Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe
Resource
win7-20240903-en
General
-
Target
3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe
-
Size
256KB
-
MD5
e5c840e85060fa46fb9b4f93e3b53bf5
-
SHA1
3f9de43f5d905a17aab72ce383af62fb573eea04
-
SHA256
3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62
-
SHA512
35470ccb36fbaf1191be5b525be5ff1e5fc01ff0b97aa6a90253b50bee6865b940f53138da8ed5ca14a75d9ee02ff42a59c562769593de482a3000cdfdb2be5d
-
SSDEEP
6144:bZkFRbXfb7wzY1FJRRBx5oUsWW5W8g4/ve7:bZcpXGY1FJRTtsWWj
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oneetx.exe3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe -
Executes dropped EXE 4 IoCs
Processes:
oneetx.exeoneetx.exeoneetx.exeoneetx.exepid process 264 oneetx.exe 1280 oneetx.exe 1080 oneetx.exe 832 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4932 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 232 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 3448 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 3096 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 3108 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 3760 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 2496 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 3812 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 2188 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 3992 1628 WerFault.exe 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe 4728 264 WerFault.exe oneetx.exe 540 264 WerFault.exe oneetx.exe 4920 264 WerFault.exe oneetx.exe 2280 264 WerFault.exe oneetx.exe 468 264 WerFault.exe oneetx.exe 4832 264 WerFault.exe oneetx.exe 1744 264 WerFault.exe oneetx.exe 3660 264 WerFault.exe oneetx.exe 4136 264 WerFault.exe oneetx.exe 1592 264 WerFault.exe oneetx.exe 2892 264 WerFault.exe oneetx.exe 4860 264 WerFault.exe oneetx.exe 4848 264 WerFault.exe oneetx.exe 2568 264 WerFault.exe oneetx.exe 2072 1280 WerFault.exe oneetx.exe 3056 264 WerFault.exe oneetx.exe 3012 1080 WerFault.exe oneetx.exe 3984 264 WerFault.exe oneetx.exe 3008 264 WerFault.exe oneetx.exe 2228 264 WerFault.exe oneetx.exe 2500 832 WerFault.exe oneetx.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cacls.execacls.exe3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exeoneetx.execmd.execacls.execacls.exeschtasks.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exepid process 1628 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exeoneetx.execmd.exedescription pid process target process PID 1628 wrote to memory of 264 1628 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe oneetx.exe PID 1628 wrote to memory of 264 1628 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe oneetx.exe PID 1628 wrote to memory of 264 1628 3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe oneetx.exe PID 264 wrote to memory of 1636 264 oneetx.exe schtasks.exe PID 264 wrote to memory of 1636 264 oneetx.exe schtasks.exe PID 264 wrote to memory of 1636 264 oneetx.exe schtasks.exe PID 264 wrote to memory of 3132 264 oneetx.exe cmd.exe PID 264 wrote to memory of 3132 264 oneetx.exe cmd.exe PID 264 wrote to memory of 3132 264 oneetx.exe cmd.exe PID 3132 wrote to memory of 2780 3132 cmd.exe cmd.exe PID 3132 wrote to memory of 2780 3132 cmd.exe cmd.exe PID 3132 wrote to memory of 2780 3132 cmd.exe cmd.exe PID 3132 wrote to memory of 3644 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 3644 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 3644 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 3560 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 3560 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 3560 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 1828 3132 cmd.exe cmd.exe PID 3132 wrote to memory of 1828 3132 cmd.exe cmd.exe PID 3132 wrote to memory of 1828 3132 cmd.exe cmd.exe PID 3132 wrote to memory of 1112 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 1112 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 1112 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 5104 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 5104 3132 cmd.exe cacls.exe PID 3132 wrote to memory of 5104 3132 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe"C:\Users\Admin\AppData\Local\Temp\3807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 5602⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 6522⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 7202⤵
- Program crash
PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8162⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8522⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8522⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 10962⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 11002⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 12402⤵
- Program crash
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 5843⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 7923⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 8363⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 9803⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 9843⤵
- Program crash
PID:468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 10283⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 10563⤵
- Program crash
PID:1744
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 9043⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 6083⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 7803⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 6563⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 12243⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 12323⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 13163⤵
- Program crash
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 10323⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 12963⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 13043⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 14603⤵
- Program crash
PID:2228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 11442⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1628 -ip 16281⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1628 -ip 16281⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1628 -ip 16281⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1628 -ip 16281⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1628 -ip 16281⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1628 -ip 16281⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1628 -ip 16281⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1628 -ip 16281⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1628 -ip 16281⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1628 -ip 16281⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 264 -ip 2641⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 264 -ip 2641⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 264 -ip 2641⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 264 -ip 2641⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 264 -ip 2641⤵PID:664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 264 -ip 2641⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 264 -ip 2641⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 264 -ip 2641⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 264 -ip 2641⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 264 -ip 2641⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 264 -ip 2641⤵PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 264 -ip 2641⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 264 -ip 2641⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 264 -ip 2641⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 3202⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 1280 -ip 12801⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 264 -ip 2641⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 3162⤵
- Program crash
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1080 -ip 10801⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 264 -ip 2641⤵PID:320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 264 -ip 2641⤵PID:332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 264 -ip 2641⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 2162⤵
- Program crash
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 832 -ip 8321⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5e5c840e85060fa46fb9b4f93e3b53bf5
SHA13f9de43f5d905a17aab72ce383af62fb573eea04
SHA2563807e96ad43d3cf2ab0e6d4abb21cf178287e1add4ea594d5b2e27c71c5d8a62
SHA51235470ccb36fbaf1191be5b525be5ff1e5fc01ff0b97aa6a90253b50bee6865b940f53138da8ed5ca14a75d9ee02ff42a59c562769593de482a3000cdfdb2be5d