Analysis
-
max time kernel
106s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/05/2023, 06:59
Static task
static1
General
-
Target
03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe
-
Size
376KB
-
MD5
ba981a09d5dafa7088e2ad29b119a321
-
SHA1
b204a2f04c2eb661392d0790d97ddee8a3d54662
-
SHA256
03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103
-
SHA512
d09eb9c4c14d9ebbe8e65ca5d5f795acb75ef0b5e29ab179bfac75af211df4bca0404da10ac2f59d7f75ea5ae2bf4d016f67edb18f7d1a6e7b0faf6807145d0b
-
SSDEEP
6144:Kby+bnr+Ap0yN90QETi3gW52VnuiNUTmpq/MZoHYoxB4ZeXctDWtqJwjlL:BMrIy90hiB2VnuDGUMgxjAGjp
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9139644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9139644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9139644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9139644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9139644.exe -
Executes dropped EXE 7 IoCs
pid Process 2548 v6910862.exe 2992 a9139644.exe 1364 b6165634.exe 2784 d1277239.exe 8 oneetx.exe 4816 oneetx.exe 4868 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3200 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9139644.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6910862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6910862.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2992 a9139644.exe 2992 a9139644.exe 1364 b6165634.exe 1364 b6165634.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2992 a9139644.exe Token: SeDebugPrivilege 1364 b6165634.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 d1277239.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2548 2448 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe 66 PID 2448 wrote to memory of 2548 2448 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe 66 PID 2448 wrote to memory of 2548 2448 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe 66 PID 2548 wrote to memory of 2992 2548 v6910862.exe 67 PID 2548 wrote to memory of 2992 2548 v6910862.exe 67 PID 2548 wrote to memory of 1364 2548 v6910862.exe 68 PID 2548 wrote to memory of 1364 2548 v6910862.exe 68 PID 2548 wrote to memory of 1364 2548 v6910862.exe 68 PID 2448 wrote to memory of 2784 2448 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe 70 PID 2448 wrote to memory of 2784 2448 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe 70 PID 2448 wrote to memory of 2784 2448 03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe 70 PID 2784 wrote to memory of 8 2784 d1277239.exe 71 PID 2784 wrote to memory of 8 2784 d1277239.exe 71 PID 2784 wrote to memory of 8 2784 d1277239.exe 71 PID 8 wrote to memory of 3912 8 oneetx.exe 72 PID 8 wrote to memory of 3912 8 oneetx.exe 72 PID 8 wrote to memory of 3912 8 oneetx.exe 72 PID 8 wrote to memory of 1332 8 oneetx.exe 74 PID 8 wrote to memory of 1332 8 oneetx.exe 74 PID 8 wrote to memory of 1332 8 oneetx.exe 74 PID 1332 wrote to memory of 3788 1332 cmd.exe 76 PID 1332 wrote to memory of 3788 1332 cmd.exe 76 PID 1332 wrote to memory of 3788 1332 cmd.exe 76 PID 1332 wrote to memory of 3012 1332 cmd.exe 77 PID 1332 wrote to memory of 3012 1332 cmd.exe 77 PID 1332 wrote to memory of 3012 1332 cmd.exe 77 PID 1332 wrote to memory of 3772 1332 cmd.exe 78 PID 1332 wrote to memory of 3772 1332 cmd.exe 78 PID 1332 wrote to memory of 3772 1332 cmd.exe 78 PID 1332 wrote to memory of 3768 1332 cmd.exe 79 PID 1332 wrote to memory of 3768 1332 cmd.exe 79 PID 1332 wrote to memory of 3768 1332 cmd.exe 79 PID 1332 wrote to memory of 3764 1332 cmd.exe 80 PID 1332 wrote to memory of 3764 1332 cmd.exe 80 PID 1332 wrote to memory of 3764 1332 cmd.exe 80 PID 1332 wrote to memory of 2124 1332 cmd.exe 81 PID 1332 wrote to memory of 2124 1332 cmd.exe 81 PID 1332 wrote to memory of 2124 1332 cmd.exe 81 PID 8 wrote to memory of 3200 8 oneetx.exe 83 PID 8 wrote to memory of 3200 8 oneetx.exe 83 PID 8 wrote to memory of 3200 8 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe"C:\Users\Admin\AppData\Local\Temp\03273f68f2d9ac609e0db15b80618979c9f996117fb4a348b1d69543c5d4f103.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6910862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6910862.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9139644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9139644.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6165634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6165634.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1277239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1277239.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2124
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
204KB
MD5446f02b83eeb3806044d5dfcc33c1f21
SHA10bd974169155e1c8c4cff5b18ae74d8561543fd7
SHA256d958a601a01c94ed517324424a3ee5aeb9a1438f018d9b7cbb450212171811e5
SHA5128e91ec5a15934360c934003260600e60ca4ce3efc4e2511922e4c49bbfeb5a9f47bf77a645b6a9025c28fd663090136773d28dc1588721d19dc5c56c03d4b77e
-
Filesize
204KB
MD5446f02b83eeb3806044d5dfcc33c1f21
SHA10bd974169155e1c8c4cff5b18ae74d8561543fd7
SHA256d958a601a01c94ed517324424a3ee5aeb9a1438f018d9b7cbb450212171811e5
SHA5128e91ec5a15934360c934003260600e60ca4ce3efc4e2511922e4c49bbfeb5a9f47bf77a645b6a9025c28fd663090136773d28dc1588721d19dc5c56c03d4b77e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
204KB
MD5c14869045ea50a4368e015350d349b81
SHA1f0515e00463d02b8cd9404a0b2b4ba21e2155fac
SHA256454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196
SHA51214456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53