Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 09:51
Static task
static1
General
-
Target
cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe
-
Size
965KB
-
MD5
746de7b60c813a39005e853a06dc4b49
-
SHA1
96cbb6831db80c0dc36a886f64814388dc285384
-
SHA256
cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac
-
SHA512
8640787225618200bee844e368ae64a50860c1d5a2ca7078d53a83e25491a183b2dcfa5cc0d9d6e422718d23386a7b12ac29a4f2da44fc404d60eade123fd88b
-
SSDEEP
24576:Eygx49ZHgQqKdM51bbiO2ytz+0AEN/B1:TgjQ8aODpN/B
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr876369.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr876369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr876369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr876369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr876369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr876369.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si831048.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 3448 un719031.exe 1664 un393565.exe 4108 pr876369.exe 4964 qu434662.exe 3828 rk507964.exe 4816 si831048.exe 1616 oneetx.exe 2024 oneetx.exe 4816 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr876369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr876369.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un719031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un719031.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un393565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un393565.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 4348 4108 WerFault.exe 85 4668 4964 WerFault.exe 91 1028 4816 WerFault.exe 96 1272 4816 WerFault.exe 96 1704 4816 WerFault.exe 96 1432 4816 WerFault.exe 96 4468 4816 WerFault.exe 96 972 4816 WerFault.exe 96 1292 4816 WerFault.exe 96 1732 4816 WerFault.exe 96 4980 4816 WerFault.exe 96 4580 4816 WerFault.exe 96 1392 1616 WerFault.exe 117 2044 1616 WerFault.exe 117 3908 1616 WerFault.exe 117 4680 1616 WerFault.exe 117 1240 1616 WerFault.exe 117 5004 1616 WerFault.exe 117 4628 1616 WerFault.exe 117 232 1616 WerFault.exe 117 4048 1616 WerFault.exe 117 1400 1616 WerFault.exe 117 5080 1616 WerFault.exe 117 1180 1616 WerFault.exe 117 1880 1616 WerFault.exe 117 1140 2024 WerFault.exe 158 4392 1616 WerFault.exe 117 5068 1616 WerFault.exe 117 5048 1616 WerFault.exe 117 3368 1616 WerFault.exe 117 2704 4816 WerFault.exe 170 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4108 pr876369.exe 4108 pr876369.exe 4964 qu434662.exe 4964 qu434662.exe 3828 rk507964.exe 3828 rk507964.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4108 pr876369.exe Token: SeDebugPrivilege 4964 qu434662.exe Token: SeDebugPrivilege 3828 rk507964.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4816 si831048.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3448 3992 cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe 83 PID 3992 wrote to memory of 3448 3992 cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe 83 PID 3992 wrote to memory of 3448 3992 cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe 83 PID 3448 wrote to memory of 1664 3448 un719031.exe 84 PID 3448 wrote to memory of 1664 3448 un719031.exe 84 PID 3448 wrote to memory of 1664 3448 un719031.exe 84 PID 1664 wrote to memory of 4108 1664 un393565.exe 85 PID 1664 wrote to memory of 4108 1664 un393565.exe 85 PID 1664 wrote to memory of 4108 1664 un393565.exe 85 PID 1664 wrote to memory of 4964 1664 un393565.exe 91 PID 1664 wrote to memory of 4964 1664 un393565.exe 91 PID 1664 wrote to memory of 4964 1664 un393565.exe 91 PID 3448 wrote to memory of 3828 3448 un719031.exe 94 PID 3448 wrote to memory of 3828 3448 un719031.exe 94 PID 3448 wrote to memory of 3828 3448 un719031.exe 94 PID 3992 wrote to memory of 4816 3992 cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe 96 PID 3992 wrote to memory of 4816 3992 cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe 96 PID 3992 wrote to memory of 4816 3992 cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe 96 PID 4816 wrote to memory of 1616 4816 si831048.exe 117 PID 4816 wrote to memory of 1616 4816 si831048.exe 117 PID 4816 wrote to memory of 1616 4816 si831048.exe 117 PID 1616 wrote to memory of 4620 1616 oneetx.exe 136 PID 1616 wrote to memory of 4620 1616 oneetx.exe 136 PID 1616 wrote to memory of 4620 1616 oneetx.exe 136 PID 1616 wrote to memory of 1424 1616 oneetx.exe 142 PID 1616 wrote to memory of 1424 1616 oneetx.exe 142 PID 1616 wrote to memory of 1424 1616 oneetx.exe 142 PID 1424 wrote to memory of 3884 1424 cmd.exe 146 PID 1424 wrote to memory of 3884 1424 cmd.exe 146 PID 1424 wrote to memory of 3884 1424 cmd.exe 146 PID 1424 wrote to memory of 4632 1424 cmd.exe 147 PID 1424 wrote to memory of 4632 1424 cmd.exe 147 PID 1424 wrote to memory of 4632 1424 cmd.exe 147 PID 1424 wrote to memory of 4492 1424 cmd.exe 148 PID 1424 wrote to memory of 4492 1424 cmd.exe 148 PID 1424 wrote to memory of 4492 1424 cmd.exe 148 PID 1424 wrote to memory of 4236 1424 cmd.exe 149 PID 1424 wrote to memory of 4236 1424 cmd.exe 149 PID 1424 wrote to memory of 4236 1424 cmd.exe 149 PID 1424 wrote to memory of 2104 1424 cmd.exe 150 PID 1424 wrote to memory of 2104 1424 cmd.exe 150 PID 1424 wrote to memory of 2104 1424 cmd.exe 150 PID 1424 wrote to memory of 4108 1424 cmd.exe 151 PID 1424 wrote to memory of 4108 1424 cmd.exe 151 PID 1424 wrote to memory of 4108 1424 cmd.exe 151 PID 1616 wrote to memory of 1152 1616 oneetx.exe 165 PID 1616 wrote to memory of 1152 1616 oneetx.exe 165 PID 1616 wrote to memory of 1152 1616 oneetx.exe 165
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe"C:\Users\Admin\AppData\Local\Temp\cc4a349c91cbce2224f7ff31f71ca2999d031cf2e5025fc33d1018740c6509ac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un719031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un719031.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un393565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un393565.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr876369.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr876369.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 10805⤵
- Program crash
PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu434662.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu434662.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 17885⤵
- Program crash
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk507964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk507964.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si831048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si831048.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 6963⤵
- Program crash
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 7763⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 8123⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 9603⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 9523⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 9523⤵
- Program crash
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 12163⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 12483⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 13203⤵
- Program crash
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 6924⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 8164⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 9084⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 10524⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 10604⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 10844⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 10964⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 10084⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 7604⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:2104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 12884⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 12604⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 13164⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 12684⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 11124⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 16004⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 15804⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 14364⤵
- Program crash
PID:3368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 15643⤵
- Program crash
PID:4580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4108 -ip 41081⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4964 -ip 49641⤵PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4816 -ip 48161⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4816 -ip 48161⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4816 -ip 48161⤵PID:3132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4816 -ip 48161⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4816 -ip 48161⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4816 -ip 48161⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4816 -ip 48161⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4816 -ip 48161⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4816 -ip 48161⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4816 -ip 48161⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1616 -ip 16161⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 1616 -ip 16161⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 1616 -ip 16161⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1616 -ip 16161⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 1616 -ip 16161⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 1616 -ip 16161⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 1616 -ip 16161⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 1616 -ip 16161⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 1616 -ip 16161⤵PID:2516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1616 -ip 16161⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1616 -ip 16161⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 1616 -ip 16161⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 1616 -ip 16161⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 3202⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 2024 -ip 20241⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 1616 -ip 16161⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 1616 -ip 16161⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 1616 -ip 16161⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1616 -ip 16161⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 3202⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 4816 -ip 48161⤵PID:4432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
706KB
MD5d36b983d80ffcc3e735edd87dc7a37d3
SHA1e69a8b8c029a3a274f1f94df7a65ce868789423e
SHA25655e0c9ab43e2380b91c57abf87e4590c9ba933691fe6c094675e53f40627ebc5
SHA51244617a1abf0afb863d7641f094458c701558949a9a488d546025bf466dc9f63f249a74272fc053ac25ddc00ec4e897b88033696a56c11d46176dc7d1bc3a2e3f
-
Filesize
706KB
MD5d36b983d80ffcc3e735edd87dc7a37d3
SHA1e69a8b8c029a3a274f1f94df7a65ce868789423e
SHA25655e0c9ab43e2380b91c57abf87e4590c9ba933691fe6c094675e53f40627ebc5
SHA51244617a1abf0afb863d7641f094458c701558949a9a488d546025bf466dc9f63f249a74272fc053ac25ddc00ec4e897b88033696a56c11d46176dc7d1bc3a2e3f
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
136KB
MD549650cdcdc358bb2770f0062abeef88c
SHA1d6f7ec7758e9a80700b81bc7a549838ba99aacac
SHA25679e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59
SHA5127ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1
-
Filesize
551KB
MD549bec94b7f4ed2afe7eb3718fdb5dfcc
SHA11fa1fb405d9c7f8e34c0bee75db445a932377bb9
SHA25637575a6b1ed4152d8eea52a3ea81159e3774ed94675edd01f9d3ae5f24e49b97
SHA512724a11c37c6c3631b0b3b182be3026294e77f88b00b08e0d1c5b0852d75af785170fda77bff16eff5ce8a02ea0cf54e1abcc3a5fbff0aa0066f99688dd24d21a
-
Filesize
551KB
MD549bec94b7f4ed2afe7eb3718fdb5dfcc
SHA11fa1fb405d9c7f8e34c0bee75db445a932377bb9
SHA25637575a6b1ed4152d8eea52a3ea81159e3774ed94675edd01f9d3ae5f24e49b97
SHA512724a11c37c6c3631b0b3b182be3026294e77f88b00b08e0d1c5b0852d75af785170fda77bff16eff5ce8a02ea0cf54e1abcc3a5fbff0aa0066f99688dd24d21a
-
Filesize
279KB
MD5ec3e4014bbe8861642aaac3a413c0d09
SHA1bf3be2aa4efd97f4e1df774a05b6f2a11d882055
SHA25631eb8c3d835e4cd660978165bfbd7e3008a2d48ba51f95ee8ebd4cf2478d2c44
SHA512d40fadc5f627722226a8a8657749f88047622570c971bffc1b6236ccbea411a1db7bc91367646bd7d653c50f63a2233a812f884543837d6269d72e665af3550e
-
Filesize
279KB
MD5ec3e4014bbe8861642aaac3a413c0d09
SHA1bf3be2aa4efd97f4e1df774a05b6f2a11d882055
SHA25631eb8c3d835e4cd660978165bfbd7e3008a2d48ba51f95ee8ebd4cf2478d2c44
SHA512d40fadc5f627722226a8a8657749f88047622570c971bffc1b6236ccbea411a1db7bc91367646bd7d653c50f63a2233a812f884543837d6269d72e665af3550e
-
Filesize
362KB
MD5e728da94c54cbd02917ed27dff4fe5ef
SHA18a0ec4558f148937f5dd5f42156010547aad1efb
SHA256b68fd5c047879ef70c965fb938194bfcf808583886052f53b6c8a8cd058470cf
SHA512de1603d094cb0717127ed31852ac02425364fb0e445c5f2f5d081370c97848ad8696cf57a4990616b643298c5f66e8e5006ed52ae4a3928ea8ec985bd8936564
-
Filesize
362KB
MD5e728da94c54cbd02917ed27dff4fe5ef
SHA18a0ec4558f148937f5dd5f42156010547aad1efb
SHA256b68fd5c047879ef70c965fb938194bfcf808583886052f53b6c8a8cd058470cf
SHA512de1603d094cb0717127ed31852ac02425364fb0e445c5f2f5d081370c97848ad8696cf57a4990616b643298c5f66e8e5006ed52ae4a3928ea8ec985bd8936564
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
258KB
MD5c43a184e311d755baa2f5e642563bcc0
SHA112f6fc7b1467caa7d146bae7594dcaaba6975e5e
SHA2562b75638d4f9fcbd72547a1a4de46fbc113e92d429bc50a5270715c600ba39ae7
SHA512b2cbfa0b19c23eb051ad0f4fe7ee1ea2c9c333d8c665b6b0d7895fcaa92e243f4619a2e8eeb02098bad9334f79d80e754a97c69b8c5e8eda9461a645d9ae61b6
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5