Analysis
-
max time kernel
36s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
29-10-2023 11:38
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
General
-
Target
tmp.exe
-
Size
4.0MB
-
MD5
229df5fd5f850d26bb0b0a05f0918e9a
-
SHA1
400871984e6d833956f06734d7be5d8b7c8cb997
-
SHA256
4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
-
SHA512
1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
SSDEEP
98304:dCUPT4Mzeh+6D6UH+phuRO5bezZvSZ0NOk/Lg8eSjD:dCwe4O7H45bezZvIaOk/LgbSjD
Malware Config
Extracted
amadey
3.80
http://45.15.156.208/jd9dd3Vw/index.php
http://second.amadgood.com/jd9dd3Vw/index.php
-
install_dir
eb0f58bce7
-
install_file
oneetx.exe
-
strings_key
2b74c848ebcfe9bcac3cd4aec559934c
Extracted
laplas
http://206.189.229.43
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2712-200-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2712-201-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2712-290-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
rdpcllp.exedescription pid process target process PID 748 created 1256 748 rdpcllp.exe Explorer.EXE PID 748 created 1256 748 rdpcllp.exe Explorer.EXE PID 748 created 1256 748 rdpcllp.exe Explorer.EXE PID 748 created 1256 748 rdpcllp.exe Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
taskhostclp.exetaskhostclp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostclp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostclp.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
rdpcllp.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts rdpcllp.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
taskhostclp.exetaskhostclp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostclp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostclp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostclp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostclp.exe -
Executes dropped EXE 6 IoCs
Processes:
oneetx.exeoneetx.exetaskhostclp.exetaskhostclp.exerdpcllp.exetaskmask.exepid process 2636 oneetx.exe 1752 oneetx.exe 2808 taskhostclp.exe 1716 taskhostclp.exe 748 rdpcllp.exe 2008 taskmask.exe -
Loads dropped DLL 6 IoCs
Processes:
tmp.exeoneetx.exepid process 2576 tmp.exe 2636 oneetx.exe 2636 oneetx.exe 2636 oneetx.exe 2636 oneetx.exe 2636 oneetx.exe -
Processes:
resource yara_rule behavioral1/memory/2576-0-0x0000000000120000-0x0000000000775000-memory.dmp vmprotect \Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect behavioral1/memory/2636-12-0x0000000000A80000-0x00000000010D5000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect behavioral1/memory/1752-21-0x0000000000A80000-0x00000000010D5000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect behavioral1/memory/1760-277-0x0000000000A80000-0x00000000010D5000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe vmprotect -
Processes:
taskhostclp.exetaskhostclp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostclp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostclp.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
taskhostclp.exetaskhostclp.exepid process 2808 taskhostclp.exe 1716 taskhostclp.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 952 sc.exe 2336 sc.exe 592 sc.exe 1292 sc.exe 1772 sc.exe 2276 sc.exe 2484 sc.exe 2152 sc.exe 2796 sc.exe 332 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2756 schtasks.exe 1312 schtasks.exe 2904 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
rdpcllp.exetaskmask.exepowershell.exepid process 748 rdpcllp.exe 2008 taskmask.exe 2008 taskmask.exe 748 rdpcllp.exe 748 rdpcllp.exe 2136 powershell.exe 748 rdpcllp.exe 748 rdpcllp.exe 748 rdpcllp.exe 748 rdpcllp.exe 748 rdpcllp.exe 748 rdpcllp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskmask.exepowershell.exedescription pid process Token: SeDebugPrivilege 2008 taskmask.exe Token: SeDebugPrivilege 2136 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
tmp.exepid process 2576 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exeoneetx.execmd.exetaskeng.execmd.exedescription pid process target process PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2576 wrote to memory of 2636 2576 tmp.exe oneetx.exe PID 2636 wrote to memory of 2756 2636 oneetx.exe schtasks.exe PID 2636 wrote to memory of 2756 2636 oneetx.exe schtasks.exe PID 2636 wrote to memory of 2756 2636 oneetx.exe schtasks.exe PID 2636 wrote to memory of 2756 2636 oneetx.exe schtasks.exe PID 2636 wrote to memory of 2752 2636 oneetx.exe cmd.exe PID 2636 wrote to memory of 2752 2636 oneetx.exe cmd.exe PID 2636 wrote to memory of 2752 2636 oneetx.exe cmd.exe PID 2636 wrote to memory of 2752 2636 oneetx.exe cmd.exe PID 2752 wrote to memory of 2352 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2352 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2352 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2352 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2724 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2724 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2724 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2724 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2520 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2520 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2520 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2520 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2668 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2668 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2668 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2668 2752 cmd.exe cmd.exe PID 2752 wrote to memory of 2632 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2632 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2632 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 2632 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 1928 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 1928 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 1928 2752 cmd.exe cacls.exe PID 2752 wrote to memory of 1928 2752 cmd.exe cacls.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2516 wrote to memory of 1752 2516 taskeng.exe oneetx.exe PID 2636 wrote to memory of 2808 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 2808 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 2808 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 2808 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 1716 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 1716 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 1716 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 1716 2636 oneetx.exe taskhostclp.exe PID 2636 wrote to memory of 748 2636 oneetx.exe rdpcllp.exe PID 2636 wrote to memory of 748 2636 oneetx.exe rdpcllp.exe PID 2636 wrote to memory of 748 2636 oneetx.exe rdpcllp.exe PID 2636 wrote to memory of 748 2636 oneetx.exe rdpcllp.exe PID 2636 wrote to memory of 2008 2636 oneetx.exe taskmask.exe PID 2636 wrote to memory of 2008 2636 oneetx.exe taskmask.exe PID 2636 wrote to memory of 2008 2636 oneetx.exe taskmask.exe PID 2636 wrote to memory of 2008 2636 oneetx.exe taskmask.exe PID 836 wrote to memory of 1292 836 cmd.exe sc.exe PID 836 wrote to memory of 1292 836 cmd.exe sc.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"5⤵PID:2632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E5⤵PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe"C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1000176101\taskhostclp.exe"C:\Users\Admin\AppData\Local\Temp\1000176101\taskhostclp.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1716 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000172101\rdpcllp.exe"C:\Users\Admin\AppData\Local\Temp\1000172101\rdpcllp.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\1000177001\taskmask.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\taskmask.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:2712
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1292
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2336
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2276
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:992
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1312
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1152
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2100
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2228
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1880
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2088
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:2812
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:2904
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2052
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1992
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1496
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1348
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1548
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2272
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2400
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1E8A3DEB-1072-440F-88CE-89F57032AA20} S-1-5-21-3618187007-3650799920-3290345941-1000:BPDFUYWR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe2⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe2⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe2⤵PID:2736
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {708AC835-BE1D-4203-B4DF-69C057B9BD94} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1692
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵PID:2536
-
-
C:\Windows\System32\sc.exesc stop UsoSvc1⤵
- Launches sc.exe
PID:2484
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc1⤵
- Launches sc.exe
PID:2152
-
C:\Windows\System32\sc.exesc stop wuauserv1⤵
- Launches sc.exe
PID:2796
-
C:\Windows\System32\sc.exesc stop bits1⤵
- Launches sc.exe
PID:332
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵PID:2832
-
C:\Windows\System32\sc.exesc stop dosvc1⤵
- Launches sc.exe
PID:592
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
585KB
MD55b56d98cd74aa5c75d81ec033c2cefe7
SHA17ade139a319ad78d3d7f972b5448a002552c8e89
SHA256e70e6627d0d23b3ef43f8d3d5b4466b08002d3492c4e54c149005deb68f90b34
SHA512846f9aabf7cd6e6790d9e5d973cadbbda00060a23d9ae4c91c2dae32307ae12ec04fc336c015713336ac5559864ae7e54295779f8eaab3fb6b4457600cd4b73a
-
Filesize
585KB
MD55b56d98cd74aa5c75d81ec033c2cefe7
SHA17ade139a319ad78d3d7f972b5448a002552c8e89
SHA256e70e6627d0d23b3ef43f8d3d5b4466b08002d3492c4e54c149005deb68f90b34
SHA512846f9aabf7cd6e6790d9e5d973cadbbda00060a23d9ae4c91c2dae32307ae12ec04fc336c015713336ac5559864ae7e54295779f8eaab3fb6b4457600cd4b73a
-
Filesize
585KB
MD55b56d98cd74aa5c75d81ec033c2cefe7
SHA17ade139a319ad78d3d7f972b5448a002552c8e89
SHA256e70e6627d0d23b3ef43f8d3d5b4466b08002d3492c4e54c149005deb68f90b34
SHA512846f9aabf7cd6e6790d9e5d973cadbbda00060a23d9ae4c91c2dae32307ae12ec04fc336c015713336ac5559864ae7e54295779f8eaab3fb6b4457600cd4b73a
-
Filesize
70KB
MD5268294cddba6f23edcc0f82e157e04d4
SHA15f04546d700c8ebb41c6701d8a62e1742b9e92df
SHA2564e8ec6d7e08d22bf8e26b06ff83ee9c2c5f8de18d6dfc682f7c3fa559d44f7e5
SHA5121730d26d2eb041d5b11f1ff9d59e3ded5bd4748f1c2f756c16f527ed310317407f6dc951bb6786ce1f46b667dd5de3078e1b18a5e0f140c61d30acb661adb19a
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54664018fe17420e883ecb29c97636e15
SHA1c3cd238f6f2fc8d8791a6be3b8054e4239ab8dea
SHA2562085f78c98b46ced24ba3693b99c5d7a279e938a5e8d9f58e5ff87d2a78bcf72
SHA512d64b8e80f236202cf6adc7bdc9b724a4e6eaa7c31932cd503794bab44f9d7b1b539c9e20e57421908fb7195b255286d782d465386b9518041c04a66e5346a2b8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\88H33T9XVOMS866065FS.temp
Filesize7KB
MD54664018fe17420e883ecb29c97636e15
SHA1c3cd238f6f2fc8d8791a6be3b8054e4239ab8dea
SHA2562085f78c98b46ced24ba3693b99c5d7a279e938a5e8d9f58e5ff87d2a78bcf72
SHA512d64b8e80f236202cf6adc7bdc9b724a4e6eaa7c31932cd503794bab44f9d7b1b539c9e20e57421908fb7195b255286d782d465386b9518041c04a66e5346a2b8
-
Filesize
530.4MB
MD5c6ed99160a4044bed61b5252cc770128
SHA1b68f2686413c9d160f941c0cb491fe0ff1381125
SHA25693b4044da51025eeee399c02a834d1433c8ffe76db2ac428b503f2bd6b711117
SHA512a0f933fbd3246c7cd9e6156793cfe1e6e373e79fabb3e988ae98530cc63b953043afa58dd69494baa12ff183eedea4298f8c68d82fc998e1190e72c115152e4d
-
Filesize
424.5MB
MD54ead8f3f3dc3e08d9249ce247b6880e3
SHA1ef303d67a0d14931a8d187f46957f2f4abf49d2d
SHA2564aaad3f9f5462d7b175eb913a83e7d0efaeb30a08b2efb826ea91754fd5ac5ed
SHA5124382cdc596d03eccd1a89d2ea03cfb7897c2327099c0d00d110b242e60ef2ca3695a91339afc484b4c53114207b2d222678fea2e52a84fcf2169089b2867e624
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
8.4MB
MD55470f2b4551c01297fa917f58f3fcf80
SHA1b8fec9b196afc4910b0b1dc7ba5ee092afc36d7f
SHA256dbe0dc775743def42cc76a8cc692907fac744dbeef1255f6093f4487195ab182
SHA512f406190c98925da974ed0874d0ee2124ba769404d17a5c6c345c896359f54169a8c3f6b56a9109c0726846340e09784b96e460345957fda85f1d7e0150a7a91f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
585KB
MD55b56d98cd74aa5c75d81ec033c2cefe7
SHA17ade139a319ad78d3d7f972b5448a002552c8e89
SHA256e70e6627d0d23b3ef43f8d3d5b4466b08002d3492c4e54c149005deb68f90b34
SHA512846f9aabf7cd6e6790d9e5d973cadbbda00060a23d9ae4c91c2dae32307ae12ec04fc336c015713336ac5559864ae7e54295779f8eaab3fb6b4457600cd4b73a
-
Filesize
585KB
MD55b56d98cd74aa5c75d81ec033c2cefe7
SHA17ade139a319ad78d3d7f972b5448a002552c8e89
SHA256e70e6627d0d23b3ef43f8d3d5b4466b08002d3492c4e54c149005deb68f90b34
SHA512846f9aabf7cd6e6790d9e5d973cadbbda00060a23d9ae4c91c2dae32307ae12ec04fc336c015713336ac5559864ae7e54295779f8eaab3fb6b4457600cd4b73a
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
428.7MB
MD5c186631fa24effc3f0a4f37ed6a4830e
SHA15a33661f93cb6398ead494e119a3e48527fc5b5f
SHA256ce2545b70c567be78a6942a2fb56817870921c6c8084071e887e0a3e2b770907
SHA51230030c1a630a58e4b71897da7a2ee363d7a613fa86e79662509b190708e8da02c79f6870606f2fb856b05ce25d66fe4375005a337d6f115f1a2c52994f021df4