Analysis
-
max time kernel
155s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2023 12:45
Behavioral task
behavioral1
Sample
Spotify Premium/Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Spotify Premium/Setup.exe
Resource
win10v2004-20230220-en
General
-
Target
Spotify Premium/Setup.exe
-
Size
630.2MB
-
MD5
32a4d0a4ab16a702c4a00b41a6d1377e
-
SHA1
cf9935a37c5477fdd991f50078d0fbe0da51f8df
-
SHA256
6f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
-
SHA512
c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
SSDEEP
6144:TfbOrBANQk+LQ9JfIzgPO6gsURuloFxdPQ:MO//AzgmuqO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 1 IoCs
Processes:
oneetx.exepid process 5072 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2812 400 WerFault.exe Setup.exe 4776 400 WerFault.exe Setup.exe 456 400 WerFault.exe Setup.exe 4620 400 WerFault.exe Setup.exe 3908 400 WerFault.exe Setup.exe 4560 400 WerFault.exe Setup.exe 2584 400 WerFault.exe Setup.exe 2280 400 WerFault.exe Setup.exe 4828 400 WerFault.exe Setup.exe 432 400 WerFault.exe Setup.exe 4780 400 WerFault.exe Setup.exe 1432 400 WerFault.exe Setup.exe 668 400 WerFault.exe Setup.exe 4852 400 WerFault.exe Setup.exe 4960 5072 WerFault.exe oneetx.exe 2760 5072 WerFault.exe oneetx.exe 3696 5072 WerFault.exe oneetx.exe 3976 5072 WerFault.exe oneetx.exe 5104 5072 WerFault.exe oneetx.exe 4140 5072 WerFault.exe oneetx.exe 4920 5072 WerFault.exe oneetx.exe 4812 5072 WerFault.exe oneetx.exe 1084 5072 WerFault.exe oneetx.exe 1976 5072 WerFault.exe oneetx.exe 2280 5072 WerFault.exe oneetx.exe 4756 5072 WerFault.exe oneetx.exe 5020 5072 WerFault.exe oneetx.exe 4452 5072 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Setup.exepid process 400 Setup.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
Setup.exeoneetx.execmd.exedescription pid process target process PID 400 wrote to memory of 5072 400 Setup.exe oneetx.exe PID 400 wrote to memory of 5072 400 Setup.exe oneetx.exe PID 400 wrote to memory of 5072 400 Setup.exe oneetx.exe PID 5072 wrote to memory of 1932 5072 oneetx.exe schtasks.exe PID 5072 wrote to memory of 1932 5072 oneetx.exe schtasks.exe PID 5072 wrote to memory of 1932 5072 oneetx.exe schtasks.exe PID 5072 wrote to memory of 4604 5072 oneetx.exe cmd.exe PID 5072 wrote to memory of 4604 5072 oneetx.exe cmd.exe PID 5072 wrote to memory of 4604 5072 oneetx.exe cmd.exe PID 4604 wrote to memory of 2248 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 2248 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 2248 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 2572 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 2572 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 2572 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 4044 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 4044 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 4044 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 4220 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 4220 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 4220 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 4112 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 4112 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 4112 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 3456 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 3456 4604 cmd.exe cacls.exe PID 4604 wrote to memory of 3456 4604 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spotify Premium\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Spotify Premium\Setup.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 7322⤵
- Program crash
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8282⤵
- Program crash
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8802⤵
- Program crash
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8882⤵
- Program crash
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9882⤵
- Program crash
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9882⤵
- Program crash
PID:4560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 12322⤵
- Program crash
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 12442⤵
- Program crash
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 12842⤵
- Program crash
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 13602⤵
- Program crash
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 10042⤵
- Program crash
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9722⤵
- Program crash
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 5843⤵
- Program crash
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7243⤵
- Program crash
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7323⤵
- Program crash
PID:3696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7923⤵
- Program crash
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7603⤵
- Program crash
PID:5104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7083⤵
- Program crash
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9803⤵
- Program crash
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9883⤵
- Program crash
PID:4812 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9203⤵
- Program crash
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 12003⤵
- Program crash
PID:1976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\23e20ad4db" /P "Admin:N"&&CACLS "..\23e20ad4db" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2248
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:2572
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:4044
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\23e20ad4db" /P "Admin:N"4⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4220
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\23e20ad4db" /P "Admin:R" /E4⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 12403⤵
- Program crash
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 6683⤵
- Program crash
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 11883⤵
- Program crash
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 14963⤵
- Program crash
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\1000001001\gookcom.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\gookcom.exe"3⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9202⤵
- Program crash
PID:668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 14282⤵
- Program crash
PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 400 -ip 4001⤵PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 400 -ip 4001⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 400 -ip 4001⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 400 -ip 4001⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 400 -ip 4001⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 400 -ip 4001⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 400 -ip 4001⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 400 -ip 4001⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 400 -ip 4001⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5072 -ip 50721⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5072 -ip 50721⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5072 -ip 50721⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5072 -ip 50721⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5072 -ip 50721⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5072 -ip 50721⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5072 -ip 50721⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5072 -ip 50721⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5072 -ip 50721⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5072 -ip 50721⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5072 -ip 50721⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5072 -ip 50721⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5072 -ip 50721⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5072 -ip 50721⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5072 -ip 50721⤵PID:3612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000001001\gookcom.exeFilesize
769KB
MD5c6fea3621cca858371f2d596c9723891
SHA148a23b6c768a4a4f8ba2864159f959c0e025f08a
SHA2560a4d7ed03798e5257a21afc76553e538486316389bd54c9b9bcc03699ae21cd3
SHA512c3c7973b774c9cbe0888ebf4858b617a4431cb614a38d260ebefa3717ee932ccb0e93a14159aa6856aa0094e13627a1c8a071fdfff3639f5b14194af3a3d1bf4
-
C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exeFilesize
630.2MB
MD532a4d0a4ab16a702c4a00b41a6d1377e
SHA1cf9935a37c5477fdd991f50078d0fbe0da51f8df
SHA2566f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
SHA512c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exeFilesize
630.2MB
MD532a4d0a4ab16a702c4a00b41a6d1377e
SHA1cf9935a37c5477fdd991f50078d0fbe0da51f8df
SHA2566f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
SHA512c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exeFilesize
630.2MB
MD532a4d0a4ab16a702c4a00b41a6d1377e
SHA1cf9935a37c5477fdd991f50078d0fbe0da51f8df
SHA2566f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
SHA512c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
memory/400-134-0x0000000002C80000-0x0000000002CB3000-memory.dmpFilesize
204KB
-
memory/400-135-0x0000000000400000-0x0000000002BA9000-memory.dmpFilesize
39.7MB
-
memory/400-143-0x0000000000400000-0x0000000002BA9000-memory.dmpFilesize
39.7MB
-
memory/400-149-0x0000000000400000-0x0000000002BA9000-memory.dmpFilesize
39.7MB
-
memory/5072-150-0x0000000000400000-0x0000000002BA9000-memory.dmpFilesize
39.7MB
-
memory/5072-161-0x0000000000400000-0x0000000002BA9000-memory.dmpFilesize
39.7MB