Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe
Resource
win11-20241007-en
General
-
Target
d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe
-
Size
1.2MB
-
MD5
74b0ccf3de68e8e63088a697bccced26
-
SHA1
d3d8252558125ac843ac3c339bab3641e23a61d5
-
SHA256
d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f
-
SHA512
85de1d6d8b4ec19a3b82ecbbd41ce129742c63fd306214bb37c3005733056a7cab7c5a3765c41612a00d5e12c694f11864146e69fb723d696ce18a50caec74c9
-
SSDEEP
24576:LyfKfMXMQEseAkUF4Owq7/nqC0fIXSV8UQRBQfU3LEI:+fwMc5PCF4OhPqC0fzQLQfOL
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 34 IoCs
resource yara_rule behavioral2/memory/4324-28-0x0000000004A30000-0x0000000004A4A000-memory.dmp healer behavioral2/memory/4324-30-0x0000000004AD0000-0x0000000004AE8000-memory.dmp healer behavioral2/memory/4324-32-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-58-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-56-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-54-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-53-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-50-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-49-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-46-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-45-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-42-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-41-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-38-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-36-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-34-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/4324-31-0x0000000004AD0000-0x0000000004AE3000-memory.dmp healer behavioral2/memory/1776-64-0x00000000024C0000-0x00000000024DA000-memory.dmp healer behavioral2/memory/1776-65-0x00000000026F0000-0x0000000002708000-memory.dmp healer behavioral2/memory/1776-73-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-75-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-93-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-91-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-89-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-85-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-83-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-81-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-79-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-77-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-71-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-70-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-67-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-87-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral2/memory/1776-66-0x00000000026F0000-0x0000000002702000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 298211359.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 298211359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 298211359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 298211359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 298211359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 186127212.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/memory/4284-114-0x0000000000C60000-0x0000000000C9C000-memory.dmp family_redline behavioral2/memory/4284-115-0x0000000004DF0000-0x0000000004E2A000-memory.dmp family_redline behavioral2/memory/4284-117-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral2/memory/4284-121-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral2/memory/4284-119-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral2/memory/4284-116-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 385941545.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 4680 cZ674215.exe 4268 KB289092.exe 2080 qE215205.exe 4324 186127212.exe 1776 298211359.exe 3792 385941545.exe 2644 oneetx.exe 4284 415153552.exe 1796 oneetx.exe 4676 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 186127212.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 298211359.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cZ674215.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" KB289092.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" qE215205.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2300 1776 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cZ674215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 385941545.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 415153552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 186127212.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298211359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB289092.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qE215205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4324 186127212.exe 4324 186127212.exe 1776 298211359.exe 1776 298211359.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4324 186127212.exe Token: SeDebugPrivilege 1776 298211359.exe Token: SeDebugPrivilege 4284 415153552.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3792 385941545.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4680 3452 d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe 84 PID 3452 wrote to memory of 4680 3452 d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe 84 PID 3452 wrote to memory of 4680 3452 d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe 84 PID 4680 wrote to memory of 4268 4680 cZ674215.exe 85 PID 4680 wrote to memory of 4268 4680 cZ674215.exe 85 PID 4680 wrote to memory of 4268 4680 cZ674215.exe 85 PID 4268 wrote to memory of 2080 4268 KB289092.exe 86 PID 4268 wrote to memory of 2080 4268 KB289092.exe 86 PID 4268 wrote to memory of 2080 4268 KB289092.exe 86 PID 2080 wrote to memory of 4324 2080 qE215205.exe 87 PID 2080 wrote to memory of 4324 2080 qE215205.exe 87 PID 2080 wrote to memory of 4324 2080 qE215205.exe 87 PID 2080 wrote to memory of 1776 2080 qE215205.exe 97 PID 2080 wrote to memory of 1776 2080 qE215205.exe 97 PID 2080 wrote to memory of 1776 2080 qE215205.exe 97 PID 4268 wrote to memory of 3792 4268 KB289092.exe 102 PID 4268 wrote to memory of 3792 4268 KB289092.exe 102 PID 4268 wrote to memory of 3792 4268 KB289092.exe 102 PID 3792 wrote to memory of 2644 3792 385941545.exe 103 PID 3792 wrote to memory of 2644 3792 385941545.exe 103 PID 3792 wrote to memory of 2644 3792 385941545.exe 103 PID 4680 wrote to memory of 4284 4680 cZ674215.exe 104 PID 4680 wrote to memory of 4284 4680 cZ674215.exe 104 PID 4680 wrote to memory of 4284 4680 cZ674215.exe 104 PID 2644 wrote to memory of 3152 2644 oneetx.exe 105 PID 2644 wrote to memory of 3152 2644 oneetx.exe 105 PID 2644 wrote to memory of 3152 2644 oneetx.exe 105 PID 2644 wrote to memory of 3432 2644 oneetx.exe 106 PID 2644 wrote to memory of 3432 2644 oneetx.exe 106 PID 2644 wrote to memory of 3432 2644 oneetx.exe 106 PID 3432 wrote to memory of 2276 3432 cmd.exe 109 PID 3432 wrote to memory of 2276 3432 cmd.exe 109 PID 3432 wrote to memory of 2276 3432 cmd.exe 109 PID 3432 wrote to memory of 4968 3432 cmd.exe 110 PID 3432 wrote to memory of 4968 3432 cmd.exe 110 PID 3432 wrote to memory of 4968 3432 cmd.exe 110 PID 3432 wrote to memory of 3928 3432 cmd.exe 111 PID 3432 wrote to memory of 3928 3432 cmd.exe 111 PID 3432 wrote to memory of 3928 3432 cmd.exe 111 PID 3432 wrote to memory of 4996 3432 cmd.exe 112 PID 3432 wrote to memory of 4996 3432 cmd.exe 112 PID 3432 wrote to memory of 4996 3432 cmd.exe 112 PID 3432 wrote to memory of 1724 3432 cmd.exe 113 PID 3432 wrote to memory of 1724 3432 cmd.exe 113 PID 3432 wrote to memory of 1724 3432 cmd.exe 113 PID 3432 wrote to memory of 4852 3432 cmd.exe 114 PID 3432 wrote to memory of 4852 3432 cmd.exe 114 PID 3432 wrote to memory of 4852 3432 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe"C:\Users\Admin\AppData\Local\Temp\d1051a6e5813ae8faf78b2248f8f81592f08f8f996507fe0b322c21f5a92a84f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cZ674215.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cZ674215.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KB289092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KB289092.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qE215205.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qE215205.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\186127212.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\186127212.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\298211359.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\298211359.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 10766⤵
- Program crash
PID:2300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\385941545.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\385941545.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\415153552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\415153552.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1776 -ip 17761⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1796
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5fac510b9d09689ed6da473f4299d9842
SHA13490f68eb4c9e7bd8732c10653acd78d433c3ac0
SHA256c758a98d0ec766e3f19658ef398052f3352c2cece1058db9563918f4f4000053
SHA5121ae59a73f816ef59185b2a699860fe24e65c383b41738642fc11e31aae3272aecd48dd6dd79097507bd63feb86396f9d8c65e9a24b1c6d17092b7e7d143d0cea
-
Filesize
461KB
MD51f83c7703947d020013d1da55720af72
SHA13a3711e6d659131f3ea1b9fca6721821b3d7a95e
SHA2563bbc69bedd6ba43241f7fe993ad3085a860a4316cbbbfa301d91e74fcfdc75ab
SHA5129f1d266e021a209ad8da310b91345bd718799558711ddb28e0116f5672a57c840825aa9df831967451957112713504fc4dfd270eb7afa636710cbe011ef63391
-
Filesize
638KB
MD5c4833707e57427ae9ef317823c0856ac
SHA1b0fceeea6a88a31aee0d802db8fffa0f2b297274
SHA25650db37d6ba78f12d481ee474b72387f3f543ac7c96488fcbda035feaaf45bda5
SHA512c7a778c3210fc966f51fae28364caabeb4bbaa445a9007d775241c0c6906781b72cee4e4e6dfd518a911e2c67564f3367ef2c0f70ffd6aff53b0b7f964df936b
-
Filesize
204KB
MD5b38ef258d68b6aaf1ad2c6cfa99e3f94
SHA140ef301f931486216c9293fbfba1a0ba846cf647
SHA256e2bed58b32d53409b8a316926a462dd4c5bb4375f3268d43561ce426f0da5e94
SHA512529fc4d4ae0dcf9fa3f95e0904d68d06ab0fcf4ee6cf59df76f42587920be3f51eee5e7473f95fa25bd502bec4f15d8d0550b013b9ea3bbebe8c1de56d389a5d
-
Filesize
467KB
MD5ee0f317f44b37b2bd1d2c476cd496f80
SHA100874fed0aaf45d425d05e44561fae53f704d807
SHA2564d1ab88c142d74d9773d3f040faeb56827a7f8324a71ac635c82a8b327a9c2c3
SHA512c61447e7e0b620da890340263811a356b4173978560b72fb7cd9d520360eba4fffc8fd1fe2323afdacf91fb834dc025a18d3e73d5a193dead62bc68b1cd245a6
-
Filesize
176KB
MD51961de8005293372ef065337715b49e3
SHA1c4c4f869a66f4c173ecde374db1df30752b6de1d
SHA256f85bd9845e59c591e90363ab6170456122e213e4bc5ca7f9ad976c2b68951ccb
SHA51274ce76066fa56a4ca9818cd5fbbf4241f63bd982378c5f46909330e9c979af303b2a70f049c342fd54450a1e2a4b99131051031509efae589182c095c0277155
-
Filesize
377KB
MD581be911edfff00fe91967c45f80fa86b
SHA139319ebb19b09b46b5825f4d27436640957be112
SHA2566e7439841be72fe0401d1866629b15fe3598b24dc54362c695afd527a3c940f2
SHA5129f8baed9088c84c4bfaad6a87a810325c29aa457259a65efbd5604ff6b02d63903c3cca5aaeec7151f87137aaee00605c0ad5fd92f07046624ed89b985c6acbb
-
Filesize
11KB
MD5b7759166a0f1807b202b45f510c2172e
SHA1ef160ebdf82a6cadd27197fb589a3786e58e3fa5
SHA256825eb1a627f34c3d1fad85cb5904b5ac0fded65f677c5a85fa992e42c450fd99
SHA5125085882d85f2d3ab9fa2c2b3bfbde24072ae732b02529946700df1ee92fbafb0e7d305bf21f6034b44012d310495bc7ebd4826b226685a1cc3790b429d0169ec