Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 14:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://telegra.ph/Description-02-12
Resource
win10v2004-20230220-en
General
-
Target
https://telegra.ph/Description-02-12
Malware Config
Extracted
amadey
3.69
77.91.78.118/u83mfdS2/index.php
Extracted
redline
135.181.10.136:4328
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 oneetx.exe -
resource yara_rule behavioral1/files/0x0006000000023525-499.dat upx behavioral1/files/0x0006000000023525-514.dat upx behavioral1/files/0x0006000000023525-515.dat upx behavioral1/memory/3340-520-0x0000000000AB0000-0x000000000190E000-memory.dmp upx behavioral1/memory/3340-548-0x0000000000AB0000-0x000000000190E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1808 Latest.Version.Soft.x64_x32.exe 3000 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3772 schtasks.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d3273793ae45d901 iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcaa0818676b32439c68e7e776db84a7000000000200000000001066000000010000200000006e950dfa2955ecfbff215b2a7fdc793bea2b19273da758abe6bb2a594459117c000000000e8000000002000020000000302c83a479130c799c7d42fae2d90ef64ea0af873fcaff72c497de22029853f920000000820f7a98bad2cb7d06f660bf107910819c0058ec25f718513c05f33ec7d76c8440000000caf4bc3969bfbc93f6267015923133993db78383232279929957767982a1b81d22fe29896fd1397e1c6d117637183f04c57fd8aa39a87bbc639a919139dd5f3b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034570" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "51" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mediafire.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mediafire.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.mediafire.com\ = "51" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.mediafire.com\ = "769" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034570" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.mediafire.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{32DBDC27-F8BD-11ED-9F77-5A0CB913B9C1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "124496258" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108bc30aca8cd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mediafire.com\Total = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "769" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31034570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.mediafire.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{5C408D2B-7082-4EEA-B6B7-7CA3F92526D8}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mediafire.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mediafire.com\Total = "111" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391537676" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\DOMStorage\mediafire.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "111" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "132152658" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcaa0818676b32439c68e7e776db84a7000000000200000000001066000000010000200000002201860d5067def10835cafb3f210c0654325870245b639c996c21526574ebb8000000000e8000000002000020000000112f0ebd8c31baafadded74a08c87b590dadd99cc019419a5d625fa0eb486c9a20000000b8e0d0f68f037affcf46d8811e7e9c330a7ac87ac440f8b795f15c501d8524754000000024717c36181d746370312f721c8d7b10ec0653be57dc59923653e37226234a599e6ea7d92586dd30fe8c1e29220816cf9597f09edf6154900859a7fe439955e8 iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1808 Latest.Version.Soft.x64_x32.exe 1808 Latest.Version.Soft.x64_x32.exe 3000 oneetx.exe 3000 oneetx.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 1808 Latest.Version.Soft.x64_x32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 412 IEXPLORE.EXE 412 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE 4344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2072 wrote to memory of 412 2072 iexplore.exe 83 PID 2072 wrote to memory of 412 2072 iexplore.exe 83 PID 2072 wrote to memory of 412 2072 iexplore.exe 83 PID 2072 wrote to memory of 4344 2072 iexplore.exe 85 PID 2072 wrote to memory of 4344 2072 iexplore.exe 85 PID 2072 wrote to memory of 4344 2072 iexplore.exe 85 PID 1808 wrote to memory of 3000 1808 Latest.Version.Soft.x64_x32.exe 97 PID 1808 wrote to memory of 3000 1808 Latest.Version.Soft.x64_x32.exe 97 PID 1808 wrote to memory of 3000 1808 Latest.Version.Soft.x64_x32.exe 97 PID 3000 wrote to memory of 3772 3000 oneetx.exe 98 PID 3000 wrote to memory of 3772 3000 oneetx.exe 98 PID 3000 wrote to memory of 3772 3000 oneetx.exe 98 PID 3000 wrote to memory of 2988 3000 oneetx.exe 101 PID 3000 wrote to memory of 2988 3000 oneetx.exe 101 PID 3000 wrote to memory of 2988 3000 oneetx.exe 101 PID 2988 wrote to memory of 2176 2988 cmd.exe 102 PID 2988 wrote to memory of 2176 2988 cmd.exe 102 PID 2988 wrote to memory of 2176 2988 cmd.exe 102 PID 2988 wrote to memory of 4472 2988 cmd.exe 103 PID 2988 wrote to memory of 4472 2988 cmd.exe 103 PID 2988 wrote to memory of 4472 2988 cmd.exe 103 PID 2988 wrote to memory of 2440 2988 cmd.exe 104 PID 2988 wrote to memory of 2440 2988 cmd.exe 104 PID 2988 wrote to memory of 2440 2988 cmd.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://telegra.ph/Description-02-121⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:412
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:17412 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1892
-
C:\Users\Admin\Documents\Latest.Version.Soft.x64_x32\Latest.Version.Soft.x64_x32.exe"C:\Users\Admin\Documents\Latest.Version.Soft.x64_x32\Latest.Version.Soft.x64_x32.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:3772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb256e24ee" /P "Admin:N"&&CACLS "..\eb256e24ee" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:4472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:2440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb256e24ee" /P "Admin:N"4⤵PID:4000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb256e24ee" /P "Admin:R" /E4⤵PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000075001\main.exe"C:\Users\Admin\AppData\Local\Temp\1000075001\main.exe"3⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\1000102001\DefendUpdate.exe"C:\Users\Admin\AppData\Local\Temp\1000102001\DefendUpdate.exe"3⤵PID:3340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1000102001\DefendUpdate.exe4⤵PID:3492
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵PID:2704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000106001\ChromeFIX_error.exe"C:\Users\Admin\AppData\Local\Temp\1000106001\ChromeFIX_error.exe"3⤵PID:3336
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵PID:3288
-
-
-
C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe"3⤵PID:724
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵PID:4892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe1⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe1⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb256e24ee\oneetx.exe1⤵PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5931ac31f82e01c4a5ed27d29ed4ac208
SHA13c0e857f02516e94d3086ec277790e5c2c4bebf4
SHA25625f80b41222c619107eebc45f57f927f46cdd4fc8370183857e6893015437a60
SHA512a21065c11a9054ae76793859dad589aff47cb98ed0557bdb334ef1c216038635c3b5841406a21969af77775334e316989f29195beb415f7fdd409f53b6589ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD505051d26269450bce8a34fbb41449210
SHA1409c3333ee28c68c159314d5b3fee96898713b5f
SHA2563e02c4695784ef9968c196900034e12459be565566414427aecf18ab82b8f6f1
SHA5120653e1a9d524365c8bea900c8687ef77454a36114d8d5abbe7d1b401d43f8a294af07d3113076ae15ceb1cf44034ca0b25f249edbdb22798504ae563b8d7a29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_8040D204022B02A46D7779A3347947E3
Filesize410B
MD51dd39359d028b49c5e304eb11e06c91b
SHA14c3d5f6edf2c8e4f7bc668f593688670246772f9
SHA256cb1b74cc645ad6cc9953baf221606c05e3bfe8eccaa691a8163e006eecb4cefa
SHA5120f6535f3c2f74d238e3c16b9e6211fba59c5a2d24b3c60fb2c52d643044cb127f944a98c2444f7dde6130a5be6f07a2b4204f5fb6c4b4774cd6bbd1d9aaa89ce
-
Filesize
2KB
MD597666365f5a60c0019db21bea991eec0
SHA10d348c08d1a58f6e3bb6c62b60cb6e968cafbf78
SHA2560fd5cabf357b48d0cfa6c24dfc5ed92fffeae10f4cbb970ec63d806bd5c3f243
SHA512007524ebc2e430e75bc56111069c72ee3f32bb67fcd7ac36cf9cd0fcfe422f0ec76df6f2350a64cf3da4b194fd9ae40369705711faa52b27d385c536ba0d22cb
-
Filesize
1KB
MD55ebd98a8e05a91161f2844d9c9f3a367
SHA1decedb0fc601bb70f5b8a49559a84948ecfbc9b2
SHA2561f0f2819850c79bc4e216f58a5e8a4d3c963d6e2c2fdc712676753a625aff2ef
SHA512b4f093aa9637777c1e248083d333dc1b5d74e7658bed3ae7db670dd1e752e75b8d984ab613c92e7a67bac4f567e30578574b55b57741ffd82e97f754d0cfc4e6
-
Filesize
290B
MD577d0d976cef6831a73dec15a0e1adde9
SHA11f480282caa55b570b8015017501858d2ea3c590
SHA256ec5edd82d42b67ddb462b627bf181dcf4ad34e439de5e78b60473db436660e3e
SHA51205ceae1cb426e3232888c8562d449bd019408693de9717b75185699ac503730423c7dcd923b5c549a79642364f533738a3494e772434a7de22a6b44e21f15948
-
Filesize
166B
MD591169aa7638bd8b8d898dadc4d0d0dd9
SHA1817e5c6bb48ea41ac6eb061c70ab1e895f294239
SHA2562f2f4f03b4f5bacdde4c08482b99d0a4e418c280c6c1ada8c724b3a48e24609f
SHA512bdef44ce6ab197f022b75534fe40a9a40a29cc451523dd0f2d134740726ee0f9f87d5ec363d49c279e5e56c19fd70d944e84d21f07315e4cd2babd71581e7c7c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S1Q31HZS\Latest.Version.Soft.x64_x32.zip.dvt93c7.partial
Filesize78.1MB
MD5b20a3f86fdfd6be1228c31e94db8ef53
SHA15368245dbedf5d95e8aa73373c1f2a8af07ff0e8
SHA25623650c5323de25cb9e61274e81837ee13d318076c6147cc97dd39082c9da7ccd
SHA512f0a516852004436e51172870a1c8ac39c8562ab686c137a9f0b6f3baadf8f354428fc563daad864d5c4fefb94e9baa6468927229637034e9c89c88fdf16d99de
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
7.6MB
MD53dea4e5a5f0b4ba715cb7b3332fb9e8c
SHA1668efe4177c97da416890969429152757140dc6a
SHA2567819e8b66bbd678d9898a39630c5cb94e1d63b3ffe46b7cf0e9d4477e7ebc9a8
SHA512ca62b3abac3a81b29137ba569316a4f609957129b87e0a1a08c4608abe9dedf458d2921a136aa4275d5e8d6f5c80a798d0acacfa5dbda4c656fbd8f6b15a0b63
-
Filesize
7.6MB
MD53dea4e5a5f0b4ba715cb7b3332fb9e8c
SHA1668efe4177c97da416890969429152757140dc6a
SHA2567819e8b66bbd678d9898a39630c5cb94e1d63b3ffe46b7cf0e9d4477e7ebc9a8
SHA512ca62b3abac3a81b29137ba569316a4f609957129b87e0a1a08c4608abe9dedf458d2921a136aa4275d5e8d6f5c80a798d0acacfa5dbda4c656fbd8f6b15a0b63
-
Filesize
7.6MB
MD53dea4e5a5f0b4ba715cb7b3332fb9e8c
SHA1668efe4177c97da416890969429152757140dc6a
SHA2567819e8b66bbd678d9898a39630c5cb94e1d63b3ffe46b7cf0e9d4477e7ebc9a8
SHA512ca62b3abac3a81b29137ba569316a4f609957129b87e0a1a08c4608abe9dedf458d2921a136aa4275d5e8d6f5c80a798d0acacfa5dbda4c656fbd8f6b15a0b63
-
Filesize
4.3MB
MD51637e97761036cc0992304cff3aec344
SHA1e5a19f22ddf13c1bc2b103b353eb77deb67ed924
SHA256f40ff1304f4a39bf994c964b87ec1554c653b263be73afedfd6ed437c8c5c9dc
SHA512c4a19a7ad2eb9d31c6b85ff596c778adfeb39b54a3d39572025b31213f3f36eadc8038b14956ad01b2b36e723a8c3671f63a7a79ef69812c9b33fb5a4e79680a
-
Filesize
4.3MB
MD51637e97761036cc0992304cff3aec344
SHA1e5a19f22ddf13c1bc2b103b353eb77deb67ed924
SHA256f40ff1304f4a39bf994c964b87ec1554c653b263be73afedfd6ed437c8c5c9dc
SHA512c4a19a7ad2eb9d31c6b85ff596c778adfeb39b54a3d39572025b31213f3f36eadc8038b14956ad01b2b36e723a8c3671f63a7a79ef69812c9b33fb5a4e79680a
-
Filesize
4.3MB
MD51637e97761036cc0992304cff3aec344
SHA1e5a19f22ddf13c1bc2b103b353eb77deb67ed924
SHA256f40ff1304f4a39bf994c964b87ec1554c653b263be73afedfd6ed437c8c5c9dc
SHA512c4a19a7ad2eb9d31c6b85ff596c778adfeb39b54a3d39572025b31213f3f36eadc8038b14956ad01b2b36e723a8c3671f63a7a79ef69812c9b33fb5a4e79680a
-
Filesize
300KB
MD55e027102e79fdb1e415c3ff1dfd94a3f
SHA1f33957110dce45000c392b51b74f8f6bc2619670
SHA2567a49517893f2edf2d37ba5515e37818aaf40b42cf176169978398856654ff30f
SHA5121d1ebf2d8e20e5495f718b4b455c248ed2e7fd9fc72192e588c7810447c795029c8b02c88e2084cf56879d09a1693bc6f6e49eeb8d655ec999efc6d3406a393a
-
Filesize
300KB
MD55e027102e79fdb1e415c3ff1dfd94a3f
SHA1f33957110dce45000c392b51b74f8f6bc2619670
SHA2567a49517893f2edf2d37ba5515e37818aaf40b42cf176169978398856654ff30f
SHA5121d1ebf2d8e20e5495f718b4b455c248ed2e7fd9fc72192e588c7810447c795029c8b02c88e2084cf56879d09a1693bc6f6e49eeb8d655ec999efc6d3406a393a
-
Filesize
300KB
MD55e027102e79fdb1e415c3ff1dfd94a3f
SHA1f33957110dce45000c392b51b74f8f6bc2619670
SHA2567a49517893f2edf2d37ba5515e37818aaf40b42cf176169978398856654ff30f
SHA5121d1ebf2d8e20e5495f718b4b455c248ed2e7fd9fc72192e588c7810447c795029c8b02c88e2084cf56879d09a1693bc6f6e49eeb8d655ec999efc6d3406a393a
-
Filesize
74KB
MD52eec0bf47d82f80f8b13689ec0e772aa
SHA1d84aa9de03da912253d6c30f07481d79e22095c7
SHA256360cae4ed3f7f486a19caf284fbad627e28212b6a5c9b869470ad527cb50be4a
SHA5127c82fcef418dda396f514fd0192b3214570eae54af7410a8de9715eadd51ec00ce03571e987650337539195b910c3d6193c3d7743fc607fba5de30e3cc5c57de
-
Filesize
653.6MB
MD5e1e0ba196b977f5ef76158e588a66530
SHA13c23d5343537fd6ba4e2bc0c2b686ceb2366a306
SHA2561c0baddc31a8bd74103dad33ea9a9e0c2318daea4bcf462457456d69fa235992
SHA512c33ee1baac8581b0402b95ee4d16d97d848afe6020eade40929b0b0e56ba7d1943e56447355f8633847c41455c4edf3dc21becc807a6fc4b3aa69e72f3e3b2aa
-
Filesize
500.4MB
MD5dc5d1920ea6e2d659f88d0c559cc4ed0
SHA10f4a07c35f856517a73b1490d60a499542f93976
SHA256b3c90dfd58d70e048784c9443207fb810181a6510bd20e86b3d9e999b2a7b2f0
SHA512f67fe99b78f7313b02c1773f55b6443bab70de8a10fae9019b8eaaf7eef676041e7f98b77b40c552120bc094afdb5d97c4ea200d3b9638f9fe649a42535a67a6
-
Filesize
478.4MB
MD50e7eb7426e9e499b8b3e953aaabd1e20
SHA1ff09303b8a47764d1f1b009622b6abea30279361
SHA2568ef1fdb487914b40912737f4fa730de5a6cfac98d0b1160de3c1d5b1846ce420
SHA512e2637531e1fa4ca57d2aa48a0dc4a399a9a38eb606973d52ca67a87baad5bf3a98fe61a74ba0681cf3b4b9b80cf148f34ec6936b0fb8c32923412f5eb7e598c6
-
Filesize
342.3MB
MD541e1e11e53dcfedd9c9fb41a7e4fd0f3
SHA1af12c445df13be5b3a7de9173e5bb7d3f0d6bb97
SHA25619a411cb18353ff7cbaf251a436405a075a70395e51282bd535045985ff763c7
SHA5127c0d1ccd3b06256ed64e1df28552330d68587cd50c83f8dc5302a6dc99b5f12c36d92d2d303860269f4439009de25c661b7caabebf358be7331ce0f2a413583b
-
Filesize
281.2MB
MD5270ea44669eca49b2b07af9a2266e06e
SHA144c6c170fc99c35ec64ec35b7bb20fb3160d87f4
SHA25664b86941dca0d8b967cd9bcfd46200d30d3fd6f6f72ef19d06c4c6bcd83a72f2
SHA512579791cb8b380e0d6cfae4fc58088cc96d43de571504492728bb3b6747050616977c25d78c214950631c3b516bb2271673985dd1fd7078940af18f7a7409671c
-
Filesize
132.9MB
MD5c0459faa8832bdf64a4275a2e0453a46
SHA19cb29b711de492ddcf24769150616c36647cbf75
SHA256be5a9073874262402219a737080e97ee4f59d73a9381109968c1b9736d62390c
SHA5120c327f2cd01a346a4f872dd7f9b8a09b9864b0fe963167f0d21b9b443fa583a33f9aa35fbab2386552d1bd6d4c6f4f756ec2c4cfeb28b9a59984b4c024cca828
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5