Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:03
Static task
static1
General
-
Target
7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe
-
Size
1.3MB
-
MD5
7a707ae44359834650d2f9c9b340a3fc
-
SHA1
f84479413811ad06ee0834864539233abadedb08
-
SHA256
26268ca4429be1b11d4ab2c8d1a67e78e0fbc5d686689ae84612acad4a838de1
-
SHA512
100693d3e409de13c094855134c92c3793200e5c6041f1350530b85f2f384e18bab6af955501456322c9b2135593029880291661ec695495d6cd99f294b5e6fb
-
SSDEEP
24576:wyDg6W2FWfVOEUktKPgfLEa4a2ufpPRAXBjuKVeZr7pqvs3kHIuB:3Dg6WlfkEJtoVa4a2ufppkuKVeZrg036
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2076-2152-0x00000000052F0000-0x00000000052FA000-memory.dmp healer behavioral1/files/0x0002000000022ef8-2157.dat healer behavioral1/memory/5484-2167-0x0000000000CD0000-0x0000000000CDA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/5660-6467-0x0000000005750000-0x0000000005782000-memory.dmp family_redline behavioral1/files/0x0002000000022ef8-6472.dat family_redline behavioral1/memory/4084-6480-0x00000000008C0000-0x00000000008EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 483139374.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 182740766.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 345763959.exe -
Executes dropped EXE 11 IoCs
pid Process 4512 Tk262894.exe 5000 pa464182.exe 2076 182740766.exe 5484 1.exe 4680 242902651.exe 5180 345763959.exe 5640 oneetx.exe 5660 483139374.exe 4084 1.exe 4872 oneetx.exe 760 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Tk262894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pa464182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 6120 4680 WerFault.exe 90 524 5660 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 242902651.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 345763959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483139374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pa464182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 182740766.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tk262894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5484 1.exe 5484 1.exe 5484 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2076 182740766.exe Token: SeDebugPrivilege 4680 242902651.exe Token: SeDebugPrivilege 5484 1.exe Token: SeDebugPrivilege 5660 483139374.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5180 345763959.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1228 wrote to memory of 4512 1228 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe 84 PID 1228 wrote to memory of 4512 1228 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe 84 PID 1228 wrote to memory of 4512 1228 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe 84 PID 4512 wrote to memory of 5000 4512 Tk262894.exe 86 PID 4512 wrote to memory of 5000 4512 Tk262894.exe 86 PID 4512 wrote to memory of 5000 4512 Tk262894.exe 86 PID 5000 wrote to memory of 2076 5000 pa464182.exe 88 PID 5000 wrote to memory of 2076 5000 pa464182.exe 88 PID 5000 wrote to memory of 2076 5000 pa464182.exe 88 PID 2076 wrote to memory of 5484 2076 182740766.exe 89 PID 2076 wrote to memory of 5484 2076 182740766.exe 89 PID 5000 wrote to memory of 4680 5000 pa464182.exe 90 PID 5000 wrote to memory of 4680 5000 pa464182.exe 90 PID 5000 wrote to memory of 4680 5000 pa464182.exe 90 PID 4512 wrote to memory of 5180 4512 Tk262894.exe 98 PID 4512 wrote to memory of 5180 4512 Tk262894.exe 98 PID 4512 wrote to memory of 5180 4512 Tk262894.exe 98 PID 5180 wrote to memory of 5640 5180 345763959.exe 99 PID 5180 wrote to memory of 5640 5180 345763959.exe 99 PID 5180 wrote to memory of 5640 5180 345763959.exe 99 PID 1228 wrote to memory of 5660 1228 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe 100 PID 1228 wrote to memory of 5660 1228 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe 100 PID 1228 wrote to memory of 5660 1228 7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe 100 PID 5640 wrote to memory of 4832 5640 oneetx.exe 101 PID 5640 wrote to memory of 4832 5640 oneetx.exe 101 PID 5640 wrote to memory of 4832 5640 oneetx.exe 101 PID 5640 wrote to memory of 1944 5640 oneetx.exe 103 PID 5640 wrote to memory of 1944 5640 oneetx.exe 103 PID 5640 wrote to memory of 1944 5640 oneetx.exe 103 PID 1944 wrote to memory of 5396 1944 cmd.exe 105 PID 1944 wrote to memory of 5396 1944 cmd.exe 105 PID 1944 wrote to memory of 5396 1944 cmd.exe 105 PID 1944 wrote to memory of 2044 1944 cmd.exe 106 PID 1944 wrote to memory of 2044 1944 cmd.exe 106 PID 1944 wrote to memory of 2044 1944 cmd.exe 106 PID 1944 wrote to memory of 4452 1944 cmd.exe 107 PID 1944 wrote to memory of 4452 1944 cmd.exe 107 PID 1944 wrote to memory of 4452 1944 cmd.exe 107 PID 1944 wrote to memory of 1168 1944 cmd.exe 108 PID 1944 wrote to memory of 1168 1944 cmd.exe 108 PID 1944 wrote to memory of 1168 1944 cmd.exe 108 PID 1944 wrote to memory of 4684 1944 cmd.exe 109 PID 1944 wrote to memory of 4684 1944 cmd.exe 109 PID 1944 wrote to memory of 4684 1944 cmd.exe 109 PID 1944 wrote to memory of 3016 1944 cmd.exe 110 PID 1944 wrote to memory of 3016 1944 cmd.exe 110 PID 1944 wrote to memory of 3016 1944 cmd.exe 110 PID 5660 wrote to memory of 4084 5660 483139374.exe 111 PID 5660 wrote to memory of 4084 5660 483139374.exe 111 PID 5660 wrote to memory of 4084 5660 483139374.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe"C:\Users\Admin\AppData\Local\Temp\7680e5f1e705e8a5f78be6dde2bfacfdf7f0e04508965a93e17da0da4d70f997N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tk262894.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tk262894.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pa464182.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pa464182.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\182740766.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\182740766.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\242902651.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\242902651.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 12605⤵
- Program crash
PID:6120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\345763959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\345763959.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5180 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\483139374.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\483139374.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5660 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 11763⤵
- Program crash
PID:524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4680 -ip 46801⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5660 -ip 56601⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4872
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD5b585ab09b7abcc682ff89dc7e774916c
SHA1d6dc3a2614d6296c571e8309d924879a45a438fa
SHA2561bc96336ead93ad620180f18dbe41365b1304eece422c8b5b895c4fa3525a0ef
SHA51219283ebeb30483826d50bb71005b460758cb331539d8aaab81e2e18b495ea46e35b7818650e8395e925681da30b24d3c360e3816abf7e66e68cc05ac9da8d157
-
Filesize
871KB
MD58e42a4e5a5e05967ea5dcace8ece56c1
SHA1979e4d34f67b6ea36afac7c02f492141b28e020f
SHA2567b6b764d1eb17d8b169f8a363fb17654b6a04170ff1ca370827412b38a4e06f0
SHA5120d11280f2d9a7976c732296ce559afe08041986a1963df93edde0ec6223c317a9f08d405bcd175399dde3f5c32fff8d65c3e09dfc97a26ca1770baca47c35069
-
Filesize
204KB
MD5112a9b524e8ee1362ca9cbf9a76617a8
SHA1b60ffd74a6fffefbdd78dc61f1576a665ba7e017
SHA256de5c6910f818084f08cf0d9789ca77e61a01f0b910864d7b2975057c537a27db
SHA512d9ae96fd9fb56bbb6c1f9d8b5cbedb2ad8f33ae2fb0e3fc3829c32f5cd2a87c8fc32b6f77049ee2c892e62c801070cf5eb04e6611550be5db8e2b165dc3ffe0e
-
Filesize
700KB
MD59ba60913cc315509b2664620aeb414ec
SHA17164bc9a2c2f16f96dc0dd1d7d70b2a89713c8ab
SHA25687e601f268b269e2a5fddf8548e7b6503621b399683b55ecd6ee3f0dd061152c
SHA512d1c05a4a68679b9bacc36b7d0f1ca0b2321064946b79fb8437ad391bcd4317a98ebb1e529e37b520a78f74b3356de83419b653608e8e7d32a214b8f5c0df58ae
-
Filesize
300KB
MD5614563fbd96391cf74ad1c91e15f425d
SHA152668fea47e6fa682c417e7660059203dedcf228
SHA256b8794d6a31a4cd65febb162e93353dc237e85ed8aef8eea7dd29b678626beb6b
SHA512af3a901742e9f2c34c900da698b66a75b89c9a8d5118c29c888aa7403eb4aa22998a52dce6f8b6ff4a64b8547aa9a609b4ddf191cbf3c7fd4efca88ba2ee18bb
-
Filesize
479KB
MD54da45c7eb4ba8a8f815566ca0e7ba306
SHA13dc41b7ad3df64694c09c55297237962f9a861d3
SHA256a4e21e8052f9c3b6c5c1d331f272c33f8e81fa0efddd665fa34c6644daa8f91b
SHA5121a9b9b15221644fe8b7343021693eb6dcf32498366b0a751da36e52d79226f15da2ab7f8e3158b431b2f3d843d2aaa1416cd8b77c5f058215e1c049529090a05
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf