Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe
Resource
win10v2004-20241007-en
General
-
Target
d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe
-
Size
1.1MB
-
MD5
20adca7b56f8c64bce0c5fd2129b094b
-
SHA1
2b49318734d332741844b574bf9874c698a5e434
-
SHA256
d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53
-
SHA512
ea4a123e1c0f5d58d5c75eb6bbe9c183f7b25f6bc817202b07982051afcca66738d9e1c2260eb47542b1f174a768140093680c4a4872e311af3bdf8aedbc5018
-
SSDEEP
24576:YyEhegQc/YdfIK9kPRnDUuo9KSSJSSnu2+NNDe4gy:fcegQc/YOK9kPB+SJSpRTi4
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3912-28-0x00000000008C0000-0x00000000008DA000-memory.dmp healer behavioral1/memory/3912-30-0x0000000004990000-0x00000000049A8000-memory.dmp healer behavioral1/memory/3912-31-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-56-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-58-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-54-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-52-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-50-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-48-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-46-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-44-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-42-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-40-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-38-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-36-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-34-0x0000000004990000-0x00000000049A3000-memory.dmp healer behavioral1/memory/3912-32-0x0000000004990000-0x00000000049A3000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 214665566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 214665566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 214665566.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 214665566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 214665566.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/4352-117-0x00000000024D0000-0x000000000250C000-memory.dmp family_redline behavioral1/memory/4352-118-0x00000000049F0000-0x0000000004A2A000-memory.dmp family_redline behavioral1/memory/4352-124-0x00000000049F0000-0x0000000004A25000-memory.dmp family_redline behavioral1/memory/4352-123-0x00000000049F0000-0x0000000004A25000-memory.dmp family_redline behavioral1/memory/4864-122-0x0000000000F40000-0x0000000000F68000-memory.dmp family_redline behavioral1/files/0x0007000000023c92-121.dat family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 355748146.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 12 IoCs
pid Process 5116 GN857650.exe 2504 pw359453.exe 5016 hk703046.exe 3912 179773419.exe 3372 214665566.exe 2360 355748146.exe 4876 oneetx.exe 2756 484283488.exe 4352 484283488.exe 4864 592152992.exe 1760 oneetx.exe 2212 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 179773419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 214665566.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" GN857650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pw359453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hk703046.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2756 set thread context of 4352 2756 484283488.exe 115 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2928 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4816 3372 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GN857650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pw359453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hk703046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484283488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 214665566.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 355748146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 592152992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 179773419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484283488.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3912 179773419.exe 3912 179773419.exe 3372 214665566.exe 3372 214665566.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3912 179773419.exe Token: SeDebugPrivilege 3372 214665566.exe Token: SeDebugPrivilege 4352 484283488.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 355748146.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4168 wrote to memory of 5116 4168 d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe 84 PID 4168 wrote to memory of 5116 4168 d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe 84 PID 4168 wrote to memory of 5116 4168 d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe 84 PID 5116 wrote to memory of 2504 5116 GN857650.exe 86 PID 5116 wrote to memory of 2504 5116 GN857650.exe 86 PID 5116 wrote to memory of 2504 5116 GN857650.exe 86 PID 2504 wrote to memory of 5016 2504 pw359453.exe 87 PID 2504 wrote to memory of 5016 2504 pw359453.exe 87 PID 2504 wrote to memory of 5016 2504 pw359453.exe 87 PID 5016 wrote to memory of 3912 5016 hk703046.exe 89 PID 5016 wrote to memory of 3912 5016 hk703046.exe 89 PID 5016 wrote to memory of 3912 5016 hk703046.exe 89 PID 5016 wrote to memory of 3372 5016 hk703046.exe 97 PID 5016 wrote to memory of 3372 5016 hk703046.exe 97 PID 5016 wrote to memory of 3372 5016 hk703046.exe 97 PID 2504 wrote to memory of 2360 2504 pw359453.exe 102 PID 2504 wrote to memory of 2360 2504 pw359453.exe 102 PID 2504 wrote to memory of 2360 2504 pw359453.exe 102 PID 2360 wrote to memory of 4876 2360 355748146.exe 103 PID 2360 wrote to memory of 4876 2360 355748146.exe 103 PID 2360 wrote to memory of 4876 2360 355748146.exe 103 PID 5116 wrote to memory of 2756 5116 GN857650.exe 104 PID 5116 wrote to memory of 2756 5116 GN857650.exe 104 PID 5116 wrote to memory of 2756 5116 GN857650.exe 104 PID 4876 wrote to memory of 3432 4876 oneetx.exe 105 PID 4876 wrote to memory of 3432 4876 oneetx.exe 105 PID 4876 wrote to memory of 3432 4876 oneetx.exe 105 PID 4876 wrote to memory of 952 4876 oneetx.exe 107 PID 4876 wrote to memory of 952 4876 oneetx.exe 107 PID 4876 wrote to memory of 952 4876 oneetx.exe 107 PID 952 wrote to memory of 4412 952 cmd.exe 109 PID 952 wrote to memory of 4412 952 cmd.exe 109 PID 952 wrote to memory of 4412 952 cmd.exe 109 PID 952 wrote to memory of 1028 952 cmd.exe 110 PID 952 wrote to memory of 1028 952 cmd.exe 110 PID 952 wrote to memory of 1028 952 cmd.exe 110 PID 952 wrote to memory of 2608 952 cmd.exe 111 PID 952 wrote to memory of 2608 952 cmd.exe 111 PID 952 wrote to memory of 2608 952 cmd.exe 111 PID 952 wrote to memory of 736 952 cmd.exe 112 PID 952 wrote to memory of 736 952 cmd.exe 112 PID 952 wrote to memory of 736 952 cmd.exe 112 PID 952 wrote to memory of 2968 952 cmd.exe 113 PID 952 wrote to memory of 2968 952 cmd.exe 113 PID 952 wrote to memory of 2968 952 cmd.exe 113 PID 952 wrote to memory of 3404 952 cmd.exe 114 PID 952 wrote to memory of 3404 952 cmd.exe 114 PID 952 wrote to memory of 3404 952 cmd.exe 114 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 2756 wrote to memory of 4352 2756 484283488.exe 115 PID 4168 wrote to memory of 4864 4168 d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe 116 PID 4168 wrote to memory of 4864 4168 d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe 116 PID 4168 wrote to memory of 4864 4168 d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe"C:\Users\Admin\AppData\Local\Temp\d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GN857650.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GN857650.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pw359453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pw359453.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hk703046.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hk703046.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\179773419.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\179773419.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\214665566.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\214665566.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 10846⤵
- Program crash
PID:4816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\355748146.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\355748146.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:3404
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592152992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592152992.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3372 -ip 33721⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1760
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2212
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2928
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5100a9d616da8dbb82fd696af48f1891e
SHA1ca5011879625e02ef42b732232885c736d30fbd0
SHA256307c15e07a61de6f9d9c4cbf949504460d8f1725e812c97ca2aa8656180bd18e
SHA5120f8f3271c8a466502da57f6f2e126f96e3cca594334242f700d900dafad856120206353e77896e49b3f12a50193e4e4b78c6a8ba7529cb4dfea18e97909a70c5
-
Filesize
940KB
MD581871e9a2d33cc6431e45b7119d34814
SHA16e754a027f199f6779af743633194731cd3d1dea
SHA2560bffa29b0724975889b54adc774b5f1b38e366cf9ac9c425bc2e8b9a04d9a3c2
SHA5120d3ebf7fde700fe3f7d8295da81fe17ac1ba004b3ad06b1f74a3edf363bdc4a88b9257515fa12c5f8c940071d99c929b4589908986114c5b2918a6f4efb532e7
-
Filesize
342KB
MD51051d4c804878c7a64088e8e41a69bac
SHA13cd5b353046b1580a608209aacd0b08107f3bb7d
SHA256c4d641f66fbabbb5facd863a7832170ee7f49025be6b8a34f04e6368907e0fd5
SHA5129d069fe8348db7298d8d6742bc22c25514b2a6e40d7e4b742c686cb671e11ca6e69d80afc664d9ff337499b7a287a4c6481f502867ecc37f22eb213cb0957190
-
Filesize
585KB
MD571f38abfad3d7f0d7b34078031cd2adc
SHA1013de74965bf1e7320b1cf62a7595b1c25fda5e0
SHA2562f40e6de630e11f1dd296de90904cdbd561fc6c9eb576967d6697f095fd3d39c
SHA512df32b65383e13a34377cefbc2db33424409c4729d214ccc854b16a243682860c8eb296426912c940380555b52dd90f8e323fab20da36a0f9ab5a157674f00b02
-
Filesize
204KB
MD51304f384653e08ae497008ff13498608
SHA1d9a76ed63d74d4217c5027757cb9a7a0d0093080
SHA2562a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa
SHA5124138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1
-
Filesize
414KB
MD5cb97828135b7d9bd7c0d4fe15da4d776
SHA1837d40e8d281312968708bdd07fd960c9c24856b
SHA2561d089167eca5114808880180d43084c0cd7cf3000e6b57a027a5aebc72b0f269
SHA51299fe738be737515d2afc6182ab3fcad1ebed55211576be49d1b8e72abb9b7b909a4f324d73d9ac0646efd561e58616168a2ea3a31b489335423723f789f7a7b5
-
Filesize
175KB
MD53d10b67208452d7a91d7bd7066067676
SHA1e6c3ab7b6da65c8cc7dd95351f118caf3a50248d
SHA2565c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302
SHA512b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df
-
Filesize
259KB
MD5bd7ea62f3ae49bc90d7df013e415fe69
SHA14b15f8369a4b08727109288a3ffe0c6a7d81c7fd
SHA256f6fbb776dbc3b88170edc9ba8aeb6ca9f43dabc0f78d5a7ee895c813a5c5afd6
SHA512ef1f6f708a17fa4bebadfb3adad858302bf90999a85f7172ce475f3185c7e57a3d71f25ac218c38ec004ab7f6c00a617b837d27de81dfc7d667a20e9df216767