Analysis
-
max time kernel
154s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
07-04-2022 13:22
Static task
static1
Behavioral task
behavioral1
Sample
CrackedOnetap.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
CrackedOnetap.exe
-
Size
4.5MB
-
MD5
a23861ef2a7db7e16f94815b3563d2a7
-
SHA1
b49f702cba643340b234100c6b31d47943c2d8bf
-
SHA256
9ac45ec0a4e37b2a770933e5704b17de95c5581bd217c16102d44f58876c0389
-
SHA512
cac32b4c8d1c33792538a634d4a945f36259347e71ff8f6098914242e98f25f1713f9490d8b9e77b1efec4318171066bfce3d35485091f4cfe403acf2cc01706
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
CrackedOnetap.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CrackedOnetap.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CrackedOnetap.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
CrackedOnetap.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CrackedOnetap.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CrackedOnetap.exedescription pid process target process PID 3328 set thread context of 1328 3328 CrackedOnetap.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1328 AppLaunch.exe 1328 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1328 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
CrackedOnetap.exedescription pid process target process PID 3328 wrote to memory of 1328 3328 CrackedOnetap.exe AppLaunch.exe PID 3328 wrote to memory of 1328 3328 CrackedOnetap.exe AppLaunch.exe PID 3328 wrote to memory of 1328 3328 CrackedOnetap.exe AppLaunch.exe PID 3328 wrote to memory of 1328 3328 CrackedOnetap.exe AppLaunch.exe PID 3328 wrote to memory of 1328 3328 CrackedOnetap.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackedOnetap.exe"C:\Users\Admin\AppData\Local\Temp\CrackedOnetap.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-