Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 16:55
Static task
static1
General
-
Target
b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe
-
Size
1.3MB
-
MD5
0ad865ed5805685e99b7703b17e25d18
-
SHA1
67db1d652b1659e8df402ff0e36404f7e3a3c56e
-
SHA256
b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5
-
SHA512
1d5967b9bcb17c7f367afca39b975adb6a651e446037da7b72b7c8fcb5aff81470cb9672689fb54560540946c973c02ed3133c28b82116865bc3c9ae8dd3b23d
-
SSDEEP
24576:PysoGe7DgBXfHtAPdNeqdtzf9ij3gLWabxiWPXhGk76wDZmvTTfiJbdi7oD+O:asGfOXftsPdR8dabzPXhGk76MYqJoc7
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2160-2152-0x0000000005430000-0x000000000543A000-memory.dmp healer behavioral1/files/0x0002000000022ae8-2157.dat healer behavioral1/memory/5224-2166-0x0000000000630000-0x000000000063A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1636-6467-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x0002000000022ae8-6472.dat family_redline behavioral1/memory/1444-6480-0x0000000000D90000-0x0000000000DBE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation a06728666.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation c83434610.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation d27742546.exe -
Executes dropped EXE 11 IoCs
pid Process 2512 LJ945601.exe 3492 NJ709411.exe 2160 a06728666.exe 5224 1.exe 5268 b73924888.exe 4252 c83434610.exe 3412 oneetx.exe 1636 d27742546.exe 1444 1.exe 1616 oneetx.exe 5020 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" LJ945601.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" NJ709411.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5884 5268 WerFault.exe 89 2508 1636 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d27742546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LJ945601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a06728666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b73924888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NJ709411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c83434610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5224 1.exe 5224 1.exe 5224 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2160 a06728666.exe Token: SeDebugPrivilege 5268 b73924888.exe Token: SeDebugPrivilege 5224 1.exe Token: SeDebugPrivilege 1636 d27742546.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4252 c83434610.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2512 1708 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 82 PID 1708 wrote to memory of 2512 1708 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 82 PID 1708 wrote to memory of 2512 1708 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 82 PID 2512 wrote to memory of 3492 2512 LJ945601.exe 83 PID 2512 wrote to memory of 3492 2512 LJ945601.exe 83 PID 2512 wrote to memory of 3492 2512 LJ945601.exe 83 PID 3492 wrote to memory of 2160 3492 NJ709411.exe 84 PID 3492 wrote to memory of 2160 3492 NJ709411.exe 84 PID 3492 wrote to memory of 2160 3492 NJ709411.exe 84 PID 2160 wrote to memory of 5224 2160 a06728666.exe 88 PID 2160 wrote to memory of 5224 2160 a06728666.exe 88 PID 3492 wrote to memory of 5268 3492 NJ709411.exe 89 PID 3492 wrote to memory of 5268 3492 NJ709411.exe 89 PID 3492 wrote to memory of 5268 3492 NJ709411.exe 89 PID 2512 wrote to memory of 4252 2512 LJ945601.exe 98 PID 2512 wrote to memory of 4252 2512 LJ945601.exe 98 PID 2512 wrote to memory of 4252 2512 LJ945601.exe 98 PID 4252 wrote to memory of 3412 4252 c83434610.exe 99 PID 4252 wrote to memory of 3412 4252 c83434610.exe 99 PID 4252 wrote to memory of 3412 4252 c83434610.exe 99 PID 1708 wrote to memory of 1636 1708 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 100 PID 1708 wrote to memory of 1636 1708 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 100 PID 1708 wrote to memory of 1636 1708 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 100 PID 3412 wrote to memory of 3500 3412 oneetx.exe 101 PID 3412 wrote to memory of 3500 3412 oneetx.exe 101 PID 3412 wrote to memory of 3500 3412 oneetx.exe 101 PID 3412 wrote to memory of 5968 3412 oneetx.exe 103 PID 3412 wrote to memory of 5968 3412 oneetx.exe 103 PID 3412 wrote to memory of 5968 3412 oneetx.exe 103 PID 5968 wrote to memory of 6040 5968 cmd.exe 105 PID 5968 wrote to memory of 6040 5968 cmd.exe 105 PID 5968 wrote to memory of 6040 5968 cmd.exe 105 PID 5968 wrote to memory of 1444 5968 cmd.exe 113 PID 5968 wrote to memory of 1444 5968 cmd.exe 113 PID 5968 wrote to memory of 1444 5968 cmd.exe 113 PID 5968 wrote to memory of 4472 5968 cmd.exe 107 PID 5968 wrote to memory of 4472 5968 cmd.exe 107 PID 5968 wrote to memory of 4472 5968 cmd.exe 107 PID 5968 wrote to memory of 2924 5968 cmd.exe 108 PID 5968 wrote to memory of 2924 5968 cmd.exe 108 PID 5968 wrote to memory of 2924 5968 cmd.exe 108 PID 5968 wrote to memory of 2444 5968 cmd.exe 109 PID 5968 wrote to memory of 2444 5968 cmd.exe 109 PID 5968 wrote to memory of 2444 5968 cmd.exe 109 PID 5968 wrote to memory of 2452 5968 cmd.exe 110 PID 5968 wrote to memory of 2452 5968 cmd.exe 110 PID 5968 wrote to memory of 2452 5968 cmd.exe 110 PID 1636 wrote to memory of 1444 1636 d27742546.exe 113 PID 1636 wrote to memory of 1444 1636 d27742546.exe 113 PID 1636 wrote to memory of 1444 1636 d27742546.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe"C:\Users\Admin\AppData\Local\Temp\b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LJ945601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LJ945601.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NJ709411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NJ709411.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a06728666.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a06728666.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b73924888.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b73924888.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5268 -s 12565⤵
- Program crash
PID:5884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c83434610.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c83434610.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:6040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d27742546.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d27742546.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 13763⤵
- Program crash
PID:2508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5268 -ip 52681⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1636 -ip 16361⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1616
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5f134ab820af9862932dd0dc7edcebe13
SHA1557a56900f05243a6fdc1894e18e64c2cb89cf04
SHA256de690975146587a227cbd70f5f4e5c06c265d78ceb881f3df660a18ae558be99
SHA5122ff32ff434474e897dce4d76fb991958932a56091e02526d54023cd731b090f2f7a71e73c87b68e35adca1d3d109bd18b9fd86f69c7632bbd51787f208c9d9f1
-
Filesize
582KB
MD52d14ec3e26ea0b1926768b2c3f914e56
SHA11213b883a6f63022b34578c612fd717c8903c419
SHA256b6158a693062dbab58b702e21fa9dd7c44dd43c0881e1f98bbfff555a64f1409
SHA5123e71a8768589666f0a08493912290d02b923d24a7c975ff0108e3e3d51997394c5be606805629eaf0a238bdbf48fe761fde31b9c6fd9312ad43b804e460e4161
-
Filesize
679KB
MD5ff85f40b77e425f02cb5409acae957a9
SHA1d2fc7e0bcf4675c74910ac7e6809675105019b90
SHA2560679a91efcbd588fed5a4f37abfbbccbca6db88ac957da93197980757cab5127
SHA512eff58e289e5ac327fe786bb0a100078d8749cf607062a99d9ff7dbc35d5f23a61659f531e6dd1d26ff5adf8ae0c572be3b3662b06357c41fa1dcb6b11861ad6c
-
Filesize
205KB
MD570d44f53ff6369a6dfd4819e12439fa9
SHA1c87f41aef68b72c9466e16056792df65463100be
SHA256b93e5a7120af479a7b03b39eaaeddf7e77269b236c1e5274e26c2d24aa6fc6a4
SHA5126d603786557e5bc70ab229bc30e724e448d8b1d25e0668ad0f82fdefe8e38ab22cb1222def001650a39a49cd69d29085155d0c8b59a702287d83335e8355e70e
-
Filesize
301KB
MD5cfc33d40835ad4ae937ed058e53a08f0
SHA182716b98a590770ba375e83ed678571b6c9c4d9a
SHA25604cc373a3cfab529f0ec560e2914b8c8609abab773c716de57832e63eb847da6
SHA512dbdc14325104f748be1fb3567af730dcf61dc89fbef1f566c16f4fc4325496e859a1486c66ea9a2588777f854f9a1a0fe886a52814dcaf1b9ad155a674c04ae0
-
Filesize
522KB
MD57fa2fc1494317254b30d24943c45dded
SHA1e6b71c6fe672adccc2411f7a19224490f671fbbd
SHA2564bbd80df0b4847ce5fc37c13d1a9c0af4e50eed9e2ca80c8cfc0cf67b646d963
SHA512efa68c697e39421765064a0ddc236399d1818bb2c637f4859dc20ac5fafb0d222d78591f9a6b2293c04f94706552fec486b395f398c19e5fc61457fc16e523e6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf