Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe
-
Size
1.5MB
-
MD5
beae0b845f4357820704d8800a3294f7
-
SHA1
abb4e710bc8d674613b2e977289ca885ddadbd72
-
SHA256
9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74
-
SHA512
ba95e92fb9427e91eca4d86bfbc15bee07ebd484da6a70dbaa78c494f4a3bd1e483bd1567cb03c13819b37d3448a5765648ad3f5b66befe9333890632bf572d5
-
SSDEEP
24576:4q8CJ6U4bS0tjYRRYzql9qtJktklrxtGil9izAQsrJNO2ER92EvPrku1Hg:X8CJX0QGI9qHAG1zEsGx9/vPF1Hg
Malware Config
Extracted
redline
smokiez_build
194.169.175.232:45450
-
auth_value
2e68bc276986767f0f14a3d75567abcd
Extracted
redline
tuco
77.91.124.82:19071
-
auth_value
dcfeb759bae9232de006fc3a4b34ac53
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1056-39-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4756-135-0x0000000000CA0000-0x0000000000E2E000-memory.dmp family_redline behavioral2/memory/2072-136-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral2/memory/4756-141-0x0000000000CA0000-0x0000000000E2E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
C4B3.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Control Panel\International\Geo\Nation C4B3.exe Key value queried \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 16 IoCs
Processes:
v4067263.exev8476839.exev3804595.exev9649724.exea5239789.exeb1003030.exec6035641.exed9391195.exee2507304.exef2299375.exefaejgddC0DA.exeC4B3.exeC65A.exeoneetx.exeoneetx.exepid process 2944 v4067263.exe 3900 v8476839.exe 1500 v3804595.exe 4232 v9649724.exe 2232 a5239789.exe 3776 b1003030.exe 2344 c6035641.exe 4892 d9391195.exe 4796 e2507304.exe 644 f2299375.exe 4472 faejgdd 4756 C0DA.exe 3508 C4B3.exe 3600 C65A.exe 2848 oneetx.exe 4752 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
AppLaunch.exev4067263.exev8476839.exev3804595.exev9649724.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4067263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8476839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3804595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9649724.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 6 IoCs
Processes:
9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exea5239789.exeb1003030.exed9391195.exef2299375.exeC0DA.exedescription pid process target process PID 3332 set thread context of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 2232 set thread context of 1056 2232 a5239789.exe AppLaunch.exe PID 3776 set thread context of 1664 3776 b1003030.exe AppLaunch.exe PID 4892 set thread context of 876 4892 d9391195.exe AppLaunch.exe PID 644 set thread context of 1896 644 f2299375.exe AppLaunch.exe PID 4756 set thread context of 2072 4756 C0DA.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2572 3332 WerFault.exe 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe 3044 2232 WerFault.exe a5239789.exe 2940 3776 WerFault.exe b1003030.exe 1124 1664 WerFault.exe AppLaunch.exe 4120 2344 WerFault.exe c6035641.exe 3664 4892 WerFault.exe d9391195.exe 944 644 WerFault.exe f2299375.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeAppLaunch.exepid process 1056 AppLaunch.exe 1056 AppLaunch.exe 1056 AppLaunch.exe 392 AppLaunch.exe 392 AppLaunch.exe 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 3136 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3136 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 392 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
Processes:
AppLaunch.exeAppLaunch.exevbc.exeC65A.exedescription pid process Token: SeDebugPrivilege 1056 AppLaunch.exe Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeDebugPrivilege 876 AppLaunch.exe Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeDebugPrivilege 2072 vbc.exe Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeDebugPrivilege 3600 C65A.exe Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 Token: SeShutdownPrivilege 3136 Token: SeCreatePagefilePrivilege 3136 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
C4B3.exepid process 3508 C4B3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exeAppLaunch.exev4067263.exev8476839.exev3804595.exev9649724.exea5239789.exeb1003030.exed9391195.exedescription pid process target process PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 3332 wrote to memory of 880 3332 9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe AppLaunch.exe PID 880 wrote to memory of 2944 880 AppLaunch.exe v4067263.exe PID 880 wrote to memory of 2944 880 AppLaunch.exe v4067263.exe PID 880 wrote to memory of 2944 880 AppLaunch.exe v4067263.exe PID 2944 wrote to memory of 3900 2944 v4067263.exe v8476839.exe PID 2944 wrote to memory of 3900 2944 v4067263.exe v8476839.exe PID 2944 wrote to memory of 3900 2944 v4067263.exe v8476839.exe PID 3900 wrote to memory of 1500 3900 v8476839.exe v3804595.exe PID 3900 wrote to memory of 1500 3900 v8476839.exe v3804595.exe PID 3900 wrote to memory of 1500 3900 v8476839.exe v3804595.exe PID 1500 wrote to memory of 4232 1500 v3804595.exe v9649724.exe PID 1500 wrote to memory of 4232 1500 v3804595.exe v9649724.exe PID 1500 wrote to memory of 4232 1500 v3804595.exe v9649724.exe PID 4232 wrote to memory of 2232 4232 v9649724.exe a5239789.exe PID 4232 wrote to memory of 2232 4232 v9649724.exe a5239789.exe PID 4232 wrote to memory of 2232 4232 v9649724.exe a5239789.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 2232 wrote to memory of 1056 2232 a5239789.exe AppLaunch.exe PID 4232 wrote to memory of 3776 4232 v9649724.exe b1003030.exe PID 4232 wrote to memory of 3776 4232 v9649724.exe b1003030.exe PID 4232 wrote to memory of 3776 4232 v9649724.exe b1003030.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 3776 wrote to memory of 1664 3776 b1003030.exe AppLaunch.exe PID 1500 wrote to memory of 2344 1500 v3804595.exe c6035641.exe PID 1500 wrote to memory of 2344 1500 v3804595.exe c6035641.exe PID 1500 wrote to memory of 2344 1500 v3804595.exe c6035641.exe PID 3900 wrote to memory of 4892 3900 v8476839.exe d9391195.exe PID 3900 wrote to memory of 4892 3900 v8476839.exe d9391195.exe PID 3900 wrote to memory of 4892 3900 v8476839.exe d9391195.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 4892 wrote to memory of 876 4892 d9391195.exe AppLaunch.exe PID 2944 wrote to memory of 4796 2944 v4067263.exe e2507304.exe PID 2944 wrote to memory of 4796 2944 v4067263.exe e2507304.exe PID 2944 wrote to memory of 4796 2944 v4067263.exe e2507304.exe PID 880 wrote to memory of 644 880 AppLaunch.exe f2299375.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\9639194d52836b05f842c10260f9e93bb96d17fcca0a492d870455c6c6640a74exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4067263.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4067263.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8476839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8476839.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3804595.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3804595.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9649724.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9649724.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5239789.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5239789.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 5728⤵
- Program crash
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1003030.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1003030.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 5409⤵
- Program crash
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 1488⤵
- Program crash
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6035641.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6035641.exe6⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 5807⤵
- Program crash
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d9391195.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d9391195.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 5806⤵
- Program crash
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2507304.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2507304.exe4⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f2299375.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f2299375.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 3004⤵
- Program crash
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 2402⤵
- Program crash
PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3332 -ip 33321⤵PID:260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2232 -ip 22321⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3776 -ip 37761⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1664 -ip 16641⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2344 -ip 23441⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4892 -ip 48921⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 644 -ip 6441⤵PID:2008
-
C:\Users\Admin\AppData\Roaming\faejgddC:\Users\Admin\AppData\Roaming\faejgdd1⤵
- Executes dropped EXE
PID:4472
-
C:\Users\Admin\AppData\Local\Temp\C0DA.exeC:\Users\Admin\AppData\Local\Temp\C0DA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
C:\Users\Admin\AppData\Local\Temp\C4B3.exeC:\Users\Admin\AppData\Local\Temp\C4B3.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:5028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4804
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:2592
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:4524
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1164
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\C65A.exeC:\Users\Admin\AppData\Local\Temp\C65A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:4752
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
390KB
MD5e7be280a1ff571dbdbb3b3af50a2aa8f
SHA1fa600411fcae314a4641d1c3a3c912ee29c2aba7
SHA256c3a68e027b8365de66c0f3ac8acaf92c53419712ca30e7513f49d33ceaf1897d
SHA512d6398226230fb51520233c3ff14b65ec9d2a15859d274d8eade269d01a77f22f06ed5f8ce4933c7611290d4a04adc5300fdaa7cd4332d9d81df098ab4f8f6e88
-
Filesize
390KB
MD5e7be280a1ff571dbdbb3b3af50a2aa8f
SHA1fa600411fcae314a4641d1c3a3c912ee29c2aba7
SHA256c3a68e027b8365de66c0f3ac8acaf92c53419712ca30e7513f49d33ceaf1897d
SHA512d6398226230fb51520233c3ff14b65ec9d2a15859d274d8eade269d01a77f22f06ed5f8ce4933c7611290d4a04adc5300fdaa7cd4332d9d81df098ab4f8f6e88
-
Filesize
1020KB
MD5c2c3112aad987e12c2a21fc7be57e36d
SHA1ed0ccdca35204449600d176795c128704245c091
SHA2564b90671b4791930e1921ea0429dc39864e334b9768278bd31364636d1de2821e
SHA51274ff3e493bd372dec8f9c6e833b15e2713fb42116c5aa8d16ce07fdd1a38cd700c53f303a85d9a092c95b4a47641f84ad503d266e30327cdc28ef02d644dfa30
-
Filesize
1020KB
MD5c2c3112aad987e12c2a21fc7be57e36d
SHA1ed0ccdca35204449600d176795c128704245c091
SHA2564b90671b4791930e1921ea0429dc39864e334b9768278bd31364636d1de2821e
SHA51274ff3e493bd372dec8f9c6e833b15e2713fb42116c5aa8d16ce07fdd1a38cd700c53f303a85d9a092c95b4a47641f84ad503d266e30327cdc28ef02d644dfa30
-
Filesize
140KB
MD590af8bdd5d34fd126e143b41691d16cf
SHA1a08e5ce49113713669114175e26cdb34e5ba93f2
SHA256ff5bb0b2d444da2f2b4dc82a2f49e46b6ceac0ee3785a492e48ecbcf1aa07541
SHA512eb94d9d27c83a8340627e18728861a1318f457b9627dc941d20b004015dcf98aafe92d87c62d22cecc1c172077cf950fb9d62e9077da0c335e1fee9e5ae79c18
-
Filesize
140KB
MD590af8bdd5d34fd126e143b41691d16cf
SHA1a08e5ce49113713669114175e26cdb34e5ba93f2
SHA256ff5bb0b2d444da2f2b4dc82a2f49e46b6ceac0ee3785a492e48ecbcf1aa07541
SHA512eb94d9d27c83a8340627e18728861a1318f457b9627dc941d20b004015dcf98aafe92d87c62d22cecc1c172077cf950fb9d62e9077da0c335e1fee9e5ae79c18
-
Filesize
854KB
MD58660084bb5ad399255d442e78b487e89
SHA1c24e3f650e8f2e3d90b0c94929c4ad3575665aec
SHA256826227dc6acb7531292402cc9090fc3f7c4d0b6ce9e86cc43ace60cc0248d377
SHA51279321694cf75172b4bedc282e5f69dff4d00622cbb0fcfea61590fe9a4a4e7f54a202413b22c4b748abe1ccc899ab2c55d6ca962388a31055aef9eb5ed5f17f1
-
Filesize
854KB
MD58660084bb5ad399255d442e78b487e89
SHA1c24e3f650e8f2e3d90b0c94929c4ad3575665aec
SHA256826227dc6acb7531292402cc9090fc3f7c4d0b6ce9e86cc43ace60cc0248d377
SHA51279321694cf75172b4bedc282e5f69dff4d00622cbb0fcfea61590fe9a4a4e7f54a202413b22c4b748abe1ccc899ab2c55d6ca962388a31055aef9eb5ed5f17f1
-
Filesize
401KB
MD51bbd282e85f8a46034951ac77a8136b0
SHA11145a2975c8a2ba2dcea91ad6579fd8d6a786669
SHA256ce85cd6d6b45c5fcc01a16e8e1c4ba1540159ec4123111ee512262a8d3ac556b
SHA5126ba4b113544be65ab8d5e8aeeba82e14fa414658969ce8740310fc56fe125194b343b8e2be240657a8e273110efdaa06e08f21c8d26f6bf11ae7b3fb31de69a8
-
Filesize
401KB
MD51bbd282e85f8a46034951ac77a8136b0
SHA11145a2975c8a2ba2dcea91ad6579fd8d6a786669
SHA256ce85cd6d6b45c5fcc01a16e8e1c4ba1540159ec4123111ee512262a8d3ac556b
SHA5126ba4b113544be65ab8d5e8aeeba82e14fa414658969ce8740310fc56fe125194b343b8e2be240657a8e273110efdaa06e08f21c8d26f6bf11ae7b3fb31de69a8
-
Filesize
583KB
MD5c917f3683b6db99464d78f9d961cf5f3
SHA109b2c80e10f9bee132d7539bc167ddd5bf29278a
SHA256882e070c8323209d6d079aeb3d9154f0064fbd70d9e9843da8701ab80de9cb7e
SHA5120ebd7612578d989a65c88db45b9764a7a420809e0e95efbec1719a5a000ad48612e31d49cf41f11dc13720c2275f64e1fa57969e5d059c8f8bc43790c3f486cd
-
Filesize
583KB
MD5c917f3683b6db99464d78f9d961cf5f3
SHA109b2c80e10f9bee132d7539bc167ddd5bf29278a
SHA256882e070c8323209d6d079aeb3d9154f0064fbd70d9e9843da8701ab80de9cb7e
SHA5120ebd7612578d989a65c88db45b9764a7a420809e0e95efbec1719a5a000ad48612e31d49cf41f11dc13720c2275f64e1fa57969e5d059c8f8bc43790c3f486cd
-
Filesize
247KB
MD528daa27071eef56fe8a4baaee3035778
SHA17ef1f15714da1f979d09a6b247bdd62c1e89d095
SHA256557f44b15ad14b66d2e26b5fd5c3b209edb194774b679d51481bec7a2c7b707f
SHA512c4fe960df53b863277d4e3dd25687d0242047f64a02f758a6ff352c237e46ff29993c40d203528e9305203363a1b8f1d57bbacfb7800cc37980dc925ab87fa5f
-
Filesize
344KB
MD53bdc7fa9d4d48ebaf26201736b394c21
SHA15c7fc1c14ea766d4009d9cbe83fd0c75ba0445f9
SHA256efd6d55d2c389ee37b8e3006c63e2e233231ae1f4e07daf67b7eabb8a6b6136b
SHA512779749b2f74487472743d09b590186ee9a36f7e9309f1bd040e5c1255a650c4cb76b18feadb4a6e7858fb05d6233632290eba62839ddefe13cb88f1a125ff32d
-
Filesize
344KB
MD53bdc7fa9d4d48ebaf26201736b394c21
SHA15c7fc1c14ea766d4009d9cbe83fd0c75ba0445f9
SHA256efd6d55d2c389ee37b8e3006c63e2e233231ae1f4e07daf67b7eabb8a6b6136b
SHA512779749b2f74487472743d09b590186ee9a36f7e9309f1bd040e5c1255a650c4cb76b18feadb4a6e7858fb05d6233632290eba62839ddefe13cb88f1a125ff32d
-
Filesize
228KB
MD50ed4c1917e31045b495eb5a3b0d5c9b7
SHA1eb6c39eb8b132dccf2922ce73b0dff2a56bb1049
SHA256528d64cc524e7b4eb2e5eefb4bc92d7f6ecb1f76ea1beeb9c14129d7b636b274
SHA5128e06ce7736883475114d1c1d9469ff2ea43a03529037c56e2ac417433d2e2d73aacffa8bc9bba46da8682e27a6f11c649f620080a0505748bd3545088ce2321e
-
Filesize
228KB
MD50ed4c1917e31045b495eb5a3b0d5c9b7
SHA1eb6c39eb8b132dccf2922ce73b0dff2a56bb1049
SHA256528d64cc524e7b4eb2e5eefb4bc92d7f6ecb1f76ea1beeb9c14129d7b636b274
SHA5128e06ce7736883475114d1c1d9469ff2ea43a03529037c56e2ac417433d2e2d73aacffa8bc9bba46da8682e27a6f11c649f620080a0505748bd3545088ce2321e
-
Filesize
357KB
MD5053acff8727b4c77cbfd261b7826a674
SHA1b80c5d0f44d7293dc444810b2f4406fff2d47255
SHA256b4b2736f07609e2a078375153a09e9d9a661c7a892d23e15f2dcdc12be82b2e9
SHA512192ef671254f9f6af3af07bea7ab3a0c82172dd1812975a32e7b9b2aebb2dcdfc8c60033eb07f566f123a3f888917361996491884e39b9911fe4c9c15062eb52
-
Filesize
357KB
MD5053acff8727b4c77cbfd261b7826a674
SHA1b80c5d0f44d7293dc444810b2f4406fff2d47255
SHA256b4b2736f07609e2a078375153a09e9d9a661c7a892d23e15f2dcdc12be82b2e9
SHA512192ef671254f9f6af3af07bea7ab3a0c82172dd1812975a32e7b9b2aebb2dcdfc8c60033eb07f566f123a3f888917361996491884e39b9911fe4c9c15062eb52
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc