Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:34
Static task
static1
General
-
Target
3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe
-
Size
1.3MB
-
MD5
0fc28c08ebdb843cf3312c3966116550
-
SHA1
b37dc296d1bc0cb3f743aec33be45c56eec9e90d
-
SHA256
3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65c
-
SHA512
c3dcb8ea92fe8cd8d89310350c2645c79ae047f42c1005b6b968ee89526cf7b6dbb7b2cc931624a10972f2add31f04e0fa9f2137ee64b5b02845450c23903595
-
SSDEEP
24576:zyhLoM/ZxzMKnBGtlEQr1Us1KRZFGJEQYySt8aQjgjyrOYKIqmQ5:G/vzPIt2QrBsRZIWQYl+JUyfqm
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2172-2152-0x00000000052F0000-0x00000000052FA000-memory.dmp healer behavioral1/files/0x0002000000022a9d-2157.dat healer behavioral1/memory/1696-2168-0x0000000000150000-0x000000000015A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1284-6467-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x0002000000022a9d-6472.dat family_redline behavioral1/memory/228-6480-0x0000000000310000-0x000000000033E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation c23098701.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation d44648248.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation a32496626.exe -
Executes dropped EXE 11 IoCs
pid Process 3092 ha862242.exe 2672 sq714637.exe 2172 a32496626.exe 1696 1.exe 776 b46933755.exe 5352 c23098701.exe 3000 oneetx.exe 1284 d44648248.exe 228 1.exe 3064 oneetx.exe 5404 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ha862242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sq714637.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5032 776 WerFault.exe 90 5772 1284 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b46933755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sq714637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a32496626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d44648248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha862242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c23098701.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1696 1.exe 1696 1.exe 1696 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2172 a32496626.exe Token: SeDebugPrivilege 776 b46933755.exe Token: SeDebugPrivilege 1696 1.exe Token: SeDebugPrivilege 1284 d44648248.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4552 wrote to memory of 3092 4552 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe 83 PID 4552 wrote to memory of 3092 4552 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe 83 PID 4552 wrote to memory of 3092 4552 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe 83 PID 3092 wrote to memory of 2672 3092 ha862242.exe 85 PID 3092 wrote to memory of 2672 3092 ha862242.exe 85 PID 3092 wrote to memory of 2672 3092 ha862242.exe 85 PID 2672 wrote to memory of 2172 2672 sq714637.exe 86 PID 2672 wrote to memory of 2172 2672 sq714637.exe 86 PID 2672 wrote to memory of 2172 2672 sq714637.exe 86 PID 2172 wrote to memory of 1696 2172 a32496626.exe 89 PID 2172 wrote to memory of 1696 2172 a32496626.exe 89 PID 2672 wrote to memory of 776 2672 sq714637.exe 90 PID 2672 wrote to memory of 776 2672 sq714637.exe 90 PID 2672 wrote to memory of 776 2672 sq714637.exe 90 PID 3092 wrote to memory of 5352 3092 ha862242.exe 102 PID 3092 wrote to memory of 5352 3092 ha862242.exe 102 PID 3092 wrote to memory of 5352 3092 ha862242.exe 102 PID 5352 wrote to memory of 3000 5352 c23098701.exe 103 PID 5352 wrote to memory of 3000 5352 c23098701.exe 103 PID 5352 wrote to memory of 3000 5352 c23098701.exe 103 PID 4552 wrote to memory of 1284 4552 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe 104 PID 4552 wrote to memory of 1284 4552 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe 104 PID 4552 wrote to memory of 1284 4552 3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe 104 PID 3000 wrote to memory of 2768 3000 oneetx.exe 105 PID 3000 wrote to memory of 2768 3000 oneetx.exe 105 PID 3000 wrote to memory of 2768 3000 oneetx.exe 105 PID 3000 wrote to memory of 4504 3000 oneetx.exe 107 PID 3000 wrote to memory of 4504 3000 oneetx.exe 107 PID 3000 wrote to memory of 4504 3000 oneetx.exe 107 PID 4504 wrote to memory of 5652 4504 cmd.exe 109 PID 4504 wrote to memory of 5652 4504 cmd.exe 109 PID 4504 wrote to memory of 5652 4504 cmd.exe 109 PID 4504 wrote to memory of 5772 4504 cmd.exe 117 PID 4504 wrote to memory of 5772 4504 cmd.exe 117 PID 4504 wrote to memory of 5772 4504 cmd.exe 117 PID 4504 wrote to memory of 5976 4504 cmd.exe 111 PID 4504 wrote to memory of 5976 4504 cmd.exe 111 PID 4504 wrote to memory of 5976 4504 cmd.exe 111 PID 4504 wrote to memory of 4744 4504 cmd.exe 112 PID 4504 wrote to memory of 4744 4504 cmd.exe 112 PID 4504 wrote to memory of 4744 4504 cmd.exe 112 PID 4504 wrote to memory of 748 4504 cmd.exe 113 PID 4504 wrote to memory of 748 4504 cmd.exe 113 PID 4504 wrote to memory of 748 4504 cmd.exe 113 PID 4504 wrote to memory of 5416 4504 cmd.exe 114 PID 4504 wrote to memory of 5416 4504 cmd.exe 114 PID 4504 wrote to memory of 5416 4504 cmd.exe 114 PID 1284 wrote to memory of 228 1284 d44648248.exe 115 PID 1284 wrote to memory of 228 1284 d44648248.exe 115 PID 1284 wrote to memory of 228 1284 d44648248.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe"C:\Users\Admin\AppData\Local\Temp\3e0623fc0e9f90d1cd3f67993a00a5cb3e038f7d0d0e327f7e3060a313f6f65cN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ha862242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ha862242.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sq714637.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sq714637.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a32496626.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a32496626.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b46933755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b46933755.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 12645⤵
- Program crash
PID:5032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c23098701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c23098701.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5352 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:5652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:5976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:5416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d44648248.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d44648248.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 14963⤵
- Program crash
PID:5772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 776 -ip 7761⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1284 -ip 12841⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3064
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582KB
MD5732a8acda72fd2b24ce7bb84fab7712a
SHA132edc9ff456b2337b460898f2c8a5df7d6dfebd7
SHA256fe88b3c89fe48150d093bb14a7c36c3918c3cb10263dd976939515fb94e90426
SHA512bb79dcd71419cd36f7f9e89381bb07a9c48f60cab26b559028773f8dcb1bd2faec4ff4984a59a071c45ecc34c5a96cd7d7127aec2465a723e9fd735315713d60
-
Filesize
851KB
MD57e78ba5d1442b11de077d1f02ba9a774
SHA15783df5c8e4a00be2b23f8ef1054d2b7c1977649
SHA256027a0d640033e9b75484a960ceefb26c965bf669784e1aea073f15a8fa88692e
SHA5120cf36268ec8b157f50066b4144d90abc4c7c777e18b8ad99f30dfaf2999ad3b27e5a8339bb33abc4761f73f4c3e8ca0c5aab1183a60040ce8dfd73cea6a22770
-
Filesize
205KB
MD5736af50d3821b02d6cca44a59f8c0bde
SHA173e8ab8485e3a90c98458a7f54e422c0c4e71889
SHA2568ec052c09b77874235db5f8bf6c1071aaf1e383497ef3b7dd90cef10af927e00
SHA512b4b6e978cc13a91ae9d585ff468bd3161fb7cc769c8de8407a5ee8d25252c78c8114d7a3f77d7cd1ba7eac75597f002960bc464f8cbe5fd47d310edf92ffa813
-
Filesize
679KB
MD53ac81a007ab768495e970a7ed6f08b4e
SHA124eda9b30f5ee6da5110c13cb11d4773a2dd260b
SHA2569e8744a05ade3c909d736d3d1833d1e9d21997804ffaea3b12b3aa6da3b99c81
SHA5125d904726b51b6295c2f6cd02e001e9299bb109019ee12fe9ac468b4c08cbe545061e784d2bc6e29283e6ed1e92f830c07c1bd5fbe9c2eef81cdf14c531c1bef3
-
Filesize
302KB
MD54ed052debd9cf44169068e7426d61a42
SHA153b45b5e9b96d37ae97e27c36c9976b918d60cdc
SHA25601653aeea3b471b4d5a4dcea1056a6645470a9ecf6f682afbcff390401b14922
SHA5120710ac0d8c0b0396132c68a05ebeba5810b93565025d5d10c784083321a89c84b32da95d810b8dc0ec3ea82ee7c765e6a0dc440c2d04dd1fe905046527ff15e9
-
Filesize
521KB
MD53333eeb66015211a910c224ab6756093
SHA103646faed971d5f3c54fb7e6e30710e661f4dede
SHA256a3f412624115b1e07c275612af91037bef2ea43a12d0fa7252d79589c2700f10
SHA512963246eedb23012099eab0c4e2e2400e20f785643ffd1bbc7198f6d763a75f5071ede03e69a22836ea28084a111a80b99f89b1d574dbf514365307a3398edf59
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf