Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2023 13:36
Static task
static1
Behavioral task
behavioral1
Sample
d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe
-
Size
1.5MB
-
MD5
83efe5f1b79a77bfba21409d3c359cfc
-
SHA1
735de36da94d8292be6fb27c4b016d9dc34a9e20
-
SHA256
d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86
-
SHA512
489b2058506437fe05529965abc83b2c5baf692351324c1cd31370757385698046a74c5795d29820771c57a73a816b3674b24f2f50cc57474b10259feee661a4
-
SSDEEP
24576:1FRCJo9QmbGkwLeF/BtCyfKLi7a5VvX94B+2H4dZprnuHem3MCfY3h0dILVu1Hg:TRCJo9PGkwi0iO5FX94BidZprnaHYK0f
Malware Config
Extracted
redline
smokiez_build
194.169.175.232:45450
-
auth_value
2e68bc276986767f0f14a3d75567abcd
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
tuco
77.91.124.82:19071
-
auth_value
dcfeb759bae9232de006fc3a4b34ac53
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3456-39-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4392-139-0x0000000000F80000-0x000000000110E000-memory.dmp family_redline behavioral2/memory/2216-140-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral2/memory/4392-153-0x0000000000F80000-0x000000000110E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
C561.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation C561.exe Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 16 IoCs
Processes:
v0690030.exev9548624.exev1421940.exev0622569.exea4207151.exeb8203282.exec2358846.exed3352389.exee3244189.exef2854555.exeBFD0.exeC197.exeC2C0.exeC561.exeoneetx.exeoneetx.exepid process 2540 v0690030.exe 1600 v9548624.exe 2568 v1421940.exe 3192 v0622569.exe 3092 a4207151.exe 3984 b8203282.exe 552 c2358846.exe 728 d3352389.exe 3112 e3244189.exe 3532 f2854555.exe 4392 BFD0.exe 4324 C197.exe 4280 C2C0.exe 4868 C561.exe 3996 oneetx.exe 2584 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
AppLaunch.exev0690030.exev9548624.exev1421940.exev0622569.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0690030.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9548624.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1421940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0622569.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 7 IoCs
Processes:
d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exea4207151.exeb8203282.exec2358846.exed3352389.exef2854555.exeBFD0.exedescription pid process target process PID 1536 set thread context of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 3092 set thread context of 3456 3092 a4207151.exe AppLaunch.exe PID 3984 set thread context of 1624 3984 b8203282.exe AppLaunch.exe PID 552 set thread context of 116 552 c2358846.exe AppLaunch.exe PID 728 set thread context of 4788 728 d3352389.exe AppLaunch.exe PID 3532 set thread context of 5064 3532 f2854555.exe AppLaunch.exe PID 4392 set thread context of 2216 4392 BFD0.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5100 1536 WerFault.exe d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe 2804 3092 WerFault.exe a4207151.exe 4140 3984 WerFault.exe b8203282.exe 2480 1624 WerFault.exe AppLaunch.exe 2344 552 WerFault.exe c2358846.exe 1960 728 WerFault.exe d3352389.exe 2272 3532 WerFault.exe f2854555.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeAppLaunch.exepid process 3456 AppLaunch.exe 3456 AppLaunch.exe 116 AppLaunch.exe 116 AppLaunch.exe 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 3120 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3120 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 116 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
AppLaunch.exeAppLaunch.exeC2C0.exeC197.exevbc.exedescription pid process Token: SeDebugPrivilege 3456 AppLaunch.exe Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeDebugPrivilege 4788 AppLaunch.exe Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeDebugPrivilege 4280 C2C0.exe Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeDebugPrivilege 4324 C197.exe Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeDebugPrivilege 2216 vbc.exe Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 Token: SeShutdownPrivilege 3120 Token: SeCreatePagefilePrivilege 3120 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
C561.exepid process 4868 C561.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exeAppLaunch.exev0690030.exev9548624.exev1421940.exev0622569.exea4207151.exeb8203282.exec2358846.exed3352389.exedescription pid process target process PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 1536 wrote to memory of 3804 1536 d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe AppLaunch.exe PID 3804 wrote to memory of 2540 3804 AppLaunch.exe v0690030.exe PID 3804 wrote to memory of 2540 3804 AppLaunch.exe v0690030.exe PID 3804 wrote to memory of 2540 3804 AppLaunch.exe v0690030.exe PID 2540 wrote to memory of 1600 2540 v0690030.exe v9548624.exe PID 2540 wrote to memory of 1600 2540 v0690030.exe v9548624.exe PID 2540 wrote to memory of 1600 2540 v0690030.exe v9548624.exe PID 1600 wrote to memory of 2568 1600 v9548624.exe v1421940.exe PID 1600 wrote to memory of 2568 1600 v9548624.exe v1421940.exe PID 1600 wrote to memory of 2568 1600 v9548624.exe v1421940.exe PID 2568 wrote to memory of 3192 2568 v1421940.exe v0622569.exe PID 2568 wrote to memory of 3192 2568 v1421940.exe v0622569.exe PID 2568 wrote to memory of 3192 2568 v1421940.exe v0622569.exe PID 3192 wrote to memory of 3092 3192 v0622569.exe a4207151.exe PID 3192 wrote to memory of 3092 3192 v0622569.exe a4207151.exe PID 3192 wrote to memory of 3092 3192 v0622569.exe a4207151.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3092 wrote to memory of 3456 3092 a4207151.exe AppLaunch.exe PID 3192 wrote to memory of 3984 3192 v0622569.exe b8203282.exe PID 3192 wrote to memory of 3984 3192 v0622569.exe b8203282.exe PID 3192 wrote to memory of 3984 3192 v0622569.exe b8203282.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 3984 wrote to memory of 1624 3984 b8203282.exe AppLaunch.exe PID 2568 wrote to memory of 552 2568 v1421940.exe c2358846.exe PID 2568 wrote to memory of 552 2568 v1421940.exe c2358846.exe PID 2568 wrote to memory of 552 2568 v1421940.exe c2358846.exe PID 552 wrote to memory of 116 552 c2358846.exe AppLaunch.exe PID 552 wrote to memory of 116 552 c2358846.exe AppLaunch.exe PID 552 wrote to memory of 116 552 c2358846.exe AppLaunch.exe PID 552 wrote to memory of 116 552 c2358846.exe AppLaunch.exe PID 552 wrote to memory of 116 552 c2358846.exe AppLaunch.exe PID 552 wrote to memory of 116 552 c2358846.exe AppLaunch.exe PID 1600 wrote to memory of 728 1600 v9548624.exe d3352389.exe PID 1600 wrote to memory of 728 1600 v9548624.exe d3352389.exe PID 1600 wrote to memory of 728 1600 v9548624.exe d3352389.exe PID 728 wrote to memory of 1836 728 d3352389.exe AppLaunch.exe PID 728 wrote to memory of 1836 728 d3352389.exe AppLaunch.exe PID 728 wrote to memory of 1836 728 d3352389.exe AppLaunch.exe PID 728 wrote to memory of 4788 728 d3352389.exe AppLaunch.exe PID 728 wrote to memory of 4788 728 d3352389.exe AppLaunch.exe PID 728 wrote to memory of 4788 728 d3352389.exe AppLaunch.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe"C:\Users\Admin\AppData\Local\Temp\d710bfb8d4ee7669e489785deccfd7e7cd8c9ccc936b10519615e5a7f3748d86_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0690030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0690030.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9548624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9548624.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1421940.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1421940.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0622569.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0622569.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4207151.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4207151.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 2248⤵
- Program crash
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8203282.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8203282.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 5409⤵
- Program crash
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 1368⤵
- Program crash
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2358846.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2358846.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 1567⤵
- Program crash
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d3352389.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d3352389.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1836
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 5846⤵
- Program crash
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e3244189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e3244189.exe4⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f2854555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f2854555.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4608
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 1524⤵
- Program crash
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 1362⤵
- Program crash
PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1536 -ip 15361⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3092 -ip 30921⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3984 -ip 39841⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1624 -ip 16241⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 552 -ip 5521⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 728 -ip 7281⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3532 -ip 35321⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\BFD0.exeC:\Users\Admin\AppData\Local\Temp\BFD0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
C:\Users\Admin\AppData\Local\Temp\C197.exeC:\Users\Admin\AppData\Local\Temp\C197.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
C:\Users\Admin\AppData\Local\Temp\C2C0.exeC:\Users\Admin\AppData\Local\Temp\C2C0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Users\Admin\AppData\Local\Temp\C561.exeC:\Users\Admin\AppData\Local\Temp\C561.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:2004
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2692
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:3856
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4004
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:2584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
282KB
MD541bdf3bbb8d27902f5f22e9b5a88a25b
SHA1715db0885a5929a8978bdd25269134719c26f6f0
SHA256e2622b67c87d3e730dbd1312d1160faac1ef9bd98f00041e15c00f347d47a949
SHA512f9166a973fbb61f75bf3b49b12844dde25e6f56c7c0b1ed41f39954db0f4ca13f95f2c50a1290058f79ce688efba344b1eb192e65b7bf76ec5273691c2125202
-
Filesize
282KB
MD541bdf3bbb8d27902f5f22e9b5a88a25b
SHA1715db0885a5929a8978bdd25269134719c26f6f0
SHA256e2622b67c87d3e730dbd1312d1160faac1ef9bd98f00041e15c00f347d47a949
SHA512f9166a973fbb61f75bf3b49b12844dde25e6f56c7c0b1ed41f39954db0f4ca13f95f2c50a1290058f79ce688efba344b1eb192e65b7bf76ec5273691c2125202
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
390KB
MD577c6bbb58d1a50fc55597f801c7dd9ae
SHA133636c7a6357f696ea320b4778bccfd6494cdb0b
SHA2562a5c7f543afce0a14e3fc446fde21c3166ffd67ff2cfb01117bde5b16e5c60c6
SHA5126dbfd44d57d79c704b1515f5b1fae104669e20470b19f66956af24b8d90bf7c91894ff8ed44266d6b064bf50ae057127b8e442c03b3dde3f0fd7a7404f623160
-
Filesize
390KB
MD577c6bbb58d1a50fc55597f801c7dd9ae
SHA133636c7a6357f696ea320b4778bccfd6494cdb0b
SHA2562a5c7f543afce0a14e3fc446fde21c3166ffd67ff2cfb01117bde5b16e5c60c6
SHA5126dbfd44d57d79c704b1515f5b1fae104669e20470b19f66956af24b8d90bf7c91894ff8ed44266d6b064bf50ae057127b8e442c03b3dde3f0fd7a7404f623160
-
Filesize
1020KB
MD5cb9a171083c0f7d860a3175aa9db0dff
SHA189507fa36a376d8012f90b6266c4ea427666dd54
SHA256df2eb47c2c10133a4d1256a58acbb91c92e4a7525774a474599fc76b95ca2787
SHA512a07f14245d24c35c26725c34eefb02f7dee845f4a22111629af62a0a48525737c9d962156683649a25ab52705bf2d319869785327b04dcd6789b6541650e5783
-
Filesize
1020KB
MD5cb9a171083c0f7d860a3175aa9db0dff
SHA189507fa36a376d8012f90b6266c4ea427666dd54
SHA256df2eb47c2c10133a4d1256a58acbb91c92e4a7525774a474599fc76b95ca2787
SHA512a07f14245d24c35c26725c34eefb02f7dee845f4a22111629af62a0a48525737c9d962156683649a25ab52705bf2d319869785327b04dcd6789b6541650e5783
-
Filesize
140KB
MD590af8bdd5d34fd126e143b41691d16cf
SHA1a08e5ce49113713669114175e26cdb34e5ba93f2
SHA256ff5bb0b2d444da2f2b4dc82a2f49e46b6ceac0ee3785a492e48ecbcf1aa07541
SHA512eb94d9d27c83a8340627e18728861a1318f457b9627dc941d20b004015dcf98aafe92d87c62d22cecc1c172077cf950fb9d62e9077da0c335e1fee9e5ae79c18
-
Filesize
140KB
MD590af8bdd5d34fd126e143b41691d16cf
SHA1a08e5ce49113713669114175e26cdb34e5ba93f2
SHA256ff5bb0b2d444da2f2b4dc82a2f49e46b6ceac0ee3785a492e48ecbcf1aa07541
SHA512eb94d9d27c83a8340627e18728861a1318f457b9627dc941d20b004015dcf98aafe92d87c62d22cecc1c172077cf950fb9d62e9077da0c335e1fee9e5ae79c18
-
Filesize
854KB
MD58404b5059bef663fa434e3f9fee6fec0
SHA127a2a6e6c1be9fdd48480b13064ff2c097c0b485
SHA2560641b78825e7f5b46e1f46a72cfd16d8a524ab446ed6853473cdf71a942d96e1
SHA512bf26228d498155dc34c52ff28a4142140f652aee78889103bd62caa0e3cfc8065d6e26488297c5c142d22b3ddae60bdf7c99e632298aa99e0ef5fdc7932fc0a3
-
Filesize
854KB
MD58404b5059bef663fa434e3f9fee6fec0
SHA127a2a6e6c1be9fdd48480b13064ff2c097c0b485
SHA2560641b78825e7f5b46e1f46a72cfd16d8a524ab446ed6853473cdf71a942d96e1
SHA512bf26228d498155dc34c52ff28a4142140f652aee78889103bd62caa0e3cfc8065d6e26488297c5c142d22b3ddae60bdf7c99e632298aa99e0ef5fdc7932fc0a3
-
Filesize
401KB
MD51bbd282e85f8a46034951ac77a8136b0
SHA11145a2975c8a2ba2dcea91ad6579fd8d6a786669
SHA256ce85cd6d6b45c5fcc01a16e8e1c4ba1540159ec4123111ee512262a8d3ac556b
SHA5126ba4b113544be65ab8d5e8aeeba82e14fa414658969ce8740310fc56fe125194b343b8e2be240657a8e273110efdaa06e08f21c8d26f6bf11ae7b3fb31de69a8
-
Filesize
401KB
MD51bbd282e85f8a46034951ac77a8136b0
SHA11145a2975c8a2ba2dcea91ad6579fd8d6a786669
SHA256ce85cd6d6b45c5fcc01a16e8e1c4ba1540159ec4123111ee512262a8d3ac556b
SHA5126ba4b113544be65ab8d5e8aeeba82e14fa414658969ce8740310fc56fe125194b343b8e2be240657a8e273110efdaa06e08f21c8d26f6bf11ae7b3fb31de69a8
-
Filesize
583KB
MD55f81e2782136db8a2704e071b28e7fe0
SHA1d4c2555a1da9711f2b9a00bb77962207db8795cf
SHA256b6c4bacf889c8ce98b84da7534ccf714164c4ca0868c5265766f9ec2604a8de8
SHA5125ac1a3a97c99329653f6d421e387fad6d21fea5c2a74e57c44cca66ba13eb2db47b9312c6ec7ee3f55d5d8ed824d69279a113038e1af3f38474ae4ce7b8e9b62
-
Filesize
583KB
MD55f81e2782136db8a2704e071b28e7fe0
SHA1d4c2555a1da9711f2b9a00bb77962207db8795cf
SHA256b6c4bacf889c8ce98b84da7534ccf714164c4ca0868c5265766f9ec2604a8de8
SHA5125ac1a3a97c99329653f6d421e387fad6d21fea5c2a74e57c44cca66ba13eb2db47b9312c6ec7ee3f55d5d8ed824d69279a113038e1af3f38474ae4ce7b8e9b62
-
Filesize
247KB
MD5896e436ca46a72d2fc8dfc451356f427
SHA1363bb3b08c9847e3bad915dbf1166198f1cbec44
SHA2565d666ec70e7382f4d1bb26a606915dcf93aefa15c5fb63048511c96d834654a0
SHA512bb9a062d3c127bda5eacb85f9b132364ddad176a68e31bd694d7a6bc2743fdb597d3bbe4ec9b50cfc456d9e25afef3df9816a278d2110de7d58fae05b09a4cc5
-
Filesize
247KB
MD5896e436ca46a72d2fc8dfc451356f427
SHA1363bb3b08c9847e3bad915dbf1166198f1cbec44
SHA2565d666ec70e7382f4d1bb26a606915dcf93aefa15c5fb63048511c96d834654a0
SHA512bb9a062d3c127bda5eacb85f9b132364ddad176a68e31bd694d7a6bc2743fdb597d3bbe4ec9b50cfc456d9e25afef3df9816a278d2110de7d58fae05b09a4cc5
-
Filesize
344KB
MD52ecf4ef2b3dad801ece879dc84d78249
SHA18d707b74799e6e2e94ff18ba96bec46090ff3644
SHA256fb21b4396386101f4504db923202a6f94d17424c61c2c2106d6304ce1b197b38
SHA512fe9b892cd321b63bac322d31642171378ba64157ba85a0630bd5c32cabb14b6cb5b01b526c7d1625e0b9eb7929f036f699d37119a39f84307f1ac75c830a0137
-
Filesize
344KB
MD52ecf4ef2b3dad801ece879dc84d78249
SHA18d707b74799e6e2e94ff18ba96bec46090ff3644
SHA256fb21b4396386101f4504db923202a6f94d17424c61c2c2106d6304ce1b197b38
SHA512fe9b892cd321b63bac322d31642171378ba64157ba85a0630bd5c32cabb14b6cb5b01b526c7d1625e0b9eb7929f036f699d37119a39f84307f1ac75c830a0137
-
Filesize
228KB
MD5fc62e6dcf471fdb8db386b4df2abc6a5
SHA17d31db143e7201f6e70bd5d879ef2e75e507eab3
SHA256bdef3e922619bd6d49738e47de2a77ad44a8a205e7fedee15f5b502d7f083d2c
SHA5120496f41dcc98c0ca59fa6366d00b531a8ae5a3fb1cc8dde2a98b465f173bc01c169348ea3ad7182f6c69efa9bdf3416d06fbf1d79234b83a3dfb40c6e1d52ead
-
Filesize
228KB
MD5fc62e6dcf471fdb8db386b4df2abc6a5
SHA17d31db143e7201f6e70bd5d879ef2e75e507eab3
SHA256bdef3e922619bd6d49738e47de2a77ad44a8a205e7fedee15f5b502d7f083d2c
SHA5120496f41dcc98c0ca59fa6366d00b531a8ae5a3fb1cc8dde2a98b465f173bc01c169348ea3ad7182f6c69efa9bdf3416d06fbf1d79234b83a3dfb40c6e1d52ead
-
Filesize
357KB
MD58e7aeac29b7fcfcc2c94288b4dd14a52
SHA1ce21e258957ae4f85646b84a9a7805d17914c6a1
SHA256a7576ce9c0ab90eb13235f02ea848669a3dfae3adf947a4fb0d8809bbddb9a18
SHA512a447516fd6bcb1aa2c57e95c6af101969a334a02507d24a5ebeacdac3856b4dedb8deb72e87983adfb2600ad46a76e5818f87ce07a714afb772540a9ab9105da
-
Filesize
357KB
MD58e7aeac29b7fcfcc2c94288b4dd14a52
SHA1ce21e258957ae4f85646b84a9a7805d17914c6a1
SHA256a7576ce9c0ab90eb13235f02ea848669a3dfae3adf947a4fb0d8809bbddb9a18
SHA512a447516fd6bcb1aa2c57e95c6af101969a334a02507d24a5ebeacdac3856b4dedb8deb72e87983adfb2600ad46a76e5818f87ce07a714afb772540a9ab9105da