Analysis

  • max time kernel
    4294182s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    07-04-2022 13:22

General

  • Target

    CrackedOnetap.exe

  • Size

    4.5MB

  • MD5

    a23861ef2a7db7e16f94815b3563d2a7

  • SHA1

    b49f702cba643340b234100c6b31d47943c2d8bf

  • SHA256

    9ac45ec0a4e37b2a770933e5704b17de95c5581bd217c16102d44f58876c0389

  • SHA512

    cac32b4c8d1c33792538a634d4a945f36259347e71ff8f6098914242e98f25f1713f9490d8b9e77b1efec4318171066bfce3d35485091f4cfe403acf2cc01706

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CrackedOnetap.exe
    "C:\Users\Admin\AppData\Local\Temp\CrackedOnetap.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/568-61-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/568-59-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/568-66-0x00000000004172CE-mapping.dmp

  • memory/568-68-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/568-67-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1968-54-0x0000000000400000-0x0000000000D45000-memory.dmp

    Filesize

    9.3MB

  • memory/1968-58-0x0000000076BC1000-0x0000000076BC3000-memory.dmp

    Filesize

    8KB