4100 1036 cmd.exe 143 PID 1036 wrote to memory of 4100 1036 cmd.exe 143 PID 1036 wrote to memory of 4100 1036 cmd.exe 143 PID 1036 wrote to memory of 3180 1036 cmd.exe 145 PID 1036 wrote to memory of 3180 1036 cmd.exe 145 PID 1036 wrote to memory of 3180 1036 cmd.exe 145 PID 1036 wrote to memory of 1872 1036 cmd.exe 144 PID 1036 wrote to memory of 1872 1036 cmd.exe 144 PID 1036 wrote to memory of 1872 1036 cmd.exe 144 PID 1036 wrote to memory of 2032 1036 cmd.exe 146 PID 1036 wrote to memory of 2032 1036 cmd.exe 146 PID 1036 wrote to memory of 2032 1036 cmd.exe 146 PID 3292 wrote to memory of 4556 3292 oneetx.exe 163 PID 3292 wrote to memory of 4556 3292 oneetx.exe 163 PID 3292 wrote to memory of 4556 3292 oneetx.exe 163
Processes
-
C:\Users\Admin\AppData\Local\Temp\6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe"C:\Users\Admin\AppData\Local\Temp\6241fc5000bfd1094a06b587d5774c0a2289931ff4fd2ccb050096bf8270a728.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZn9545.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZn9545.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyP3959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziyP3959.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it831462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it831462.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr571078.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr571078.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 10485⤵
- Program crash
PID:4296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp260827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp260827.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr455342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr455342.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 6963⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 7083⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 8563⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 9323⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 9883⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 9883⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 12163⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 12083⤵
- Program crash
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 13243⤵
- Program crash
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 6964⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8164⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8924⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10524⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10604⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 11084⤵
- Program crash
PID:484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 11164⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 9924⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12604⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:2032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 13084⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12964⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 7444⤵
- Program crash
PID:1200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12764⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10684⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 16164⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10684⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 16324⤵
- Program crash
PID:3712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 13563⤵
- Program crash
PID:4756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4304 -ip 43041⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 996 -ip 9961⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 996 -ip 9961⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 996 -ip 9961⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 996 -ip 9961⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 996 -ip 9961⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 996 -ip 9961⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 996 -ip 9961⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 996 -ip 9961⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 996 -ip 9961⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 996 -ip 9961⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3292 -ip 32921⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3292 -ip 32921⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3292 -ip 32921⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3292 -ip 32921⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3292 -ip 32921⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3292 -ip 32921⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3292 -ip 32921⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3292 -ip 32921⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3292 -ip 32921⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3292 -ip 32921⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3292 -ip 32921⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 3122⤵
- Program crash
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3048 -ip 30481⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3292 -ip 32921⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3292 -ip 32921⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3292 -ip 32921⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 2162⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4932 -ip 49321⤵PID:3724
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
568KB
MD5e459a0f9ac48c6cb5a2ad036e516533b
SHA1821c75cb1524254050eb2bcfbe81afe62ff43a25
SHA256cb465bcc099169af94c1e2980ab7169c5c26d9256ab2d16a9dd6c2d264f14a9a
SHA5126e7de4db69842dbb1e1d899cde04a60bfeef0ce62ca0bd8dbdf35f30ed22da7bb5f2adb278ad13e50dd745c06e803de5f1483bc4d3e93d75bc0599529c44e4d6
-
Filesize
568KB
MD5e459a0f9ac48c6cb5a2ad036e516533b
SHA1821c75cb1524254050eb2bcfbe81afe62ff43a25
SHA256cb465bcc099169af94c1e2980ab7169c5c26d9256ab2d16a9dd6c2d264f14a9a
SHA5126e7de4db69842dbb1e1d899cde04a60bfeef0ce62ca0bd8dbdf35f30ed22da7bb5f2adb278ad13e50dd745c06e803de5f1483bc4d3e93d75bc0599529c44e4d6
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
414KB
MD50b796d0ffbbb1b3f7fa02cdc6d68598a
SHA1101d66c5e1f0a3bc0c37219cb99141d9d8166098
SHA256ad4fd8020e07b5099f724f052bc5f10feef737d991704848ec0253f034f8d406
SHA512bae76041fbcd50053abdc846c08924adfa1056839ba8376ce143a3dafc25c87366cad2f7d28ad6fc66cf8b1ef1a0c8d2de43e1b91da5d55da1c754e23897bbb0
-
Filesize
414KB
MD50b796d0ffbbb1b3f7fa02cdc6d68598a
SHA1101d66c5e1f0a3bc0c37219cb99141d9d8166098
SHA256ad4fd8020e07b5099f724f052bc5f10feef737d991704848ec0253f034f8d406
SHA512bae76041fbcd50053abdc846c08924adfa1056839ba8376ce143a3dafc25c87366cad2f7d28ad6fc66cf8b1ef1a0c8d2de43e1b91da5d55da1c754e23897bbb0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
362KB
MD53b2528ce96e501b39d2508213c4ec559
SHA18d6c083f078c4fbeb1a5791452e95da53eb6ee94
SHA256e6e0fd4187cc79740899e8d9a28d8408539a0048ba729c4d96ca32fd20909dee
SHA51278d4e2377b5674af4f5ec26a0dcc3bbe158c8ae1b01eb1d2cad7e0cc740eafa8490ddd3143980d9b249f6d9119d96f3c822b3f88699150f528833a06eb57ea02
-
Filesize
362KB
MD53b2528ce96e501b39d2508213c4ec559
SHA18d6c083f078c4fbeb1a5791452e95da53eb6ee94
SHA256e6e0fd4187cc79740899e8d9a28d8408539a0048ba729c4d96ca32fd20909dee
SHA51278d4e2377b5674af4f5ec26a0dcc3bbe158c8ae1b01eb1d2cad7e0cc740eafa8490ddd3143980d9b249f6d9119d96f3c822b3f88699150f528833a06eb57ea02
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
258KB
MD5324a1469e044161c80ef15cd47ce6066
SHA19589faac2d09a0687941f2634df11bef19d400c6
SHA2565d4e3f15cdac4837ea603ab847d9825d61ddd41a6e2ee4567e3d8b28410a2fa9
SHA51241b2881dad5cb68817e6700c56c2f27c7993ebb1b11aaf7d394034dc179c5b45db503c7d12e883b77cf4b4f76df1324518f9f0e511c7174e7cc7485460fefe2b
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5