Resubmissions

25-04-2023 20:18

230425-y3j7yscg23 10

Analysis

  • max time kernel
    290s
  • max time network
    437s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 20:18

General

  • Target

    Executables/ONED.cmd

  • Size

    1KB

  • MD5

    cec711d5a97da76868926c26c9c009ae

  • SHA1

    5e24bf73cb882d92b72b5a9fe9bfd014d334630a

  • SHA256

    1d3873bbddece264a56a6287ce879ee778033f3232978e53cd4868186c78fff5

  • SHA512

    3a5649f52d103a50a48d6ffabdc304d927c468cc5ce512278461f4f41171d59c31d243f34bb368f737ca9baee442ef8def732e315dc19f442323a2cb271589fb

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executables\ONED.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c reg query "HKEY_USERS" | findstr /r /x /c:"HKEY_USERS\\S-.*" /c:"HKEY_USERS\\AME_UserHive_[^_]*"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\system32\reg.exe
        reg query "HKEY_USERS"
        3⤵
          PID:2000
        • C:\Windows\system32\findstr.exe
          findstr /r /x /c:"HKEY_USERS\\S-.*" /c:"HKEY_USERS\\AME_UserHive_[^_]*"
          3⤵
            PID:3892
        • C:\Windows\system32\reg.exe
          reg query "HKU\S-1-5-19"
          2⤵
            PID:1408
          • C:\Windows\system32\findstr.exe
            findstr /c:"Volatile Environment" /c:"AME_UserHive_"
            2⤵
              PID:2904
            • C:\Windows\system32\reg.exe
              reg query "HKU\S-1-5-20"
              2⤵
                PID:2528
              • C:\Windows\system32\findstr.exe
                findstr /c:"Volatile Environment" /c:"AME_UserHive_"
                2⤵
                  PID:4952
                • C:\Windows\system32\reg.exe
                  reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000"
                  2⤵
                    PID:1568
                  • C:\Windows\system32\findstr.exe
                    findstr /c:"Volatile Environment" /c:"AME_UserHive_"
                    2⤵
                      PID:644
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BannerStore" | findstr /i /c:"OneDrive"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1976
                      • C:\Windows\system32\reg.exe
                        reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BannerStore"
                        3⤵
                          PID:3040
                        • C:\Windows\system32\findstr.exe
                          findstr /i /c:"OneDrive"
                          3⤵
                            PID:2416
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers" | findstr /i /c:"OneDrive"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3860
                          • C:\Windows\system32\findstr.exe
                            findstr /i /c:"OneDrive"
                            3⤵
                              PID:5008
                            • C:\Windows\system32\reg.exe
                              reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers"
                              3⤵
                                PID:4428
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths" | findstr /i /c:"OneDrive"
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:212
                              • C:\Windows\system32\reg.exe
                                reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                                3⤵
                                  PID:4976
                                • C:\Windows\system32\findstr.exe
                                  findstr /i /c:"OneDrive"
                                  3⤵
                                    PID:4504
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKEY_USERS\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OneDriveFileLauncher.exe" /f
                                  2⤵
                                    PID:2828
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" | findstr /i /c:"OneDrive"
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2680
                                    • C:\Windows\system32\findstr.exe
                                      findstr /i /c:"OneDrive"
                                      3⤵
                                        PID:5048
                                      • C:\Windows\system32\reg.exe
                                        reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"
                                        3⤵
                                          PID:1432
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKEY_USERS\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe" /f
                                        2⤵
                                          PID:4000
                                        • C:\Windows\system32\findstr.exe
                                          findstr /c:"Volatile Environment" /c:"AME_UserHive_"
                                          2⤵
                                            PID:4456
                                          • C:\Windows\system32\reg.exe
                                            reg query "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes"
                                            2⤵
                                              PID:4580
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKU\S-1-5-21-2805025096-2326403612-4231045514-1000\Environment" /v "OneDrive" /f
                                              2⤵
                                                PID:3412
                                              • C:\Windows\system32\reg.exe
                                                reg query "HKU\S-1-5-18"
                                                2⤵
                                                  PID:1960
                                                • C:\Windows\system32\findstr.exe
                                                  findstr /c:"Volatile Environment" /c:"AME_UserHive_"
                                                  2⤵
                                                    PID:952
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /f /im "OneDrive.exe"
                                                    2⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5072
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c dir /b /a:d "C:\Users"
                                                    2⤵
                                                      PID:4656
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SyncRootManager" | findstr /i /c:"OneDrive"
                                                      2⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:400
                                                      • C:\Windows\system32\reg.exe
                                                        reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SyncRootManager"
                                                        3⤵
                                                          PID:4272
                                                        • C:\Windows\system32\findstr.exe
                                                          findstr /i /c:"OneDrive"
                                                          3⤵
                                                            PID:4300
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c schtasks /query /fo list /v | findstr /c:"\OneDrive Reporting Task" /c:"\OneDrive Standalone Update Task"
                                                          2⤵
                                                            PID:3468
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /query /fo list /v
                                                              3⤵
                                                                PID:2084
                                                              • C:\Windows\system32\findstr.exe
                                                                findstr /c:"\OneDrive Reporting Task" /c:"\OneDrive Standalone Update Task"
                                                                3⤵
                                                                  PID:4468

                                                            Network

                                                            MITRE ATT&CK Enterprise v6

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads