Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2023 13:20
Static task
static1
Behavioral task
behavioral1
Sample
a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe
-
Size
1.5MB
-
MD5
1a95d775fa8f39b379c8a25772a6ef2d
-
SHA1
099c67f7893f367920657f6b456682eae96b31a1
-
SHA256
a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28
-
SHA512
8d52122f3a238af124fc17cba3f7992d5d378360c001828409c0a51815a25dfeef48c967205b19704fc6846217a464fdec1443cae9945094763bd1f839728716
-
SSDEEP
24576:97PCJ2SL88JBdco3IzRZDl1KNcsexnFhsi/bels1iXAxq+HsY0Q/4hRd4VRu1Hg:lPCJ2S9JBdc7ZeNcs2FhsiqfXAIcYh8V
Malware Config
Extracted
redline
smokiez_build
194.169.175.232:45450
-
auth_value
2e68bc276986767f0f14a3d75567abcd
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
tuco
77.91.124.82:19071
-
auth_value
dcfeb759bae9232de006fc3a4b34ac53
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3856-39-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5100-103-0x0000000000620000-0x00000000007AE000-memory.dmp family_redline behavioral2/memory/4088-108-0x0000000000800000-0x000000000085A000-memory.dmp family_redline behavioral2/memory/5100-119-0x0000000000620000-0x00000000007AE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AC6B.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation AC6B.exe Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 16 IoCs
Processes:
v3820576.exev2144793.exev1425179.exev2944849.exea3576735.exeb4523713.exec2767613.exed3352255.exee0130755.exef6508888.exeA69B.exeA823.exeA9BA.exeAC6B.exeoneetx.exeoneetx.exepid process 976 v3820576.exe 2388 v2144793.exe 3316 v1425179.exe 3648 v2944849.exe 1672 a3576735.exe 4500 b4523713.exe 4280 c2767613.exe 2196 d3352255.exe 768 e0130755.exe 4240 f6508888.exe 5100 A69B.exe 4452 A823.exe 4836 A9BA.exe 2992 AC6B.exe 2236 oneetx.exe 2312 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
v1425179.exev2944849.exeAppLaunch.exev3820576.exev2144793.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1425179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v2944849.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3820576.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2144793.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 7 IoCs
Processes:
a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exea3576735.exeb4523713.exec2767613.exed3352255.exef6508888.exeA69B.exedescription pid process target process PID 4180 set thread context of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 1672 set thread context of 3856 1672 a3576735.exe AppLaunch.exe PID 4500 set thread context of 4108 4500 b4523713.exe AppLaunch.exe PID 4280 set thread context of 1340 4280 c2767613.exe AppLaunch.exe PID 2196 set thread context of 4796 2196 d3352255.exe AppLaunch.exe PID 4240 set thread context of 4260 4240 f6508888.exe AppLaunch.exe PID 5100 set thread context of 4088 5100 A69B.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1788 4180 WerFault.exe a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe 2892 1672 WerFault.exe a3576735.exe 4800 4500 WerFault.exe b4523713.exe 1704 4108 WerFault.exe AppLaunch.exe 3252 4280 WerFault.exe c2767613.exe 1996 2196 WerFault.exe d3352255.exe 3828 4240 WerFault.exe f6508888.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeAppLaunch.exepid process 3856 AppLaunch.exe 3856 AppLaunch.exe 1340 AppLaunch.exe 1340 AppLaunch.exe 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 3236 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3236 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 1340 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
AppLaunch.exeAppLaunch.exevbc.exeA823.exedescription pid process Token: SeDebugPrivilege 3856 AppLaunch.exe Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeDebugPrivilege 4796 AppLaunch.exe Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeDebugPrivilege 4088 vbc.exe Token: SeDebugPrivilege 4452 A823.exe Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 Token: SeShutdownPrivilege 3236 Token: SeCreatePagefilePrivilege 3236 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AC6B.exepid process 2992 AC6B.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exeAppLaunch.exev3820576.exev2144793.exev1425179.exev2944849.exea3576735.exeb4523713.exec2767613.exedescription pid process target process PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4180 wrote to memory of 4900 4180 a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe AppLaunch.exe PID 4900 wrote to memory of 976 4900 AppLaunch.exe v3820576.exe PID 4900 wrote to memory of 976 4900 AppLaunch.exe v3820576.exe PID 4900 wrote to memory of 976 4900 AppLaunch.exe v3820576.exe PID 976 wrote to memory of 2388 976 v3820576.exe v2144793.exe PID 976 wrote to memory of 2388 976 v3820576.exe v2144793.exe PID 976 wrote to memory of 2388 976 v3820576.exe v2144793.exe PID 2388 wrote to memory of 3316 2388 v2144793.exe v1425179.exe PID 2388 wrote to memory of 3316 2388 v2144793.exe v1425179.exe PID 2388 wrote to memory of 3316 2388 v2144793.exe v1425179.exe PID 3316 wrote to memory of 3648 3316 v1425179.exe v2944849.exe PID 3316 wrote to memory of 3648 3316 v1425179.exe v2944849.exe PID 3316 wrote to memory of 3648 3316 v1425179.exe v2944849.exe PID 3648 wrote to memory of 1672 3648 v2944849.exe a3576735.exe PID 3648 wrote to memory of 1672 3648 v2944849.exe a3576735.exe PID 3648 wrote to memory of 1672 3648 v2944849.exe a3576735.exe PID 1672 wrote to memory of 3568 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3568 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3568 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 1672 wrote to memory of 3856 1672 a3576735.exe AppLaunch.exe PID 3648 wrote to memory of 4500 3648 v2944849.exe b4523713.exe PID 3648 wrote to memory of 4500 3648 v2944849.exe b4523713.exe PID 3648 wrote to memory of 4500 3648 v2944849.exe b4523713.exe PID 4500 wrote to memory of 2992 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 2992 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 2992 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 4500 wrote to memory of 4108 4500 b4523713.exe AppLaunch.exe PID 3316 wrote to memory of 4280 3316 v1425179.exe c2767613.exe PID 3316 wrote to memory of 4280 3316 v1425179.exe c2767613.exe PID 3316 wrote to memory of 4280 3316 v1425179.exe c2767613.exe PID 4280 wrote to memory of 1340 4280 c2767613.exe AppLaunch.exe PID 4280 wrote to memory of 1340 4280 c2767613.exe AppLaunch.exe PID 4280 wrote to memory of 1340 4280 c2767613.exe AppLaunch.exe PID 4280 wrote to memory of 1340 4280 c2767613.exe AppLaunch.exe PID 4280 wrote to memory of 1340 4280 c2767613.exe AppLaunch.exe PID 4280 wrote to memory of 1340 4280 c2767613.exe AppLaunch.exe PID 2388 wrote to memory of 2196 2388 v2144793.exe d3352255.exe PID 2388 wrote to memory of 2196 2388 v2144793.exe d3352255.exe PID 2388 wrote to memory of 2196 2388 v2144793.exe d3352255.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe"C:\Users\Admin\AppData\Local\Temp\a08262c0594eb1a4dbd3ab16cd85b8caeaeac88ec05260c9e8b7879009f09c28_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3820576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3820576.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2144793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2144793.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1425179.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1425179.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2944849.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2944849.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3576735.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3576735.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3568
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 5728⤵
- Program crash
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4523713.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4523713.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:2992
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 5409⤵
- Program crash
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 5768⤵
- Program crash
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2767613.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2767613.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 1367⤵
- Program crash
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d3352255.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d3352255.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 5806⤵
- Program crash
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0130755.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0130755.exe4⤵
- Executes dropped EXE
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6508888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6508888.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 1364⤵
- Program crash
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 2762⤵
- Program crash
PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4180 -ip 41801⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1672 -ip 16721⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4500 -ip 45001⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4108 -ip 41081⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4280 -ip 42801⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2196 -ip 21961⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4240 -ip 42401⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\A69B.exeC:\Users\Admin\AppData\Local\Temp\A69B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
C:\Users\Admin\AppData\Local\Temp\A823.exeC:\Users\Admin\AppData\Local\Temp\A823.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
C:\Users\Admin\AppData\Local\Temp\A9BA.exeC:\Users\Admin\AppData\Local\Temp\A9BA.exe1⤵
- Executes dropped EXE
PID:4836
-
C:\Users\Admin\AppData\Local\Temp\AC6B.exeC:\Users\Admin\AppData\Local\Temp\AC6B.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:1564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4160
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:2008
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2248
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:3016
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:2312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
282KB
MD541bdf3bbb8d27902f5f22e9b5a88a25b
SHA1715db0885a5929a8978bdd25269134719c26f6f0
SHA256e2622b67c87d3e730dbd1312d1160faac1ef9bd98f00041e15c00f347d47a949
SHA512f9166a973fbb61f75bf3b49b12844dde25e6f56c7c0b1ed41f39954db0f4ca13f95f2c50a1290058f79ce688efba344b1eb192e65b7bf76ec5273691c2125202
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
390KB
MD59121eddfe3324e9ad075d9d50b6b53af
SHA16de045d9f84e2b5ac202e3be3b03805b860de0c2
SHA2567fe9a0882b0a65b95e865845b70f16655f37df06602deece3d55ab16bfd27dc2
SHA512e527e29811214c4bbdd879e702c1e84a00359013a7586020a9f92fe23b0a0a948fbd4e52b5e2bb9631645e890ae3cc48ba32001cee09460cd3557007500f294b
-
Filesize
390KB
MD59121eddfe3324e9ad075d9d50b6b53af
SHA16de045d9f84e2b5ac202e3be3b03805b860de0c2
SHA2567fe9a0882b0a65b95e865845b70f16655f37df06602deece3d55ab16bfd27dc2
SHA512e527e29811214c4bbdd879e702c1e84a00359013a7586020a9f92fe23b0a0a948fbd4e52b5e2bb9631645e890ae3cc48ba32001cee09460cd3557007500f294b
-
Filesize
1020KB
MD5f3590b78326bc075cd84c67539eef769
SHA1d02aaf1236ec13c4d2924e0911a4587c1f8f2551
SHA256ca6f00ab2bcb23888b8b0cf6108a600daef02379180aa8ea8121e57a93ec44ac
SHA51248442f6359dd6bb5d3f344af28424edec117d92e4de6bc68b13d094d88210707d717e405e2c669bfb0794116217ef964528a7cd0831f80e7c3a98401aef2e448
-
Filesize
1020KB
MD5f3590b78326bc075cd84c67539eef769
SHA1d02aaf1236ec13c4d2924e0911a4587c1f8f2551
SHA256ca6f00ab2bcb23888b8b0cf6108a600daef02379180aa8ea8121e57a93ec44ac
SHA51248442f6359dd6bb5d3f344af28424edec117d92e4de6bc68b13d094d88210707d717e405e2c669bfb0794116217ef964528a7cd0831f80e7c3a98401aef2e448
-
Filesize
140KB
MD590af8bdd5d34fd126e143b41691d16cf
SHA1a08e5ce49113713669114175e26cdb34e5ba93f2
SHA256ff5bb0b2d444da2f2b4dc82a2f49e46b6ceac0ee3785a492e48ecbcf1aa07541
SHA512eb94d9d27c83a8340627e18728861a1318f457b9627dc941d20b004015dcf98aafe92d87c62d22cecc1c172077cf950fb9d62e9077da0c335e1fee9e5ae79c18
-
Filesize
140KB
MD590af8bdd5d34fd126e143b41691d16cf
SHA1a08e5ce49113713669114175e26cdb34e5ba93f2
SHA256ff5bb0b2d444da2f2b4dc82a2f49e46b6ceac0ee3785a492e48ecbcf1aa07541
SHA512eb94d9d27c83a8340627e18728861a1318f457b9627dc941d20b004015dcf98aafe92d87c62d22cecc1c172077cf950fb9d62e9077da0c335e1fee9e5ae79c18
-
Filesize
854KB
MD5145cf3b9f9720223e2c9373230ef643d
SHA1101aaeae4e39aa3e2af63d7ee4339c99e243098d
SHA25660d8bf31bd17d994b9056b4d180db5b3834da77e499b0bd767f30e6264f173d9
SHA5123d15be387a1a9f6396cbfb781ee76b37fc76def6d940d93c140fa8aa6901f41c6d0d529276fba8b794f5c5f1caeac2af7c894061dd4ecbd84e99263c30d26d8e
-
Filesize
854KB
MD5145cf3b9f9720223e2c9373230ef643d
SHA1101aaeae4e39aa3e2af63d7ee4339c99e243098d
SHA25660d8bf31bd17d994b9056b4d180db5b3834da77e499b0bd767f30e6264f173d9
SHA5123d15be387a1a9f6396cbfb781ee76b37fc76def6d940d93c140fa8aa6901f41c6d0d529276fba8b794f5c5f1caeac2af7c894061dd4ecbd84e99263c30d26d8e
-
Filesize
401KB
MD51bbd282e85f8a46034951ac77a8136b0
SHA11145a2975c8a2ba2dcea91ad6579fd8d6a786669
SHA256ce85cd6d6b45c5fcc01a16e8e1c4ba1540159ec4123111ee512262a8d3ac556b
SHA5126ba4b113544be65ab8d5e8aeeba82e14fa414658969ce8740310fc56fe125194b343b8e2be240657a8e273110efdaa06e08f21c8d26f6bf11ae7b3fb31de69a8
-
Filesize
401KB
MD51bbd282e85f8a46034951ac77a8136b0
SHA11145a2975c8a2ba2dcea91ad6579fd8d6a786669
SHA256ce85cd6d6b45c5fcc01a16e8e1c4ba1540159ec4123111ee512262a8d3ac556b
SHA5126ba4b113544be65ab8d5e8aeeba82e14fa414658969ce8740310fc56fe125194b343b8e2be240657a8e273110efdaa06e08f21c8d26f6bf11ae7b3fb31de69a8
-
Filesize
583KB
MD5b7d0da9ab476b95216fbee3a0f1234d4
SHA19437b0d5751f7749eacb6aa28cd9a0fe180dca1d
SHA2566a5b1b2f9a249a9de134ba1f11b3adfa1ecdc241aaba3fc9098f5753284d52c8
SHA5125a2cadd106bdf7db6948479d6aefc768299c17bfd1107067ba4eb3a43f68deb38d34f03e0425400834c95ccd3f313f6e842c59efc858fbafc9d3cac4e8c62287
-
Filesize
583KB
MD5b7d0da9ab476b95216fbee3a0f1234d4
SHA19437b0d5751f7749eacb6aa28cd9a0fe180dca1d
SHA2566a5b1b2f9a249a9de134ba1f11b3adfa1ecdc241aaba3fc9098f5753284d52c8
SHA5125a2cadd106bdf7db6948479d6aefc768299c17bfd1107067ba4eb3a43f68deb38d34f03e0425400834c95ccd3f313f6e842c59efc858fbafc9d3cac4e8c62287
-
Filesize
247KB
MD586f7a3591d1c27ddfc8cec41b29b2f0d
SHA14da4ad3e92658fb30cf3a30944372ec67abf5e89
SHA2561846fb0f4047b5f3fb78f28c5c656245c95eb44b408a14cdcd269dedfee43d7e
SHA51293e368a5220f70c5865c10876454c4a294c4755cd71a6da854e4ce522ef93f6620c7da26b93cf3ba96fa7dc037d7a1fb4c72f693a78a7b6981349ec191fe47a8
-
Filesize
247KB
MD586f7a3591d1c27ddfc8cec41b29b2f0d
SHA14da4ad3e92658fb30cf3a30944372ec67abf5e89
SHA2561846fb0f4047b5f3fb78f28c5c656245c95eb44b408a14cdcd269dedfee43d7e
SHA51293e368a5220f70c5865c10876454c4a294c4755cd71a6da854e4ce522ef93f6620c7da26b93cf3ba96fa7dc037d7a1fb4c72f693a78a7b6981349ec191fe47a8
-
Filesize
344KB
MD52ab7670b6bc3282a25c50f87abaff650
SHA172221a9d8dcaa96afd5f7f7b4bffe6ba2cb19493
SHA256ebfeec3667b5b2b0eed4dab7332c77ceddf3b2fe368c5ae139833b73606bcc7a
SHA5123c91a7b981320c70e8f4e88a7fe8d7e5b71b64f9fbb7ee8319948fd295546dae776c79891b2373e1dbc3a07329b2dbffa6a6fd36bde1eaa6ae872f11ebbda60a
-
Filesize
344KB
MD52ab7670b6bc3282a25c50f87abaff650
SHA172221a9d8dcaa96afd5f7f7b4bffe6ba2cb19493
SHA256ebfeec3667b5b2b0eed4dab7332c77ceddf3b2fe368c5ae139833b73606bcc7a
SHA5123c91a7b981320c70e8f4e88a7fe8d7e5b71b64f9fbb7ee8319948fd295546dae776c79891b2373e1dbc3a07329b2dbffa6a6fd36bde1eaa6ae872f11ebbda60a
-
Filesize
228KB
MD562b7e7fc7a1f0a39620df69890722946
SHA19e5512c6fdb73ce73d96856e8ba2dbd330270c5c
SHA2564c20ae795a1c08d76471bb0e4a2bcd81f5e2ad0f1abfee3bfe18ba5b6e24b6ca
SHA5127ba6e6dfebd54e1513875fb61be952b35d3161e1635cdce26319cf5badff97093125fe2b4825939a535684fb701231f15fe8234bccfcb0f1b8d39dd1fdcf412e
-
Filesize
228KB
MD562b7e7fc7a1f0a39620df69890722946
SHA19e5512c6fdb73ce73d96856e8ba2dbd330270c5c
SHA2564c20ae795a1c08d76471bb0e4a2bcd81f5e2ad0f1abfee3bfe18ba5b6e24b6ca
SHA5127ba6e6dfebd54e1513875fb61be952b35d3161e1635cdce26319cf5badff97093125fe2b4825939a535684fb701231f15fe8234bccfcb0f1b8d39dd1fdcf412e
-
Filesize
357KB
MD5f78ec5e221f449d5858d7c0e8412ca0d
SHA12f6d817a31e8f8ec32ef4ce1687147e74cb76a0b
SHA2568df5e699137c4107ddd4f7343f7a55cec00d5c8a13a1190e7af13ce11a4654cf
SHA512a7b9a42bfb21359cf87e51be38920656bd3f2038de5adaf5815436be7634f12a735cf0e0f3f136e918413502a737e6007d8d6341ce6d8729f4e459cdf037d8f7
-
Filesize
357KB
MD5f78ec5e221f449d5858d7c0e8412ca0d
SHA12f6d817a31e8f8ec32ef4ce1687147e74cb76a0b
SHA2568df5e699137c4107ddd4f7343f7a55cec00d5c8a13a1190e7af13ce11a4654cf
SHA512a7b9a42bfb21359cf87e51be38920656bd3f2038de5adaf5815436be7634f12a735cf0e0f3f136e918413502a737e6007d8d6341ce6d8729f4e459cdf037d8f7