Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe
Resource
win10v2004-20240426-en
General
-
Target
23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe
-
Size
1.1MB
-
MD5
01cd1332044eb8b959754e8cce1ec409
-
SHA1
0f0cfc7c3c2a4e4cb243cab0b891a06f83849203
-
SHA256
23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a
-
SHA512
bcb10af9b88962614fe194bcddc3226b8c196cb6c78ed5f30620dca16b9db25074282060d0e1b231a06b8c263016bccddbb840c1f862f5ca6ae83ef52fd55022
-
SSDEEP
24576:7yJu/fEc/XgLy4ytHgwIC/uVq3wriYBHYL34nCT3uF1ObWzs7:uA/fD/qjytDIC/aqA2GYz4nCT3ubOig
Malware Config
Extracted
amadey
3.80
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Detect ZGRat V1 6 IoCs
resource yara_rule behavioral1/memory/640-114-0x0000000004A60000-0x0000000004A9C000-memory.dmp family_zgrat_v1 behavioral1/memory/640-115-0x0000000004AE0000-0x0000000004B1A000-memory.dmp family_zgrat_v1 behavioral1/memory/640-121-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_zgrat_v1 behavioral1/memory/640-119-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_zgrat_v1 behavioral1/memory/640-117-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_zgrat_v1 behavioral1/memory/640-116-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 34 IoCs
resource yara_rule behavioral1/memory/1652-28-0x0000000004A10000-0x0000000004A2A000-memory.dmp healer behavioral1/memory/1652-30-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/1652-31-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-58-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-56-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-54-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-52-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-50-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-48-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-46-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-42-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-40-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-38-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-37-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-34-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-33-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1652-45-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/3672-64-0x0000000002400000-0x000000000241A000-memory.dmp healer behavioral1/memory/3672-65-0x00000000026C0000-0x00000000026D8000-memory.dmp healer behavioral1/memory/3672-79-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-71-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-83-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-93-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-91-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-89-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-87-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-85-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-81-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-77-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-75-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-73-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-69-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-67-0x00000000026C0000-0x00000000026D2000-memory.dmp healer behavioral1/memory/3672-66-0x00000000026C0000-0x00000000026D2000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 253948168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 253948168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 253948168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 253948168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 253948168.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/640-114-0x0000000004A60000-0x0000000004A9C000-memory.dmp family_redline behavioral1/memory/640-115-0x0000000004AE0000-0x0000000004B1A000-memory.dmp family_redline behavioral1/memory/640-121-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_redline behavioral1/memory/640-119-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_redline behavioral1/memory/640-117-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_redline behavioral1/memory/640-116-0x0000000004AE0000-0x0000000004B15000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 34 IoCs
resource yara_rule behavioral1/memory/1652-28-0x0000000004A10000-0x0000000004A2A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-30-0x0000000004AC0000-0x0000000004AD8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-31-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-58-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-56-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-54-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-52-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-50-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-48-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-46-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-42-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-40-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-38-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-37-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-34-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-33-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1652-45-0x0000000004AC0000-0x0000000004AD3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-64-0x0000000002400000-0x000000000241A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-65-0x00000000026C0000-0x00000000026D8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-79-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-71-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-83-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-93-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-91-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-89-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-87-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-85-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-81-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-77-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-75-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-73-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-69-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-67-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3672-66-0x00000000026C0000-0x00000000026D2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 6 IoCs
resource yara_rule behavioral1/memory/640-114-0x0000000004A60000-0x0000000004A9C000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/640-115-0x0000000004AE0000-0x0000000004B1A000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/640-121-0x0000000004AE0000-0x0000000004B15000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/640-119-0x0000000004AE0000-0x0000000004B15000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/640-117-0x0000000004AE0000-0x0000000004B15000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/640-116-0x0000000004AE0000-0x0000000004B15000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 343316617.exe -
Executes dropped EXE 10 IoCs
pid Process 1508 Uv339845.exe 1056 Nt937097.exe 4784 iN158839.exe 1652 156290212.exe 3672 253948168.exe 3036 343316617.exe 224 oneetx.exe 640 449423373.exe 4436 oneetx.exe 4508 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 156290212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 253948168.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Uv339845.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Nt937097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" iN158839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5036 3672 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1652 156290212.exe 1652 156290212.exe 3672 253948168.exe 3672 253948168.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1652 156290212.exe Token: SeDebugPrivilege 3672 253948168.exe Token: SeDebugPrivilege 640 449423373.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1508 2296 23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe 81 PID 2296 wrote to memory of 1508 2296 23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe 81 PID 2296 wrote to memory of 1508 2296 23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe 81 PID 1508 wrote to memory of 1056 1508 Uv339845.exe 83 PID 1508 wrote to memory of 1056 1508 Uv339845.exe 83 PID 1508 wrote to memory of 1056 1508 Uv339845.exe 83 PID 1056 wrote to memory of 4784 1056 Nt937097.exe 84 PID 1056 wrote to memory of 4784 1056 Nt937097.exe 84 PID 1056 wrote to memory of 4784 1056 Nt937097.exe 84 PID 4784 wrote to memory of 1652 4784 iN158839.exe 86 PID 4784 wrote to memory of 1652 4784 iN158839.exe 86 PID 4784 wrote to memory of 1652 4784 iN158839.exe 86 PID 4784 wrote to memory of 3672 4784 iN158839.exe 88 PID 4784 wrote to memory of 3672 4784 iN158839.exe 88 PID 4784 wrote to memory of 3672 4784 iN158839.exe 88 PID 1056 wrote to memory of 3036 1056 Nt937097.exe 92 PID 1056 wrote to memory of 3036 1056 Nt937097.exe 92 PID 1056 wrote to memory of 3036 1056 Nt937097.exe 92 PID 3036 wrote to memory of 224 3036 343316617.exe 93 PID 3036 wrote to memory of 224 3036 343316617.exe 93 PID 3036 wrote to memory of 224 3036 343316617.exe 93 PID 1508 wrote to memory of 640 1508 Uv339845.exe 94 PID 1508 wrote to memory of 640 1508 Uv339845.exe 94 PID 1508 wrote to memory of 640 1508 Uv339845.exe 94 PID 224 wrote to memory of 4624 224 oneetx.exe 95 PID 224 wrote to memory of 4624 224 oneetx.exe 95 PID 224 wrote to memory of 4624 224 oneetx.exe 95 PID 224 wrote to memory of 3660 224 oneetx.exe 97 PID 224 wrote to memory of 3660 224 oneetx.exe 97 PID 224 wrote to memory of 3660 224 oneetx.exe 97 PID 3660 wrote to memory of 1360 3660 cmd.exe 99 PID 3660 wrote to memory of 1360 3660 cmd.exe 99 PID 3660 wrote to memory of 1360 3660 cmd.exe 99 PID 3660 wrote to memory of 2396 3660 cmd.exe 100 PID 3660 wrote to memory of 2396 3660 cmd.exe 100 PID 3660 wrote to memory of 2396 3660 cmd.exe 100 PID 3660 wrote to memory of 1064 3660 cmd.exe 101 PID 3660 wrote to memory of 1064 3660 cmd.exe 101 PID 3660 wrote to memory of 1064 3660 cmd.exe 101 PID 3660 wrote to memory of 2920 3660 cmd.exe 102 PID 3660 wrote to memory of 2920 3660 cmd.exe 102 PID 3660 wrote to memory of 2920 3660 cmd.exe 102 PID 3660 wrote to memory of 4360 3660 cmd.exe 103 PID 3660 wrote to memory of 4360 3660 cmd.exe 103 PID 3660 wrote to memory of 4360 3660 cmd.exe 103 PID 3660 wrote to memory of 3632 3660 cmd.exe 104 PID 3660 wrote to memory of 3632 3660 cmd.exe 104 PID 3660 wrote to memory of 3632 3660 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe"C:\Users\Admin\AppData\Local\Temp\23fba2c2ae34608d478a900d31c322eb8ff88cab230848ad9664699ae8fce28a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uv339845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uv339845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nt937097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nt937097.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iN158839.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iN158839.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\156290212.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\156290212.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\253948168.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\253948168.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 10806⤵
- Program crash
PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\343316617.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\343316617.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵PID:2396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵PID:1064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"7⤵PID:4360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E7⤵PID:3632
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\449423373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\449423373.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3672 -ip 36721⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4436
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
993KB
MD540db4ec774e00ad765b8f6f9d4e5d8c0
SHA1e7d52703cacf54563107adcbe14014e7925f17db
SHA256505ac42abf815ff774aaef235a08e2e9a4641cf5047b9b39c29e0d569d86f975
SHA5121ff82a38ba26dc5dab610bd9a106f15658458b7b72039f7d27d56962532dc65dcb12c2b9c4b75ecd5643ac0384c83fd6733af3b23f895bfa267a07649e043f1d
-
Filesize
415KB
MD5517d2a88dc40fbed026000098137614e
SHA188241dee5dbbb420e31e3384ea200a936444a64b
SHA2561f14ff1a3bec8b38b0dcb90c48c6059892d7409e6877131e8a109b15f357ab95
SHA51298178f3ef8b772e911e70bb8593d7996cd7c771fa0f408609f2713e8453858c7ae3a7d179c19129ea3818488d87eef1e97d8320320f46eb22985320d523984e1
-
Filesize
609KB
MD55c09f4f206ac9712ebe1f9b699ffc12b
SHA15c2403c884d94765ad94dcd1cebc285128bb05c2
SHA256329c5f33db93271feb930cdb1a0bc9fd2accbcea714fde4521a1ce2f3a394ff6
SHA5125439d942e958ff871c7ff2e49f4e992d263c273dcc3f508acf11b2d77aedfb5e6c4c98c4e2a914f151b3790c0706ea92430c3e06464ae1c2a8f671c208161fd0
-
Filesize
204KB
MD5d5f76b45ca024975642cb5922f431ca0
SHA131d4c90be2c0ea7b72a7cc47dcbaf19acf3b611b
SHA256c0efdbc48d3fead12a051f6a37c36372f220090bd35b6254e0d20c81fd7e5c30
SHA512b3820a7c76f74265fc8f8ab8b8b45701c73b5f3597cdc737e833206cba2e107f8d6cf6b36c5f2b7660b2e5cc90d09a6de8cb76a5d27287efc11970c2cd6c92f1
-
Filesize
437KB
MD5791cfc3c5902051fa7f92affe12fd4c7
SHA1774e8fef815388c7a9453e72fb47e73b61ba1bc3
SHA25648023a9d4a5e8aa35a99d1f32aedbe2d35b70e04df8bf4040e58e959c59f740e
SHA512135e073b2ac0952385096faf3061bd90998db428920f03a62e8abd65a36e0bb9e6611fa67105b927a9b2d4c10ff7446567c2bc260b9e65beae4e51b15911814c
-
Filesize
175KB
MD53d8bd03b2fc9de52e7164547fcd8a9f4
SHA1c223e4a232feecfff267ebcf68e4e2b486ef99c9
SHA256c21b053de1cafdc4afc86926438dc6c08ddda6c570fdff93f5f07c474bc358f0
SHA512f4cb9cf687ddb57dfef47471deadf7c3c2ae08b3db0871ed661deb5f7a541dc52b58d36c537638768c693a21956994ae46053a09209008c3501cf4803700ab77
-
Filesize
332KB
MD5d12ac6a0fb2bcc77826019b7185e0c45
SHA1032170314e9d384d8ca7c8213d1ec9b678f85c77
SHA2568bef91225deb2c0271fc5011628a13618bce9a0ab56173fe66dae8eae45ec2ca
SHA512a5fb2e55ecd88b678da9857a63161a7c3e0c4a3e58c796bb32909bf45ce4d13ec7ee18a0992807972d143555b5e9a0e387e91257581d21abd017a81284989290