Analysis
-
max time kernel
59s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 17:02
General
-
Target
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe
-
Size
6.8MB
-
MD5
4fcd70f4d036361d2fef09cf03932f7b
-
SHA1
b8c39838498676d95a267e8f9ee2bb59edb8e76e
-
SHA256
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67
-
SHA512
3bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab
-
SSDEEP
98304:TBWqiL18HkxPnA8n+wuxT4NqP2ozzv68ZslF8QLkY52P:9RiSk9pnNuiiXi8mF7LkY52P
Malware Config
Extracted
amadey
3.80
45.15.156.208/jd9dd3Vw/index.php
second.amadgood.com/jd9dd3Vw/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2236-191-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/3060-199-0x0000000000E00000-0x0000000000EE4000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oneetx.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oneetx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oneetx.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
Processes:
oneetx.exefoxtaskhost.exeoneetx.exepid Process 1400 oneetx.exe 3060 foxtaskhost.exe 4160 oneetx.exe -
Processes:
resource yara_rule behavioral1/memory/2592-133-0x00000000006C0000-0x0000000000DB6000-memory.dmp themida behavioral1/memory/2592-138-0x00000000006C0000-0x0000000000DB6000-memory.dmp themida behavioral1/memory/2592-139-0x00000000006C0000-0x0000000000DB6000-memory.dmp themida behavioral1/memory/2592-140-0x00000000006C0000-0x0000000000DB6000-memory.dmp themida behavioral1/memory/2592-141-0x00000000006C0000-0x0000000000DB6000-memory.dmp themida behavioral1/files/0x00070000000231cf-146.dat themida behavioral1/files/0x00070000000231cf-150.dat themida behavioral1/memory/1400-152-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/memory/2592-151-0x00000000006C0000-0x0000000000DB6000-memory.dmp themida behavioral1/memory/1400-156-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/memory/1400-157-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/memory/1400-158-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/memory/1400-159-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/files/0x00070000000231cf-160.dat themida behavioral1/memory/1400-188-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/memory/1400-190-0x0000000000A20000-0x0000000001116000-memory.dmp themida behavioral1/files/0x00070000000231cf-222.dat themida behavioral1/memory/4160-223-0x0000000000A20000-0x0000000001116000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oneetx.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.exepid Process 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe 1400 oneetx.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
foxtaskhost.exedescription pid Process procid_target PID 3060 set thread context of 2236 3060 foxtaskhost.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3276 3060 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.exeAppLaunch.exepid Process 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe 1400 oneetx.exe 1400 oneetx.exe 2236 AppLaunch.exe 2236 AppLaunch.exe 2236 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid Process Token: SeDebugPrivilege 2236 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exepid Process 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exeoneetx.execmd.exefoxtaskhost.exedescription pid Process procid_target PID 2592 wrote to memory of 1400 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe 85 PID 2592 wrote to memory of 1400 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe 85 PID 2592 wrote to memory of 1400 2592 bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe 85 PID 1400 wrote to memory of 2256 1400 oneetx.exe 89 PID 1400 wrote to memory of 2256 1400 oneetx.exe 89 PID 1400 wrote to memory of 2256 1400 oneetx.exe 89 PID 1400 wrote to memory of 2344 1400 oneetx.exe 91 PID 1400 wrote to memory of 2344 1400 oneetx.exe 91 PID 1400 wrote to memory of 2344 1400 oneetx.exe 91 PID 2344 wrote to memory of 916 2344 cmd.exe 93 PID 2344 wrote to memory of 916 2344 cmd.exe 93 PID 2344 wrote to memory of 916 2344 cmd.exe 93 PID 2344 wrote to memory of 4196 2344 cmd.exe 94 PID 2344 wrote to memory of 4196 2344 cmd.exe 94 PID 2344 wrote to memory of 4196 2344 cmd.exe 94 PID 2344 wrote to memory of 4144 2344 cmd.exe 95 PID 2344 wrote to memory of 4144 2344 cmd.exe 95 PID 2344 wrote to memory of 4144 2344 cmd.exe 95 PID 2344 wrote to memory of 3424 2344 cmd.exe 97 PID 2344 wrote to memory of 3424 2344 cmd.exe 97 PID 2344 wrote to memory of 3424 2344 cmd.exe 97 PID 2344 wrote to memory of 3404 2344 cmd.exe 98 PID 2344 wrote to memory of 3404 2344 cmd.exe 98 PID 2344 wrote to memory of 3404 2344 cmd.exe 98 PID 2344 wrote to memory of 4512 2344 cmd.exe 99 PID 2344 wrote to memory of 4512 2344 cmd.exe 99 PID 2344 wrote to memory of 4512 2344 cmd.exe 99 PID 1400 wrote to memory of 3060 1400 oneetx.exe 104 PID 1400 wrote to memory of 3060 1400 oneetx.exe 104 PID 1400 wrote to memory of 3060 1400 oneetx.exe 104 PID 3060 wrote to memory of 2236 3060 foxtaskhost.exe 105 PID 3060 wrote to memory of 2236 3060 foxtaskhost.exe 105 PID 3060 wrote to memory of 2236 3060 foxtaskhost.exe 105 PID 3060 wrote to memory of 2236 3060 foxtaskhost.exe 105 PID 3060 wrote to memory of 2236 3060 foxtaskhost.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe"C:\Users\Admin\AppData\Local\Temp\bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:2256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:4196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:4144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"4⤵PID:3404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E4⤵PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000117001\foxtaskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000117001\foxtaskhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1484⤵
- Program crash
PID:3276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3060 -ip 30601⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5e2c5529ffe6daad5131f78fa9d1dc097
SHA1e4cbc78979afee670381e58c16c4c10147fe0bde
SHA2564cb1e80a0a189fbbe6287df238cb360143cfb3b530d67e458947bfa667e42d92
SHA512fc9e8172cfc6e860f16a3f482bc5f45ef1ed8416199bf4b6caab0fce55bbdf5d7a19a9165900a40fd2975b157a6f4d53d808ee87632f97e5d944facdd7f66a4b
-
Filesize
896KB
MD5e2c5529ffe6daad5131f78fa9d1dc097
SHA1e4cbc78979afee670381e58c16c4c10147fe0bde
SHA2564cb1e80a0a189fbbe6287df238cb360143cfb3b530d67e458947bfa667e42d92
SHA512fc9e8172cfc6e860f16a3f482bc5f45ef1ed8416199bf4b6caab0fce55bbdf5d7a19a9165900a40fd2975b157a6f4d53d808ee87632f97e5d944facdd7f66a4b
-
Filesize
896KB
MD5e2c5529ffe6daad5131f78fa9d1dc097
SHA1e4cbc78979afee670381e58c16c4c10147fe0bde
SHA2564cb1e80a0a189fbbe6287df238cb360143cfb3b530d67e458947bfa667e42d92
SHA512fc9e8172cfc6e860f16a3f482bc5f45ef1ed8416199bf4b6caab0fce55bbdf5d7a19a9165900a40fd2975b157a6f4d53d808ee87632f97e5d944facdd7f66a4b
-
Filesize
81KB
MD54ceca2af9fd0079e2adc828f3c8d8308
SHA14f88faf5eb8df3f13fc5ef9729fe2225976f3dfd
SHA256c61d6e59657f10e2244f95a66ac762847ecf2ffe576b060f6b57ca7296a6906a
SHA5126368c59dc3c9b6ffb2f9add509c6f77b3818e741150e7fabde5c2fa9f9d93d0f3d2d9c507921dd643f4093920ae53a5d29db08f0ce7c5ee60117f55f2787daa3
-
Filesize
6.8MB
MD54fcd70f4d036361d2fef09cf03932f7b
SHA1b8c39838498676d95a267e8f9ee2bb59edb8e76e
SHA256bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67
SHA5123bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab
-
Filesize
6.8MB
MD54fcd70f4d036361d2fef09cf03932f7b
SHA1b8c39838498676d95a267e8f9ee2bb59edb8e76e
SHA256bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67
SHA5123bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab
-
Filesize
6.8MB
MD54fcd70f4d036361d2fef09cf03932f7b
SHA1b8c39838498676d95a267e8f9ee2bb59edb8e76e
SHA256bfe406b543ca148c2ef6424a32682fbd540810078d52c6f0af8f0edb5951cd67
SHA5123bec3c60d903a348712a179bb96cc20ca868abda2019077279877f40b877b2f127b2a60704f276c23fec4da58a5bff78638ca228dfc79726d6afe048120eb9ab
-
Filesize
2.6MB
MD5d82339808f9f960b734400f81ffd4577
SHA15212149d817068ea3f57a345d370e347c4d8dc77
SHA256e67fac4725c0acc8b674b2f07405ebce68e39a06362e18e243c3e35a51c482bf
SHA51245941025cbb0ca72cb4100b60d383b30ac35c5cfafb4e2fc2cd51226d454d5146245c878829ec7737b674bbb0690096ed2a1e293e8e60839881d397ef95a11fd