Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe
Resource
win10v2004-20241007-en
General
-
Target
b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe
-
Size
1.3MB
-
MD5
0ad865ed5805685e99b7703b17e25d18
-
SHA1
67db1d652b1659e8df402ff0e36404f7e3a3c56e
-
SHA256
b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5
-
SHA512
1d5967b9bcb17c7f367afca39b975adb6a651e446037da7b72b7c8fcb5aff81470cb9672689fb54560540946c973c02ed3133c28b82116865bc3c9ae8dd3b23d
-
SSDEEP
24576:PysoGe7DgBXfHtAPdNeqdtzf9ij3gLWabxiWPXhGk76wDZmvTTfiJbdi7oD+O:asGfOXftsPdR8dabzPXhGk76MYqJoc7
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2688-2152-0x0000000002670000-0x000000000267A000-memory.dmp healer behavioral1/files/0x000e000000023b2e-2157.dat healer behavioral1/memory/4932-2165-0x0000000000780000-0x000000000078A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3892-6466-0x0000000005760000-0x0000000005792000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation a06728666.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation c83434610.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 3376 LJ945601.exe 1852 NJ709411.exe 2688 a06728666.exe 4932 1.exe 5524 b73924888.exe 1712 c83434610.exe 2676 oneetx.exe 3892 d27742546.exe 1852 oneetx.exe 5548 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" LJ945601.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" NJ709411.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2264 5524 WerFault.exe 91 408 3892 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NJ709411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a06728666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b73924888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d27742546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LJ945601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c83434610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4932 1.exe 4932 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2688 a06728666.exe Token: SeDebugPrivilege 5524 b73924888.exe Token: SeDebugPrivilege 4932 1.exe Token: SeDebugPrivilege 3892 d27742546.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3376 4296 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 85 PID 4296 wrote to memory of 3376 4296 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 85 PID 4296 wrote to memory of 3376 4296 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 85 PID 3376 wrote to memory of 1852 3376 LJ945601.exe 86 PID 3376 wrote to memory of 1852 3376 LJ945601.exe 86 PID 3376 wrote to memory of 1852 3376 LJ945601.exe 86 PID 1852 wrote to memory of 2688 1852 NJ709411.exe 87 PID 1852 wrote to memory of 2688 1852 NJ709411.exe 87 PID 1852 wrote to memory of 2688 1852 NJ709411.exe 87 PID 2688 wrote to memory of 4932 2688 a06728666.exe 90 PID 2688 wrote to memory of 4932 2688 a06728666.exe 90 PID 1852 wrote to memory of 5524 1852 NJ709411.exe 91 PID 1852 wrote to memory of 5524 1852 NJ709411.exe 91 PID 1852 wrote to memory of 5524 1852 NJ709411.exe 91 PID 3376 wrote to memory of 1712 3376 LJ945601.exe 95 PID 3376 wrote to memory of 1712 3376 LJ945601.exe 95 PID 3376 wrote to memory of 1712 3376 LJ945601.exe 95 PID 1712 wrote to memory of 2676 1712 c83434610.exe 96 PID 1712 wrote to memory of 2676 1712 c83434610.exe 96 PID 1712 wrote to memory of 2676 1712 c83434610.exe 96 PID 4296 wrote to memory of 3892 4296 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 97 PID 4296 wrote to memory of 3892 4296 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 97 PID 4296 wrote to memory of 3892 4296 b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe 97 PID 2676 wrote to memory of 5592 2676 oneetx.exe 98 PID 2676 wrote to memory of 5592 2676 oneetx.exe 98 PID 2676 wrote to memory of 5592 2676 oneetx.exe 98 PID 2676 wrote to memory of 1420 2676 oneetx.exe 100 PID 2676 wrote to memory of 1420 2676 oneetx.exe 100 PID 2676 wrote to memory of 1420 2676 oneetx.exe 100 PID 1420 wrote to memory of 5520 1420 cmd.exe 102 PID 1420 wrote to memory of 5520 1420 cmd.exe 102 PID 1420 wrote to memory of 5520 1420 cmd.exe 102 PID 1420 wrote to memory of 4176 1420 cmd.exe 103 PID 1420 wrote to memory of 4176 1420 cmd.exe 103 PID 1420 wrote to memory of 4176 1420 cmd.exe 103 PID 1420 wrote to memory of 4624 1420 cmd.exe 104 PID 1420 wrote to memory of 4624 1420 cmd.exe 104 PID 1420 wrote to memory of 4624 1420 cmd.exe 104 PID 1420 wrote to memory of 5668 1420 cmd.exe 105 PID 1420 wrote to memory of 5668 1420 cmd.exe 105 PID 1420 wrote to memory of 5668 1420 cmd.exe 105 PID 1420 wrote to memory of 5468 1420 cmd.exe 107 PID 1420 wrote to memory of 5468 1420 cmd.exe 107 PID 1420 wrote to memory of 5468 1420 cmd.exe 107 PID 1420 wrote to memory of 5468 1420 cmd.exe 107 PID 1420 wrote to memory of 5468 1420 cmd.exe 107 PID 1420 wrote to memory of 5468 1420 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe"C:\Users\Admin\AppData\Local\Temp\b826c1b0982a5220dd09b1c0079b1b3211551f7d05a0e54f79daae40ad4806a5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LJ945601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LJ945601.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NJ709411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NJ709411.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a06728666.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a06728666.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b73924888.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b73924888.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5524 -s 12645⤵
- Program crash
PID:2264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c83434610.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c83434610.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:4176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:5668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:5468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:5468
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d27742546.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d27742546.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 12523⤵
- Program crash
PID:408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5524 -ip 55241⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3892 -ip 38921⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5f134ab820af9862932dd0dc7edcebe13
SHA1557a56900f05243a6fdc1894e18e64c2cb89cf04
SHA256de690975146587a227cbd70f5f4e5c06c265d78ceb881f3df660a18ae558be99
SHA5122ff32ff434474e897dce4d76fb991958932a56091e02526d54023cd731b090f2f7a71e73c87b68e35adca1d3d109bd18b9fd86f69c7632bbd51787f208c9d9f1
-
Filesize
582KB
MD52d14ec3e26ea0b1926768b2c3f914e56
SHA11213b883a6f63022b34578c612fd717c8903c419
SHA256b6158a693062dbab58b702e21fa9dd7c44dd43c0881e1f98bbfff555a64f1409
SHA5123e71a8768589666f0a08493912290d02b923d24a7c975ff0108e3e3d51997394c5be606805629eaf0a238bdbf48fe761fde31b9c6fd9312ad43b804e460e4161
-
Filesize
679KB
MD5ff85f40b77e425f02cb5409acae957a9
SHA1d2fc7e0bcf4675c74910ac7e6809675105019b90
SHA2560679a91efcbd588fed5a4f37abfbbccbca6db88ac957da93197980757cab5127
SHA512eff58e289e5ac327fe786bb0a100078d8749cf607062a99d9ff7dbc35d5f23a61659f531e6dd1d26ff5adf8ae0c572be3b3662b06357c41fa1dcb6b11861ad6c
-
Filesize
205KB
MD570d44f53ff6369a6dfd4819e12439fa9
SHA1c87f41aef68b72c9466e16056792df65463100be
SHA256b93e5a7120af479a7b03b39eaaeddf7e77269b236c1e5274e26c2d24aa6fc6a4
SHA5126d603786557e5bc70ab229bc30e724e448d8b1d25e0668ad0f82fdefe8e38ab22cb1222def001650a39a49cd69d29085155d0c8b59a702287d83335e8355e70e
-
Filesize
301KB
MD5cfc33d40835ad4ae937ed058e53a08f0
SHA182716b98a590770ba375e83ed678571b6c9c4d9a
SHA25604cc373a3cfab529f0ec560e2914b8c8609abab773c716de57832e63eb847da6
SHA512dbdc14325104f748be1fb3567af730dcf61dc89fbef1f566c16f4fc4325496e859a1486c66ea9a2588777f854f9a1a0fe886a52814dcaf1b9ad155a674c04ae0
-
Filesize
522KB
MD57fa2fc1494317254b30d24943c45dded
SHA1e6b71c6fe672adccc2411f7a19224490f671fbbd
SHA2564bbd80df0b4847ce5fc37c13d1a9c0af4e50eed9e2ca80c8cfc0cf67b646d963
SHA512efa68c697e39421765064a0ddc236399d1818bb2c637f4859dc20ac5fafb0d222d78591f9a6b2293c04f94706552fec486b395f398c19e5fc61457fc16e523e6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91