Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2022 07:01

General

  • Target

    OneKeyGhost.exe

  • Size

    3.7MB

  • MD5

    4b3f6bcc529935d229602e290de32f8f

  • SHA1

    f3d56e4c69eebe3edb9793042dc619958dee6b32

  • SHA256

    158a85b17171aad0c55a8b84a9e2795890d736a26c665af94b5b1ebc3b0e6a9a

  • SHA512

    7b8a3820fdafd0afb27893404ee469fd3a35fb0ee4206e356010b448ec4b651ddabb266b8b8116ccfb1c542c910ac5234f92b705fe2559185052b0c650f18710

  • SSDEEP

    49152:31vqjdPQAQuybzSOUTwCP/bJNILkwXU+eYLPj7BVES91mrWQxmE+0/7IW0vwn90w:31vqjhqa5cizJNFjij7BH91mSQxpGwH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OneKeyGhost.exe
    "C:\Users\Admin\AppData\Local\Temp\OneKeyGhost.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://Www.OneKey.Cc/
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://Www.OneKey.Cc/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4116 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    b373d75a1062fd2158e3d68dab288e35

    SHA1

    e99d234b133ae945c8e272f2df62f774cbfa51a2

    SHA256

    a67e5caae4c6dae06ba77fc7116868376e2fffddabda276864e6b37b696502de

    SHA512

    c0b916b9766e8224cb7ad17db485de23325754cfa4e464b670fe8b4b61c95bcb60e12891bc46bc935c3ab4022deca3ddbfb57e321186dda3a5f21522d622ac0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    5818deac358358eb93dda5b9e3cd35b1

    SHA1

    6f46fca4c8859c0de62cc0e7b29716a161ec0f1e

    SHA256

    8b56932e782ffcb6ceb52c2ac3884b6d6eba95b5ed7c94281a33f2f51bf3f753

    SHA512

    1ecbb4c9d90bf28a4988f5fb3319565f45623bc922df3ab8bcf7526b373e919cba3f2b5a8b1ddf35aec9e0564dcf3c5056bcaeaa91993645211be35f9899f333