Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-05-2023 16:45

General

  • Target

    38e8b63311c104a4c7004bcfc27979bcabeff2659b06677245d39e3f15ba2682.exe

  • Size

    480KB

  • MD5

    243f1e6cf95dc26607edbf69dbd68e13

  • SHA1

    480ab6d89aa78dabf97557673dc3ae40508a79a3

  • SHA256

    38e8b63311c104a4c7004bcfc27979bcabeff2659b06677245d39e3f15ba2682

  • SHA512

    3ed99688e413ebee7997d7325413fc3770822896ef3eabf2022d25853be8c3cd407fddab21b0ac26584efb4b89ec0d3af1503126f04449236851f215a75fb8d9

  • SSDEEP

    6144:KYy+bnr+Qp0yN90QE8v1sbYIIILu8BnSBAhuRmxlb2LPSKf7MfqrQ10V6OppRjY1:4Mrky9061s1hUAGBLPSKgwBRjY0Ai0

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38e8b63311c104a4c7004bcfc27979bcabeff2659b06677245d39e3f15ba2682.exe
    "C:\Users\Admin\AppData\Local\Temp\38e8b63311c104a4c7004bcfc27979bcabeff2659b06677245d39e3f15ba2682.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4446816.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4446816.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8140601.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8140601.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5440359.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5440359.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3043637.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3043637.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4244
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4792
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4912
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1736
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3104
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4524
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:4536
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3976
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3136
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4592

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3043637.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3043637.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4446816.exe

                Filesize

                308KB

                MD5

                9330cd639934791a6cc7fbaf6bc42862

                SHA1

                6321f3caabf7499def50277ff291aebb769a0b24

                SHA256

                4416f62d5fd44d532020841e18b90e190902c5ed10fec3bd380b6905806e31c6

                SHA512

                8e351ee768274d407c6d5cc4ef163e272fde04085bdb017044e56c6525c0974308eb4fa14aa349b6ea0873fb3c9cbf9126cf22ef421f1c98dbffa760aabe4922

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4446816.exe

                Filesize

                308KB

                MD5

                9330cd639934791a6cc7fbaf6bc42862

                SHA1

                6321f3caabf7499def50277ff291aebb769a0b24

                SHA256

                4416f62d5fd44d532020841e18b90e190902c5ed10fec3bd380b6905806e31c6

                SHA512

                8e351ee768274d407c6d5cc4ef163e272fde04085bdb017044e56c6525c0974308eb4fa14aa349b6ea0873fb3c9cbf9126cf22ef421f1c98dbffa760aabe4922

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8140601.exe

                Filesize

                175KB

                MD5

                ee2f885c317f72e2fd7138a1eeee9bc1

                SHA1

                def64ee15a4456c5ddc5d5ea6f59284155c7ac29

                SHA256

                86a43d3fb27b916b5753e6c6cdedd0a27cb3205f53b2905dd7fcb513f5bec562

                SHA512

                28211b8920780125cd283733927ba18a081bdb50bce52dface9e3e0067f3cb9240679730ad9ec56d53b325c7d9e3686c42bebf51159c1f823a4f540a53e5dcbb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8140601.exe

                Filesize

                175KB

                MD5

                ee2f885c317f72e2fd7138a1eeee9bc1

                SHA1

                def64ee15a4456c5ddc5d5ea6f59284155c7ac29

                SHA256

                86a43d3fb27b916b5753e6c6cdedd0a27cb3205f53b2905dd7fcb513f5bec562

                SHA512

                28211b8920780125cd283733927ba18a081bdb50bce52dface9e3e0067f3cb9240679730ad9ec56d53b325c7d9e3686c42bebf51159c1f823a4f540a53e5dcbb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5440359.exe

                Filesize

                136KB

                MD5

                de9581437826c3a87445854f2f8ce1dc

                SHA1

                efed9b349ce8368fb11f125210b4aa2cccc0297c

                SHA256

                6a407d1e8b8906645a61e55e05ae2cff76a3839bec1e27d3a95f290d57e489a6

                SHA512

                7e0a9061c8fbb2c430ab475ed1cfae7748cc6ab4d4b79813048ed827665bb99bc6e97e92faa2487eed17ebbec8ecb21e255054982f60db35748beb359c170d2d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5440359.exe

                Filesize

                136KB

                MD5

                de9581437826c3a87445854f2f8ce1dc

                SHA1

                efed9b349ce8368fb11f125210b4aa2cccc0297c

                SHA256

                6a407d1e8b8906645a61e55e05ae2cff76a3839bec1e27d3a95f290d57e489a6

                SHA512

                7e0a9061c8fbb2c430ab475ed1cfae7748cc6ab4d4b79813048ed827665bb99bc6e97e92faa2487eed17ebbec8ecb21e255054982f60db35748beb359c170d2d

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                204KB

                MD5

                c14869045ea50a4368e015350d349b81

                SHA1

                f0515e00463d02b8cd9404a0b2b4ba21e2155fac

                SHA256

                454da82a4921c2826b942421cfd4c066242abbb6bb079f9be478c10026640196

                SHA512

                14456e2d4be1670573d3dd9c3cac91317c52f7dc4c9e5632bfae7f19cc6e073adb2a5a55ee8e7f920f3b4fabd2e95082f0a5650190aad9b0663450fa583dee22

              • memory/3088-156-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-169-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/3088-139-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-140-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-142-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-144-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-146-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-148-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-150-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-152-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-154-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-136-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/3088-160-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-158-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-162-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-164-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-166-0x0000000004A50000-0x0000000004A62000-memory.dmp

                Filesize

                72KB

              • memory/3088-167-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/3088-168-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/3088-138-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/3088-133-0x0000000002120000-0x000000000213A000-memory.dmp

                Filesize

                104KB

              • memory/3088-134-0x0000000004AE0000-0x0000000004FDE000-memory.dmp

                Filesize

                5.0MB

              • memory/3088-135-0x0000000004A50000-0x0000000004A68000-memory.dmp

                Filesize

                96KB

              • memory/3088-137-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4196-184-0x00000000084B0000-0x0000000008500000-memory.dmp

                Filesize

                320KB

              • memory/4196-178-0x00000000077E0000-0x00000000077F0000-memory.dmp

                Filesize

                64KB

              • memory/4196-180-0x0000000007510000-0x000000000755B000-memory.dmp

                Filesize

                300KB

              • memory/4196-181-0x0000000007860000-0x00000000078C6000-memory.dmp

                Filesize

                408KB

              • memory/4196-182-0x0000000008410000-0x00000000084A2000-memory.dmp

                Filesize

                584KB

              • memory/4196-183-0x0000000008530000-0x00000000085A6000-memory.dmp

                Filesize

                472KB

              • memory/4196-179-0x00000000074D0000-0x000000000750E000-memory.dmp

                Filesize

                248KB

              • memory/4196-177-0x00000000075A0000-0x00000000076AA000-memory.dmp

                Filesize

                1.0MB

              • memory/4196-174-0x0000000000790000-0x00000000007B8000-memory.dmp

                Filesize

                160KB

              • memory/4196-175-0x00000000079E0000-0x0000000007FE6000-memory.dmp

                Filesize

                6.0MB

              • memory/4196-176-0x0000000007470000-0x0000000007482000-memory.dmp

                Filesize

                72KB

              • memory/4196-185-0x0000000008E00000-0x0000000008FC2000-memory.dmp

                Filesize

                1.8MB

              • memory/4196-186-0x0000000009500000-0x0000000009A2C000-memory.dmp

                Filesize

                5.2MB

              • memory/4196-187-0x0000000008CB0000-0x0000000008CCE000-memory.dmp

                Filesize

                120KB