Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-05-2023 10:03
Static task
static1
General
-
Target
1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe
-
Size
589KB
-
MD5
46befae2e1f40094aab59e2f43392f9f
-
SHA1
e3f1c6bcbd38c01a9992259be3a79116dfc5265c
-
SHA256
1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370
-
SHA512
0742aafc5a7b62af1e31baec7cf8c549b549ca67dc49ce72780ad50e2bccc684003f4ee5fcf8cabd611c52b63c3ea6f0b8c03d2fad1e64cc6effda81f448b2f2
-
SSDEEP
12288:4MrLy902VxTWc0A966iHstnIPVoi9l1X6J7nDavqlOJ:zyJxQr6iHaIP+olsdDa5J
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2496836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2496836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2496836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2496836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2496836.exe -
Executes dropped EXE 7 IoCs
pid Process 3348 x3130838.exe 2740 g6339915.exe 1276 h2496836.exe 4516 i2239240.exe 4820 oneetx.exe 4484 oneetx.exe 4316 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4464 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2496836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2496836.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3130838.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3130838.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3588 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2740 g6339915.exe 2740 g6339915.exe 1276 h2496836.exe 1276 h2496836.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 g6339915.exe Token: SeDebugPrivilege 1276 h2496836.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4516 i2239240.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3348 4028 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe 66 PID 4028 wrote to memory of 3348 4028 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe 66 PID 4028 wrote to memory of 3348 4028 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe 66 PID 3348 wrote to memory of 2740 3348 x3130838.exe 67 PID 3348 wrote to memory of 2740 3348 x3130838.exe 67 PID 3348 wrote to memory of 2740 3348 x3130838.exe 67 PID 3348 wrote to memory of 1276 3348 x3130838.exe 69 PID 3348 wrote to memory of 1276 3348 x3130838.exe 69 PID 3348 wrote to memory of 1276 3348 x3130838.exe 69 PID 4028 wrote to memory of 4516 4028 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe 70 PID 4028 wrote to memory of 4516 4028 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe 70 PID 4028 wrote to memory of 4516 4028 1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe 70 PID 4516 wrote to memory of 4820 4516 i2239240.exe 71 PID 4516 wrote to memory of 4820 4516 i2239240.exe 71 PID 4516 wrote to memory of 4820 4516 i2239240.exe 71 PID 4820 wrote to memory of 3588 4820 oneetx.exe 72 PID 4820 wrote to memory of 3588 4820 oneetx.exe 72 PID 4820 wrote to memory of 3588 4820 oneetx.exe 72 PID 4820 wrote to memory of 2904 4820 oneetx.exe 74 PID 4820 wrote to memory of 2904 4820 oneetx.exe 74 PID 4820 wrote to memory of 2904 4820 oneetx.exe 74 PID 2904 wrote to memory of 2244 2904 cmd.exe 76 PID 2904 wrote to memory of 2244 2904 cmd.exe 76 PID 2904 wrote to memory of 2244 2904 cmd.exe 76 PID 2904 wrote to memory of 4904 2904 cmd.exe 77 PID 2904 wrote to memory of 4904 2904 cmd.exe 77 PID 2904 wrote to memory of 4904 2904 cmd.exe 77 PID 2904 wrote to memory of 512 2904 cmd.exe 78 PID 2904 wrote to memory of 512 2904 cmd.exe 78 PID 2904 wrote to memory of 512 2904 cmd.exe 78 PID 2904 wrote to memory of 4788 2904 cmd.exe 79 PID 2904 wrote to memory of 4788 2904 cmd.exe 79 PID 2904 wrote to memory of 4788 2904 cmd.exe 79 PID 2904 wrote to memory of 4772 2904 cmd.exe 80 PID 2904 wrote to memory of 4772 2904 cmd.exe 80 PID 2904 wrote to memory of 4772 2904 cmd.exe 80 PID 2904 wrote to memory of 3392 2904 cmd.exe 81 PID 2904 wrote to memory of 3392 2904 cmd.exe 81 PID 2904 wrote to memory of 3392 2904 cmd.exe 81 PID 4820 wrote to memory of 4464 4820 oneetx.exe 82 PID 4820 wrote to memory of 4464 4820 oneetx.exe 82 PID 4820 wrote to memory of 4464 4820 oneetx.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe"C:\Users\Admin\AppData\Local\Temp\1749787b426b25e1ad3a8cc838b6201b8e7c151f443ab5f27c96118cd3f24370.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3130838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3130838.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6339915.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6339915.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2496836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2496836.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2239240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2239240.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3392
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4484
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
417KB
MD5396cc59f47a676a25a5d163fb0d86fdf
SHA1b61edfa7e0645255dc0be4f40b623e03857d097f
SHA2565bdcd9d6814d5f7d4e904171df65b37067fd7006ff427d2519e3cda07c8f1ebb
SHA51252a5c46e0f54a097ad05ca3292cb49adde09621dfa100b9c508eca9b97967e49e9a62c327f6b3dff4918e91097df0a818c79431f9069de0d39b6ed37b8e10c92
-
Filesize
417KB
MD5396cc59f47a676a25a5d163fb0d86fdf
SHA1b61edfa7e0645255dc0be4f40b623e03857d097f
SHA2565bdcd9d6814d5f7d4e904171df65b37067fd7006ff427d2519e3cda07c8f1ebb
SHA51252a5c46e0f54a097ad05ca3292cb49adde09621dfa100b9c508eca9b97967e49e9a62c327f6b3dff4918e91097df0a818c79431f9069de0d39b6ed37b8e10c92
-
Filesize
136KB
MD558783b753ec58e610e18e4e84040a039
SHA162021f086c7cdc33953046fc62bf06f6b1f24af3
SHA25659554fef89d30b20aeb9b1a93cb00763dcb88ac30729833256ca93cd79cb9563
SHA51236c3ab236737d563ad059d2cd5e3213757d28e49bde185dc7c69c9fa589c0c44865a04772369154d567f88dd2e8d525263457557e229b35a760085296435153b
-
Filesize
136KB
MD558783b753ec58e610e18e4e84040a039
SHA162021f086c7cdc33953046fc62bf06f6b1f24af3
SHA25659554fef89d30b20aeb9b1a93cb00763dcb88ac30729833256ca93cd79cb9563
SHA51236c3ab236737d563ad059d2cd5e3213757d28e49bde185dc7c69c9fa589c0c44865a04772369154d567f88dd2e8d525263457557e229b35a760085296435153b
-
Filesize
361KB
MD593b3ccdee99924f574f83324c4ddc613
SHA1dff6a3d77218db6fb3302efeee5397d63abeb943
SHA2568ef81607dc23fb08a45b4be680a2090e429bb3e2087e0073b800c8070d93c8da
SHA5125c78b322ed47cd4167a13cc04f550e3fb632e6b4220134d29456f5a52fd5c98a9692503dcc87c97f795c4acc048674e596271f60bfed765c115b96e9a0d8714b
-
Filesize
361KB
MD593b3ccdee99924f574f83324c4ddc613
SHA1dff6a3d77218db6fb3302efeee5397d63abeb943
SHA2568ef81607dc23fb08a45b4be680a2090e429bb3e2087e0073b800c8070d93c8da
SHA5125c78b322ed47cd4167a13cc04f550e3fb632e6b4220134d29456f5a52fd5c98a9692503dcc87c97f795c4acc048674e596271f60bfed765c115b96e9a0d8714b
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
204KB
MD55e4beb3d9ce235e439ba0f064f769c8c
SHA154d8559b63f3d034071c78575ae601805f05094e
SHA256e015279bff2f4eb3b0b81e1f4ee7f2a91e761fca4b0fb6a37b46434cba524f1b
SHA5129f7246a9fd185bc4e7fd74f7b6bcac6a29b8588a509beaf323bd43147e00c587bd90d5f22692b8b65e913c50b10ee6226abb98dce0d5b975de69f3a7c9cc351d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53