Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
OneKeyGhost.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
OneKeyGhost.exe
Resource
win10v2004-20221111-en
General
-
Target
OneKeyGhost.exe
-
Size
3.7MB
-
MD5
4b3f6bcc529935d229602e290de32f8f
-
SHA1
f3d56e4c69eebe3edb9793042dc619958dee6b32
-
SHA256
158a85b17171aad0c55a8b84a9e2795890d736a26c665af94b5b1ebc3b0e6a9a
-
SHA512
7b8a3820fdafd0afb27893404ee469fd3a35fb0ee4206e356010b448ec4b651ddabb266b8b8116ccfb1c542c910ac5234f92b705fe2559185052b0c650f18710
-
SSDEEP
49152:31vqjdPQAQuybzSOUTwCP/bJNILkwXU+eYLPj7BVES91mrWQxmE+0/7IW0vwn90w:31vqjhqa5cizJNFjij7BH91mSQxpGwH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409628710019d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31004928" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb0000000002000000000010660000000100002000000049e3337b83119088c8de01e19f881f3f0cbd7e7a7fd4c0098ae141a48407a153000000000e800000000200002000000020e38897ab2b4f96531cde916e2f8ce3c3707991b149df341f5b769eaf3201bd2000000063e13e46fe5e03431a6e752c4ec5f2279aabd8a5dbbb56c0f3b954ee2de81ebb40000000f4fce6f3afc70cdb2e48664265a6ccd8f3f8bd5374b3c4caea594e88d05a31b2198388f513a43e97e5f63d683ae45f4cb8cba775f38fcd9467454ec3a5cf7e75 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31004928" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9BE3D148-84F3-11ED-BF5F-7A41DBBD5662} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1887711784" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1887711784" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31004928" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378806709" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1891149723" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000571e35ab7c76c6b907970d0d8d51085501a8d3c92a8bd44ebbafe0fa7c737b03000000000e80000000020000200000008581c9445d7475069094d495f7ebc09e2214341509431240a70d4785cc46852c20000000016d28130ee8b943a8c4d69e8c940f317fae41833eb4ecbe4c5555577e362a7140000000156e2574fca7edb1d810bc6e60313c4d2f6c8cafb7647c946b7ccb57f72ad2a6c909df207e84e7312f787ecf7a2c90713d85c978b9d5b823862f096daae665a5 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31004928" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1891149723" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70651a710019d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4116 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 4116 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe 5020 OneKeyGhost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4116 IEXPLORE.EXE 4116 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2680 5020 OneKeyGhost.exe 81 PID 5020 wrote to memory of 2680 5020 OneKeyGhost.exe 81 PID 5020 wrote to memory of 2680 5020 OneKeyGhost.exe 81 PID 2680 wrote to memory of 4116 2680 IEXPLORE.EXE 82 PID 2680 wrote to memory of 4116 2680 IEXPLORE.EXE 82 PID 4116 wrote to memory of 1144 4116 IEXPLORE.EXE 83 PID 4116 wrote to memory of 1144 4116 IEXPLORE.EXE 83 PID 4116 wrote to memory of 1144 4116 IEXPLORE.EXE 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\OneKeyGhost.exe"C:\Users\Admin\AppData\Local\Temp\OneKeyGhost.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://Www.OneKey.Cc/2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://Www.OneKey.Cc/3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4116 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b373d75a1062fd2158e3d68dab288e35
SHA1e99d234b133ae945c8e272f2df62f774cbfa51a2
SHA256a67e5caae4c6dae06ba77fc7116868376e2fffddabda276864e6b37b696502de
SHA512c0b916b9766e8224cb7ad17db485de23325754cfa4e464b670fe8b4b61c95bcb60e12891bc46bc935c3ab4022deca3ddbfb57e321186dda3a5f21522d622ac0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD55818deac358358eb93dda5b9e3cd35b1
SHA16f46fca4c8859c0de62cc0e7b29716a161ec0f1e
SHA2568b56932e782ffcb6ceb52c2ac3884b6d6eba95b5ed7c94281a33f2f51bf3f753
SHA5121ecbb4c9d90bf28a4988f5fb3319565f45623bc922df3ab8bcf7526b373e919cba3f2b5a8b1ddf35aec9e0564dcf3c5056bcaeaa91993645211be35f9899f333