Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe
Resource
win10v2004-20241007-en
General
-
Target
99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe
-
Size
1.2MB
-
MD5
b8b49211fcb5a4f759f980d052f417a2
-
SHA1
9148ffdb540e10a13bd49b69239fb1d2ad55fe6f
-
SHA256
99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906
-
SHA512
361d8923e501e73e8d94863964168e0c8350f42c6732d5165bf665a60d177a62662074faeba49b588d673ee010dd6a855c92948310ce3b160958153e94518a5f
-
SSDEEP
24576:iy2Yf0WM6MwjBqfKotjgc0RQQPqkhZyihFIQoSjnFv0aqWfKFsNEFRs31Y5MO:Jff0WDVjBatXU3JFfosh0aqWjNEDs3w
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 34 IoCs
resource yara_rule behavioral1/memory/1800-28-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/1800-30-0x0000000004F40000-0x0000000004F58000-memory.dmp healer behavioral1/memory/1800-34-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-32-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-42-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-58-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-56-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-52-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-50-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-47-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-44-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-40-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-38-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-36-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-55-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-48-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/1800-31-0x0000000004F40000-0x0000000004F53000-memory.dmp healer behavioral1/memory/4764-64-0x0000000002380000-0x000000000239A000-memory.dmp healer behavioral1/memory/4764-65-0x0000000004DA0000-0x0000000004DB8000-memory.dmp healer behavioral1/memory/4764-67-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-66-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-81-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-93-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-91-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-89-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-85-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-83-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-79-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-77-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-75-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-73-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-71-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-69-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/4764-87-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 261009874.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 261009874.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 261009874.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 261009874.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 261009874.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 183782900.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/2356-114-0x0000000002580000-0x00000000025BC000-memory.dmp family_redline behavioral1/memory/2356-115-0x0000000004E50000-0x0000000004E8A000-memory.dmp family_redline behavioral1/memory/2356-119-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/2356-121-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/2356-117-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline behavioral1/memory/2356-116-0x0000000004E50000-0x0000000004E85000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 359882392.exe -
Executes dropped EXE 10 IoCs
pid Process 4616 pr792534.exe 1700 ga956116.exe 4908 lo995797.exe 1800 183782900.exe 4764 261009874.exe 4876 359882392.exe 2112 oneetx.exe 2356 498678143.exe 5356 oneetx.exe 3956 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 183782900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 261009874.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ga956116.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" lo995797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pr792534.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5040 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5080 4764 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ga956116.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 183782900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 498678143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261009874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr792534.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 359882392.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lo995797.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1800 183782900.exe 1800 183782900.exe 4764 261009874.exe 4764 261009874.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1800 183782900.exe Token: SeDebugPrivilege 4764 261009874.exe Token: SeDebugPrivilege 2356 498678143.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 359882392.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4616 4864 99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe 84 PID 4864 wrote to memory of 4616 4864 99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe 84 PID 4864 wrote to memory of 4616 4864 99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe 84 PID 4616 wrote to memory of 1700 4616 pr792534.exe 86 PID 4616 wrote to memory of 1700 4616 pr792534.exe 86 PID 4616 wrote to memory of 1700 4616 pr792534.exe 86 PID 1700 wrote to memory of 4908 1700 ga956116.exe 87 PID 1700 wrote to memory of 4908 1700 ga956116.exe 87 PID 1700 wrote to memory of 4908 1700 ga956116.exe 87 PID 4908 wrote to memory of 1800 4908 lo995797.exe 88 PID 4908 wrote to memory of 1800 4908 lo995797.exe 88 PID 4908 wrote to memory of 1800 4908 lo995797.exe 88 PID 4908 wrote to memory of 4764 4908 lo995797.exe 94 PID 4908 wrote to memory of 4764 4908 lo995797.exe 94 PID 4908 wrote to memory of 4764 4908 lo995797.exe 94 PID 1700 wrote to memory of 4876 1700 ga956116.exe 98 PID 1700 wrote to memory of 4876 1700 ga956116.exe 98 PID 1700 wrote to memory of 4876 1700 ga956116.exe 98 PID 4876 wrote to memory of 2112 4876 359882392.exe 99 PID 4876 wrote to memory of 2112 4876 359882392.exe 99 PID 4876 wrote to memory of 2112 4876 359882392.exe 99 PID 4616 wrote to memory of 2356 4616 pr792534.exe 100 PID 4616 wrote to memory of 2356 4616 pr792534.exe 100 PID 4616 wrote to memory of 2356 4616 pr792534.exe 100 PID 2112 wrote to memory of 3980 2112 oneetx.exe 101 PID 2112 wrote to memory of 3980 2112 oneetx.exe 101 PID 2112 wrote to memory of 3980 2112 oneetx.exe 101 PID 2112 wrote to memory of 4772 2112 oneetx.exe 103 PID 2112 wrote to memory of 4772 2112 oneetx.exe 103 PID 2112 wrote to memory of 4772 2112 oneetx.exe 103 PID 4772 wrote to memory of 4784 4772 cmd.exe 105 PID 4772 wrote to memory of 4784 4772 cmd.exe 105 PID 4772 wrote to memory of 4784 4772 cmd.exe 105 PID 4772 wrote to memory of 4624 4772 cmd.exe 106 PID 4772 wrote to memory of 4624 4772 cmd.exe 106 PID 4772 wrote to memory of 4624 4772 cmd.exe 106 PID 4772 wrote to memory of 3124 4772 cmd.exe 107 PID 4772 wrote to memory of 3124 4772 cmd.exe 107 PID 4772 wrote to memory of 3124 4772 cmd.exe 107 PID 4772 wrote to memory of 2596 4772 cmd.exe 108 PID 4772 wrote to memory of 2596 4772 cmd.exe 108 PID 4772 wrote to memory of 2596 4772 cmd.exe 108 PID 4772 wrote to memory of 1912 4772 cmd.exe 109 PID 4772 wrote to memory of 1912 4772 cmd.exe 109 PID 4772 wrote to memory of 1912 4772 cmd.exe 109 PID 4772 wrote to memory of 1860 4772 cmd.exe 110 PID 4772 wrote to memory of 1860 4772 cmd.exe 110 PID 4772 wrote to memory of 1860 4772 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe"C:\Users\Admin\AppData\Local\Temp\99b91ad09ad87fc1386187c2aa8467d6ed3ab1aa4c2c0f1d4c7f3e1c4c672906.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr792534.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr792534.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ga956116.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ga956116.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lo995797.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lo995797.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\183782900.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\183782900.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\261009874.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\261009874.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 10766⤵
- Program crash
PID:5080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\359882392.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\359882392.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\498678143.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\498678143.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4764 -ip 47641⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5356
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5040
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5011484cfdca15ad52f7e729e12a350b9
SHA1d786c3a1f4e188814a99eaeb24c525c3266f9a5a
SHA2561e16153dcbf3b3875f33d0e9d0552cc0c39ff7c481bc82e487128b5a2129a3f9
SHA512871a709668d3ecf0d150cfc6a796c08be2f65e1e812cc0606af2ef05f208ed7a334e5dd3cc04994eaf84cb2cb0f76a7f16d9841889db31e915cb0cbe62fd98ed
-
Filesize
461KB
MD5804edc70cd8a8e1ca868232b1e9957cd
SHA1f2cb140e97ac3947b313ef72e6c905d6b0dfa07d
SHA25627a7366a7fce30755eff55d5adb9e9acc0670a1b922f7a3aabbb151051717611
SHA512bec99453b4df5da473db7c7b163e0106ead4de48124729b12f4dabfcd1536a9700cde277e6398a95789ef9a740f2da04644120d2e34bc53a4f1afc6978480453
-
Filesize
637KB
MD5c6cd49ef31e23b856f75cc7d74f9242f
SHA1894fe2238d9f2842dac19cff040534c5c606ca8e
SHA256a0cdcc32b69466bbf99042e74b36b965fbe2c7e92bf0d1adeb056d2aafe4e6fc
SHA512b815c24fa6b188d00ff31c8c0032292ce77098b9db9d02e901800e28b276efd8759c28bc3cba35545714220ce5f61fb211863009be0159903428d5ee6869b6b6
-
Filesize
205KB
MD54a27874f248e56ce7a25ba3a1ee17960
SHA134c07326d84ab24bdab8d57953db60756fd21236
SHA2563fdb73d762377d4a41043b02806fb6dd85263a6eb3f1469cc8e7d7aed86e5d53
SHA51233c9b7130c27365095150fb65c68a40d5c6eae25bb7598e1e3cfb51672f5b3adbfc3c552e0d5ad5bce22ce87d80f7eea97cb66cc87ce6ff268099a45d9798f7d
-
Filesize
465KB
MD5e8e4f481ed257d251fc07838ff4a68a5
SHA1f4c2ab1e2194111cba41b482af7d68d13ce2039b
SHA256a54a91e7d1bcca520899acf8f88b53d099af4e872ffabae72ccc1b70369f8fea
SHA5122c72516958a1038f8cb0cb6689d6d7f2a94d002caff23e54d57b95eb9e4524f27045c5bfaf5ce88a78fa451b0d36bbaaabd3d1fd9c83040b503f26ed90ab2ad5
-
Filesize
177KB
MD5ccb22c2b245dd34b81f51fff59db569c
SHA1b22ca193d2448ca73e0dda944a1de5f23bf0d05f
SHA2562e421a4204f4b58e125a2083b2f8dc4044d88865d850ef74637ed982cab548e5
SHA51268f98c7c9fecd34e3e53c94aaba5e1ca4f3173c01351feb3537b825fb0d63f2d9a2059662399fd9dee047b991865b032040f2c8e27c809957129a2c2326ae008
-
Filesize
377KB
MD5769d463033b33d8d511068838333012b
SHA1fb545253843b3b6062fa3fffb8ea704cef6b4823
SHA256d0e6ae1710fee32f963e932d88cf14765a1b0a718729c921942928278959e4e0
SHA5125c88d06d85eddfe427be3045dc5ca9dfa2907b17fe2b9731332cd5acef94cb006c6cecaa20575194b7c87965f73387189c1d23816efa77ab7be79c44284dba13