Analysis
-
max time kernel
155s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2023 12:45
Behavioral task
behavioral1
Sample
Spotify Premium/Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Spotify Premium/Setup.exe
Resource
win10v2004-20230220-en
General
-
Target
Spotify Premium/Setup.exe
-
Size
630.2MB
-
MD5
32a4d0a4ab16a702c4a00b41a6d1377e
-
SHA1
cf9935a37c5477fdd991f50078d0fbe0da51f8df
-
SHA256
6f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
-
SHA512
c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
SSDEEP
6144:TfbOrBANQk+LQ9JfIzgPO6gsURuloFxdPQ:MO//AzgmuqO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 1 IoCs
pid Process 5072 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
pid pid_target Process procid_target 2812 400 WerFault.exe 85 4776 400 WerFault.exe 85 456 400 WerFault.exe 85 4620 400 WerFault.exe 85 3908 400 WerFault.exe 85 4560 400 WerFault.exe 85 2584 400 WerFault.exe 85 2280 400 WerFault.exe 85 4828 400 WerFault.exe 85 432 400 WerFault.exe 85 4780 400 WerFault.exe 85 1432 400 WerFault.exe 85 668 400 WerFault.exe 85 4852 400 WerFault.exe 85 4960 5072 WerFault.exe 115 2760 5072 WerFault.exe 115 3696 5072 WerFault.exe 115 3976 5072 WerFault.exe 115 5104 5072 WerFault.exe 115 4140 5072 WerFault.exe 115 4920 5072 WerFault.exe 115 4812 5072 WerFault.exe 115 1084 5072 WerFault.exe 115 1976 5072 WerFault.exe 115 2280 5072 WerFault.exe 115 4756 5072 WerFault.exe 115 5020 5072 WerFault.exe 115 4452 5072 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1932 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 400 Setup.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 400 wrote to memory of 5072 400 Setup.exe 115 PID 400 wrote to memory of 5072 400 Setup.exe 115 PID 400 wrote to memory of 5072 400 Setup.exe 115 PID 5072 wrote to memory of 1932 5072 oneetx.exe 135 PID 5072 wrote to memory of 1932 5072 oneetx.exe 135 PID 5072 wrote to memory of 1932 5072 oneetx.exe 135 PID 5072 wrote to memory of 4604 5072 oneetx.exe 141 PID 5072 wrote to memory of 4604 5072 oneetx.exe 141 PID 5072 wrote to memory of 4604 5072 oneetx.exe 141 PID 4604 wrote to memory of 2248 4604 cmd.exe 144 PID 4604 wrote to memory of 2248 4604 cmd.exe 144 PID 4604 wrote to memory of 2248 4604 cmd.exe 144 PID 4604 wrote to memory of 2572 4604 cmd.exe 146 PID 4604 wrote to memory of 2572 4604 cmd.exe 146 PID 4604 wrote to memory of 2572 4604 cmd.exe 146 PID 4604 wrote to memory of 4044 4604 cmd.exe 147 PID 4604 wrote to memory of 4044 4604 cmd.exe 147 PID 4604 wrote to memory of 4044 4604 cmd.exe 147 PID 4604 wrote to memory of 4220 4604 cmd.exe 149 PID 4604 wrote to memory of 4220 4604 cmd.exe 149 PID 4604 wrote to memory of 4220 4604 cmd.exe 149 PID 4604 wrote to memory of 4112 4604 cmd.exe 148 PID 4604 wrote to memory of 4112 4604 cmd.exe 148 PID 4604 wrote to memory of 4112 4604 cmd.exe 148 PID 4604 wrote to memory of 3456 4604 cmd.exe 150 PID 4604 wrote to memory of 3456 4604 cmd.exe 150 PID 4604 wrote to memory of 3456 4604 cmd.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spotify Premium\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Spotify Premium\Setup.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 7322⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8282⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8802⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8882⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9882⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9882⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 12322⤵
- Program crash
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 12442⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 12842⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 13602⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 10042⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9722⤵
- Program crash
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 5843⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7243⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7323⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7923⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7603⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 7083⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9803⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9883⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\23e20ad4db\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9203⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 12003⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\23e20ad4db" /P "Admin:N"&&CACLS "..\23e20ad4db" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:2572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:4044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\23e20ad4db" /P "Admin:N"4⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\23e20ad4db" /P "Admin:R" /E4⤵PID:3456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 12403⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 6683⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 11883⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 14963⤵
- Program crash
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\1000001001\gookcom.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\gookcom.exe"3⤵PID:4124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 9202⤵
- Program crash
PID:668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 14282⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 400 -ip 4001⤵PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 400 -ip 4001⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 400 -ip 4001⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 400 -ip 4001⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 400 -ip 4001⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 400 -ip 4001⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 400 -ip 4001⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 400 -ip 4001⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 400 -ip 4001⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 400 -ip 4001⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5072 -ip 50721⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5072 -ip 50721⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5072 -ip 50721⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5072 -ip 50721⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5072 -ip 50721⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5072 -ip 50721⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5072 -ip 50721⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5072 -ip 50721⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5072 -ip 50721⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5072 -ip 50721⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5072 -ip 50721⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5072 -ip 50721⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5072 -ip 50721⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5072 -ip 50721⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5072 -ip 50721⤵PID:3612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5c6fea3621cca858371f2d596c9723891
SHA148a23b6c768a4a4f8ba2864159f959c0e025f08a
SHA2560a4d7ed03798e5257a21afc76553e538486316389bd54c9b9bcc03699ae21cd3
SHA512c3c7973b774c9cbe0888ebf4858b617a4431cb614a38d260ebefa3717ee932ccb0e93a14159aa6856aa0094e13627a1c8a071fdfff3639f5b14194af3a3d1bf4
-
Filesize
630.2MB
MD532a4d0a4ab16a702c4a00b41a6d1377e
SHA1cf9935a37c5477fdd991f50078d0fbe0da51f8df
SHA2566f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
SHA512c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
Filesize
630.2MB
MD532a4d0a4ab16a702c4a00b41a6d1377e
SHA1cf9935a37c5477fdd991f50078d0fbe0da51f8df
SHA2566f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
SHA512c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf
-
Filesize
630.2MB
MD532a4d0a4ab16a702c4a00b41a6d1377e
SHA1cf9935a37c5477fdd991f50078d0fbe0da51f8df
SHA2566f895cd89dafd39df80e6cc7660f229e775c962ff249f56c9693ac16821cb9cf
SHA512c6a327e8d33fbcabba45fe3a10572d5632b3addc094010f39a709cdb3367004b659f05954988c8ee6c87196790f84a77be1c4813bd2ce8174cdd74f9a4d36ebf