Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 15:19
Static task
static1
General
-
Target
85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe
-
Size
712KB
-
MD5
2cf9032670f193d7ff08bfdcd8700485
-
SHA1
93d6d68d4e6fb8e0e30c6116bd23cff208274955
-
SHA256
85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45
-
SHA512
8bd878823f54e646eb479008c7eab835e77ef6bfb27a0f46932531a2ed6a4ccb1e9eb43e0b0623d7e61ab5496fbf3cb7feaca956fd0858af4f1ff579b4a98648
-
SSDEEP
12288:CMrDy90drbyARFB1zts6QHQI7/pCLh/mA12Aqo2GL0tSwGRY7:ByOjg7wq+eA12G2GL+SwL7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7378167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7378167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7378167.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7378167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7378167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7378167.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation i4813256.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4340 x2367255.exe 1060 g5734452.exe 2704 h7378167.exe 468 i4813256.exe 1820 oneetx.exe 4340 oneetx.exe 3864 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7378167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7378167.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2367255.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2367255.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 4212 2704 WerFault.exe 90 4732 468 WerFault.exe 95 2876 468 WerFault.exe 95 1180 468 WerFault.exe 95 3300 468 WerFault.exe 95 2584 468 WerFault.exe 95 4088 468 WerFault.exe 95 1276 468 WerFault.exe 95 3856 468 WerFault.exe 95 792 468 WerFault.exe 95 2720 468 WerFault.exe 95 4392 1820 WerFault.exe 115 1888 1820 WerFault.exe 115 3744 1820 WerFault.exe 115 1872 1820 WerFault.exe 115 2260 1820 WerFault.exe 115 2780 1820 WerFault.exe 115 1836 1820 WerFault.exe 115 4436 1820 WerFault.exe 115 548 1820 WerFault.exe 115 1484 1820 WerFault.exe 115 400 1820 WerFault.exe 115 1512 1820 WerFault.exe 115 4464 1820 WerFault.exe 115 3376 4340 WerFault.exe 154 4144 1820 WerFault.exe 115 2688 1820 WerFault.exe 115 4296 1820 WerFault.exe 115 2840 3864 WerFault.exe 164 2512 1820 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1060 g5734452.exe 1060 g5734452.exe 2704 h7378167.exe 2704 h7378167.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1060 g5734452.exe Token: SeDebugPrivilege 2704 h7378167.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 i4813256.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4340 1368 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe 84 PID 1368 wrote to memory of 4340 1368 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe 84 PID 1368 wrote to memory of 4340 1368 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe 84 PID 4340 wrote to memory of 1060 4340 x2367255.exe 85 PID 4340 wrote to memory of 1060 4340 x2367255.exe 85 PID 4340 wrote to memory of 1060 4340 x2367255.exe 85 PID 4340 wrote to memory of 2704 4340 x2367255.exe 90 PID 4340 wrote to memory of 2704 4340 x2367255.exe 90 PID 4340 wrote to memory of 2704 4340 x2367255.exe 90 PID 1368 wrote to memory of 468 1368 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe 95 PID 1368 wrote to memory of 468 1368 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe 95 PID 1368 wrote to memory of 468 1368 85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe 95 PID 468 wrote to memory of 1820 468 i4813256.exe 115 PID 468 wrote to memory of 1820 468 i4813256.exe 115 PID 468 wrote to memory of 1820 468 i4813256.exe 115 PID 1820 wrote to memory of 5056 1820 oneetx.exe 132 PID 1820 wrote to memory of 5056 1820 oneetx.exe 132 PID 1820 wrote to memory of 5056 1820 oneetx.exe 132 PID 1820 wrote to memory of 2092 1820 oneetx.exe 138 PID 1820 wrote to memory of 2092 1820 oneetx.exe 138 PID 1820 wrote to memory of 2092 1820 oneetx.exe 138 PID 2092 wrote to memory of 2104 2092 cmd.exe 142 PID 2092 wrote to memory of 2104 2092 cmd.exe 142 PID 2092 wrote to memory of 2104 2092 cmd.exe 142 PID 2092 wrote to memory of 4272 2092 cmd.exe 143 PID 2092 wrote to memory of 4272 2092 cmd.exe 143 PID 2092 wrote to memory of 4272 2092 cmd.exe 143 PID 2092 wrote to memory of 4056 2092 cmd.exe 144 PID 2092 wrote to memory of 4056 2092 cmd.exe 144 PID 2092 wrote to memory of 4056 2092 cmd.exe 144 PID 2092 wrote to memory of 412 2092 cmd.exe 145 PID 2092 wrote to memory of 412 2092 cmd.exe 145 PID 2092 wrote to memory of 412 2092 cmd.exe 145 PID 2092 wrote to memory of 2212 2092 cmd.exe 146 PID 2092 wrote to memory of 2212 2092 cmd.exe 146 PID 2092 wrote to memory of 2212 2092 cmd.exe 146 PID 2092 wrote to memory of 4244 2092 cmd.exe 147 PID 2092 wrote to memory of 4244 2092 cmd.exe 147 PID 2092 wrote to memory of 4244 2092 cmd.exe 147 PID 1820 wrote to memory of 3068 1820 oneetx.exe 161 PID 1820 wrote to memory of 3068 1820 oneetx.exe 161 PID 1820 wrote to memory of 3068 1820 oneetx.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe"C:\Users\Admin\AppData\Local\Temp\85668e50e43c6e8092232db81eb943a9e30f12eb540017a3283428949b164a45.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2367255.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2367255.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5734452.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5734452.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7378167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7378167.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 10844⤵
- Program crash
PID:4212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4813256.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4813256.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 6963⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 7803⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 7963⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 9683⤵
- Program crash
PID:3300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 9763⤵
- Program crash
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 9843⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 12203⤵
- Program crash
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 12083⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 13163⤵
- Program crash
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 6924⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 8164⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 8684⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 10524⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 10724⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 10524⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 11324⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 9924⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13004⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13164⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13404⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13244⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13524⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 11044⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 16164⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 15884⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 16324⤵
- Program crash
PID:2512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 17243⤵
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2704 -ip 27041⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 468 -ip 4681⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 468 -ip 4681⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 468 -ip 4681⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 468 -ip 4681⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 468 -ip 4681⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 468 -ip 4681⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 468 -ip 4681⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 468 -ip 4681⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 468 -ip 4681⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 468 -ip 4681⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1820 -ip 18201⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 1820 -ip 18201⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1820 -ip 18201⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1820 -ip 18201⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1820 -ip 18201⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1820 -ip 18201⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1820 -ip 18201⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1820 -ip 18201⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1820 -ip 18201⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1820 -ip 18201⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1820 -ip 18201⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1820 -ip 18201⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1820 -ip 18201⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 3162⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4340 -ip 43401⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1820 -ip 18201⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1820 -ip 18201⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1820 -ip 18201⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 3162⤵
- Program crash
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3864 -ip 38641⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1820 -ip 18201⤵PID:3040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
420KB
MD5a019f7a0740d81ae700311ab5dd330b8
SHA1809c02787a407f512daf16e289e18885e4d17dda
SHA25636bda6715705061895b3cdf2b4168003f93d0c1492ad58449a2b5bb48217d322
SHA5123b32c8cfb7c03483d5ef8d4f16a127f76c422c7cd34bc2f504f84afc8161af2637553445044e4886e9f1519c52fa7c68652b2c4ccc5913e22271928aea6d0a21
-
Filesize
420KB
MD5a019f7a0740d81ae700311ab5dd330b8
SHA1809c02787a407f512daf16e289e18885e4d17dda
SHA25636bda6715705061895b3cdf2b4168003f93d0c1492ad58449a2b5bb48217d322
SHA5123b32c8cfb7c03483d5ef8d4f16a127f76c422c7cd34bc2f504f84afc8161af2637553445044e4886e9f1519c52fa7c68652b2c4ccc5913e22271928aea6d0a21
-
Filesize
136KB
MD59c5958557ccffc32c7e2d7d8ad8e75a4
SHA1d2345ed34d170c85447369c5cae4b2fd540004c8
SHA256cdb1773d4e7c32072097566339d7edcd1416c3f3995a50972852b80ecee4dc5a
SHA512907a7ffbe3c8b71df130b38d9506765aa6d2bf897833f55534d4fadda32cec57c84297d946ad13c06636b6cbaa65aa9536c22e589e7cecb5a9147bf130839274
-
Filesize
136KB
MD59c5958557ccffc32c7e2d7d8ad8e75a4
SHA1d2345ed34d170c85447369c5cae4b2fd540004c8
SHA256cdb1773d4e7c32072097566339d7edcd1416c3f3995a50972852b80ecee4dc5a
SHA512907a7ffbe3c8b71df130b38d9506765aa6d2bf897833f55534d4fadda32cec57c84297d946ad13c06636b6cbaa65aa9536c22e589e7cecb5a9147bf130839274
-
Filesize
371KB
MD56275d44f57c2581401524d3ecf5db54f
SHA15b1df92c04af74ad39436eab49802436f173a999
SHA256ddbec099c14609325335a7da53e993751e0d970975e68fd03b5b076ac5ff00d9
SHA5122ae9a55faa799913c7c50d7771a0a0035148b9e4a8116c349666303940f20100dc6e006ba51b5bc6be31485fbd62dc3ca5d698ddde94c2d0b048407ea80a6f68
-
Filesize
371KB
MD56275d44f57c2581401524d3ecf5db54f
SHA15b1df92c04af74ad39436eab49802436f173a999
SHA256ddbec099c14609325335a7da53e993751e0d970975e68fd03b5b076ac5ff00d9
SHA5122ae9a55faa799913c7c50d7771a0a0035148b9e4a8116c349666303940f20100dc6e006ba51b5bc6be31485fbd62dc3ca5d698ddde94c2d0b048407ea80a6f68
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
340KB
MD540ef074f0a4afb5cfe424a03dde95bf2
SHA1ef049c1893984a3cbda1c6192c478866047d5068
SHA25652a8b1686ca32fa154c2c457474a5a812a6b3b5d090c981a64e017a3ac80a9ba
SHA5128b5793bf75843f721f8f0ddf96c4d1eb6f1277f753d71344fd64d3eb95701af826664b98cdc0e285a8843f74843173ab3500db81eb523c86fcc827aa3b7ba3b5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5