Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 20:38
Static task
static1
General
-
Target
043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe
-
Size
1.6MB
-
MD5
fcbf8c7fece02a08c3212dddafd948fa
-
SHA1
10409ec92fb876a23865750a8ad8d3fad3ac76ca
-
SHA256
043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7
-
SHA512
d9753536678bf948e5d3bd675eb0b7fc577b27fe8927aad63c646c49a50ce1d84e61e0e9ae3dbe78a2a40f07cac148a7b4bbb9e1465788a30501f75325763735
-
SSDEEP
24576:uylswzKuhoLGcK1JtG12hh1E7GSzLhh76CRmYL6gW1OgjFmre4:9lsWRWTKztIFxFQC7L63fjF
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/464-2166-0x00000000052F0000-0x00000000052FA000-memory.dmp healer behavioral1/files/0x00080000000234a3-2171.dat healer behavioral1/memory/1080-2179-0x0000000000030000-0x000000000003A000-memory.dmp healer behavioral1/memory/5600-2184-0x00000000023A0000-0x00000000023BA000-memory.dmp healer behavioral1/memory/5600-2185-0x0000000005380000-0x0000000005398000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b83632839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b83632839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b83632839.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b83632839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b83632839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b83632839.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/5944-4383-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x00080000000234a3-4388.dat family_redline behavioral1/memory/6788-4396-0x0000000000A10000-0x0000000000A3E000-memory.dmp family_redline behavioral1/files/0x00070000000234aa-4406.dat family_redline behavioral1/memory/6952-4408-0x0000000000610000-0x0000000000640000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation a33564524.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation c63837854.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation d40593754.exe -
Executes dropped EXE 15 IoCs
pid Process 4516 vy828800.exe 1552 Gb031171.exe 1016 gO048014.exe 1324 nO213324.exe 464 a33564524.exe 1080 1.exe 5600 b83632839.exe 5348 c63837854.exe 5844 oneetx.exe 5944 d40593754.exe 6788 1.exe 6848 oneetx.exe 6952 f40958537.exe 2384 oneetx.exe 6600 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b83632839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b83632839.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vy828800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Gb031171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gO048014.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" nO213324.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2728 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2140 5600 WerFault.exe 94 6884 5944 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gb031171.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d40593754.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gO048014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nO213324.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a33564524.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f40958537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vy828800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b83632839.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c63837854.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1080 1.exe 1080 1.exe 5600 b83632839.exe 5600 b83632839.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 464 a33564524.exe Token: SeDebugPrivilege 5600 b83632839.exe Token: SeDebugPrivilege 1080 1.exe Token: SeDebugPrivilege 5944 d40593754.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4516 2072 043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe 84 PID 2072 wrote to memory of 4516 2072 043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe 84 PID 2072 wrote to memory of 4516 2072 043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe 84 PID 4516 wrote to memory of 1552 4516 vy828800.exe 85 PID 4516 wrote to memory of 1552 4516 vy828800.exe 85 PID 4516 wrote to memory of 1552 4516 vy828800.exe 85 PID 1552 wrote to memory of 1016 1552 Gb031171.exe 87 PID 1552 wrote to memory of 1016 1552 Gb031171.exe 87 PID 1552 wrote to memory of 1016 1552 Gb031171.exe 87 PID 1016 wrote to memory of 1324 1016 gO048014.exe 88 PID 1016 wrote to memory of 1324 1016 gO048014.exe 88 PID 1016 wrote to memory of 1324 1016 gO048014.exe 88 PID 1324 wrote to memory of 464 1324 nO213324.exe 90 PID 1324 wrote to memory of 464 1324 nO213324.exe 90 PID 1324 wrote to memory of 464 1324 nO213324.exe 90 PID 464 wrote to memory of 1080 464 a33564524.exe 93 PID 464 wrote to memory of 1080 464 a33564524.exe 93 PID 1324 wrote to memory of 5600 1324 nO213324.exe 94 PID 1324 wrote to memory of 5600 1324 nO213324.exe 94 PID 1324 wrote to memory of 5600 1324 nO213324.exe 94 PID 1016 wrote to memory of 5348 1016 gO048014.exe 102 PID 1016 wrote to memory of 5348 1016 gO048014.exe 102 PID 1016 wrote to memory of 5348 1016 gO048014.exe 102 PID 5348 wrote to memory of 5844 5348 c63837854.exe 103 PID 5348 wrote to memory of 5844 5348 c63837854.exe 103 PID 5348 wrote to memory of 5844 5348 c63837854.exe 103 PID 1552 wrote to memory of 5944 1552 Gb031171.exe 104 PID 1552 wrote to memory of 5944 1552 Gb031171.exe 104 PID 1552 wrote to memory of 5944 1552 Gb031171.exe 104 PID 5844 wrote to memory of 2640 5844 oneetx.exe 105 PID 5844 wrote to memory of 2640 5844 oneetx.exe 105 PID 5844 wrote to memory of 2640 5844 oneetx.exe 105 PID 5844 wrote to memory of 2776 5844 oneetx.exe 106 PID 5844 wrote to memory of 2776 5844 oneetx.exe 106 PID 5844 wrote to memory of 2776 5844 oneetx.exe 106 PID 2776 wrote to memory of 4704 2776 cmd.exe 109 PID 2776 wrote to memory of 4704 2776 cmd.exe 109 PID 2776 wrote to memory of 4704 2776 cmd.exe 109 PID 2776 wrote to memory of 5816 2776 cmd.exe 110 PID 2776 wrote to memory of 5816 2776 cmd.exe 110 PID 2776 wrote to memory of 5816 2776 cmd.exe 110 PID 2776 wrote to memory of 400 2776 cmd.exe 111 PID 2776 wrote to memory of 400 2776 cmd.exe 111 PID 2776 wrote to memory of 400 2776 cmd.exe 111 PID 2776 wrote to memory of 6724 2776 cmd.exe 112 PID 2776 wrote to memory of 6724 2776 cmd.exe 112 PID 2776 wrote to memory of 6724 2776 cmd.exe 112 PID 2776 wrote to memory of 6736 2776 cmd.exe 113 PID 2776 wrote to memory of 6736 2776 cmd.exe 113 PID 2776 wrote to memory of 6736 2776 cmd.exe 113 PID 2776 wrote to memory of 6780 2776 cmd.exe 114 PID 2776 wrote to memory of 6780 2776 cmd.exe 114 PID 2776 wrote to memory of 6780 2776 cmd.exe 114 PID 5944 wrote to memory of 6788 5944 d40593754.exe 115 PID 5944 wrote to memory of 6788 5944 d40593754.exe 115 PID 5944 wrote to memory of 6788 5944 d40593754.exe 115 PID 4516 wrote to memory of 6952 4516 vy828800.exe 119 PID 4516 wrote to memory of 6952 4516 vy828800.exe 119 PID 4516 wrote to memory of 6952 4516 vy828800.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe"C:\Users\Admin\AppData\Local\Temp\043e3e2914317fdc256d1ed74c16eb91ecacbf751e9e65617003ef13d57d76a7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vy828800.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vy828800.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gb031171.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gb031171.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gO048014.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gO048014.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nO213324.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nO213324.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a33564524.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a33564524.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83632839.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83632839.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 10527⤵
- Program crash
PID:2140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c63837854.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c63837854.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5844 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:6724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:6736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:6780
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d40593754.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d40593754.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5944 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 13845⤵
- Program crash
PID:6884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f40958537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f40958537.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5600 -ip 56001⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5944 -ip 59441⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:6848
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2384
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:6600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e0de19249bf1a5d8b9a3112a4c97e57c
SHA1dffbd97a74e5fbc40d184720a41d8c98cfb7131f
SHA256c711f10a893e9a902a5402ffab7a5722f265b2e7b286a08a831b9252acb23aa9
SHA5125d1cc9b5622b61dccfc30d988a2fca343dc5fc612b553f606a01eebaeb1beca9c75c55e3c4961efd07e07140f967b5dbfb36113431099ffbb322d11fb278a345
-
Filesize
1.2MB
MD50dbaf7b091e41117a7f23a43aa8b0e81
SHA1124f562afe0fe4c5c90badd3f27fe3f63309b717
SHA2561cdceebcc4b9c79486bbd8053b7da3697cf8289e319bbfc6cd8cdf5aa42c1aa0
SHA5128e1833afe3ec918b20ae9dbf1d487641c35d1e7e36d5802d8b73779adcdaf582218319df2c3c2daec03590a67c5be7e24c313db5990dde635f65efbc248c19fa
-
Filesize
169KB
MD525b2a7ebfea8477623ccad041e45538f
SHA1215dba9d2af1fe6b1b4dd41575793a3406c5dab2
SHA256251f204427ec48ffcb3f1c8a20dbc68e0f526441a56510fe8d8c56a24ea524b3
SHA512673305d908aa090cad0801ca0ca4dab94145552ee0c81f94f8fb0d90438c156b64864de55bc28117add8bb58f0a4355b98d98518cce00e14d46778627bde5a7d
-
Filesize
574KB
MD5f0f86c12d403b43daf01e473e24e2846
SHA1202fd664bfcd626a6fa78b5c79fd558181de9eef
SHA25689fc8d02b9312606f03c217aaa5d9f88a39db2402a124dcd811fabe5e146490e
SHA512e3ef9d2984b860ef5ef62994401000a202cffe591cf6977f0500324f6a671f1f8f04eed49dea07fb5bf915677a88b999a1eeb7d908ee37fe60a09dc7ab5fddec
-
Filesize
725KB
MD5681d32894db1770a3679b0e676bdad26
SHA1b026c3df247211b914ea56002ee1b573fb5df1e8
SHA2565a3be1ee8101bd7dbaf89270c7f66190dc9d459fbbe1fc8aec3e984a53b200cd
SHA512137854d32b4059529e5d134b4e52471bfb70263b35293df2b59271479c7340eef03a1b3c59bd5637ac697ec1221b4a13b8799d585d5953fe8b53a2caedf9e8f3
-
Filesize
205KB
MD5588abfa30a62ac336d0f50c9ce50b1e2
SHA16525be76ccaac0a9ee90df86dd0cf339452bcdad
SHA256dcf05badf70737b3434d728cd3533377ee90fbcb7a74236da033b13742412942
SHA51251d5d4df343272448a04521ca354a6eaf071f16b13d72bc501892635385eabe78c121d985454bc7655027a761f6df8a10a09f9208d12344b031588207e8878ac
-
Filesize
554KB
MD59ae61136f20115dbe57ab19a208b55fe
SHA1f3430de516b0c45e710e3971279b53c0f901efb1
SHA256b8be9b29e4bf1da7b8ef470a3a6fae220c602afbf8b820fd70cada51025384f4
SHA5123865aeef3702f24f522e1bdad63ce76f5984cbb3911f81406b586b3092d9944f85bb0af587465592dffbd6be41fc5d1c5e23f6592965af40e5982fdde5d19df0
-
Filesize
303KB
MD534ea3b87b3abdd85d0610aab58b08a37
SHA154e22c80334f33d8175a7b9fdb6d34fd7bb2f2aa
SHA256a933a805aeea5efd041dcf863af2632d74108226ebf468a40cea1e91da577e43
SHA512ee3bd407fd68031381ea1a5a0a394d384b604c5b560059c3f40af21d1c436bd96b1641ccb2851be67ce40260b1997dde5b8f089f3ce8e3c5a7a4e0c644f406e1
-
Filesize
391KB
MD560f1d50806569dd01ad04b43f168a917
SHA19b2439d93f6f3164272f70fb6160f6a0dbbad874
SHA256db0965e4a69ce9c51c310a644dc0c6090b1475285304d7ab8a1870df1b9e4499
SHA51202ddef7487c5131b1b9b4650dd4b8e332c8d38c8111ff2c429b07fac948be51edd9dceb32cfb5d2f2f4c6d260dcf3ab515619b3f1ac493c7bd220dfa4db64390
-
Filesize
15KB
MD50fb684cc15d197c0b937e5528359d7c8
SHA17d963246f52f42012bdcddb31214283c84c954ed
SHA256e767d70fc57483aae7a20cb094a9bfc1fd4f04e97fb772cd6892d057e5be4260
SHA512c40335f72f802479dc0926704d87670a782362fedae5bb50179d427fc343c6a33cfe09f4640acb15624d1511d3d66f76d87f663f9ad430fc2ddb00c54056103c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf