Analysis
-
max time kernel
135s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:09
Static task
static1
General
-
Target
563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe
-
Size
479KB
-
MD5
dabc0625b4b2ea65152cc9b0bc87ef8f
-
SHA1
f004188c41dcec5588e4d0c45adf783a88f34d2a
-
SHA256
563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4
-
SHA512
95445d3881b68c82721528e0127f27a9692ad16ffe1d8e90fb4ff5079f1719dab99b144879e7755ea26c34f443a208be32080382f0e4e278e199db08429ffabd
-
SSDEEP
12288:yMr+y908hkfVzZLO1IWTr4+7DjYuSqTMDG3P5gA+gCj:YythAOiKzDkrUl3xe
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1854124.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1854124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1854124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1854124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1854124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1854124.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation i5428769.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2808 x8275656.exe 1776 g5045448.exe 1540 h1854124.exe 3856 i5428769.exe 3216 oneetx.exe 1472 oneetx.exe 3464 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4184 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1854124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1854124.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8275656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8275656.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1776 g5045448.exe 1776 g5045448.exe 1540 h1854124.exe 1540 h1854124.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 g5045448.exe Token: SeDebugPrivilege 1540 h1854124.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3856 i5428769.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2808 1044 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe 85 PID 1044 wrote to memory of 2808 1044 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe 85 PID 1044 wrote to memory of 2808 1044 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe 85 PID 2808 wrote to memory of 1776 2808 x8275656.exe 86 PID 2808 wrote to memory of 1776 2808 x8275656.exe 86 PID 2808 wrote to memory of 1776 2808 x8275656.exe 86 PID 2808 wrote to memory of 1540 2808 x8275656.exe 91 PID 2808 wrote to memory of 1540 2808 x8275656.exe 91 PID 2808 wrote to memory of 1540 2808 x8275656.exe 91 PID 1044 wrote to memory of 3856 1044 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe 94 PID 1044 wrote to memory of 3856 1044 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe 94 PID 1044 wrote to memory of 3856 1044 563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe 94 PID 3856 wrote to memory of 3216 3856 i5428769.exe 95 PID 3856 wrote to memory of 3216 3856 i5428769.exe 95 PID 3856 wrote to memory of 3216 3856 i5428769.exe 95 PID 3216 wrote to memory of 4800 3216 oneetx.exe 96 PID 3216 wrote to memory of 4800 3216 oneetx.exe 96 PID 3216 wrote to memory of 4800 3216 oneetx.exe 96 PID 3216 wrote to memory of 388 3216 oneetx.exe 98 PID 3216 wrote to memory of 388 3216 oneetx.exe 98 PID 3216 wrote to memory of 388 3216 oneetx.exe 98 PID 388 wrote to memory of 4812 388 cmd.exe 100 PID 388 wrote to memory of 4812 388 cmd.exe 100 PID 388 wrote to memory of 4812 388 cmd.exe 100 PID 388 wrote to memory of 2332 388 cmd.exe 101 PID 388 wrote to memory of 2332 388 cmd.exe 101 PID 388 wrote to memory of 2332 388 cmd.exe 101 PID 388 wrote to memory of 5084 388 cmd.exe 102 PID 388 wrote to memory of 5084 388 cmd.exe 102 PID 388 wrote to memory of 5084 388 cmd.exe 102 PID 388 wrote to memory of 3376 388 cmd.exe 104 PID 388 wrote to memory of 3376 388 cmd.exe 104 PID 388 wrote to memory of 3376 388 cmd.exe 104 PID 388 wrote to memory of 2152 388 cmd.exe 105 PID 388 wrote to memory of 2152 388 cmd.exe 105 PID 388 wrote to memory of 2152 388 cmd.exe 105 PID 388 wrote to memory of 1576 388 cmd.exe 106 PID 388 wrote to memory of 1576 388 cmd.exe 106 PID 388 wrote to memory of 1576 388 cmd.exe 106 PID 3216 wrote to memory of 4184 3216 oneetx.exe 108 PID 3216 wrote to memory of 4184 3216 oneetx.exe 108 PID 3216 wrote to memory of 4184 3216 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe"C:\Users\Admin\AppData\Local\Temp\563bf6f175a2ae16b9ea216d3447ff9a6945dd564ca6e7bf857f0ec8a802aff4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8275656.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8275656.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5045448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5045448.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1854124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1854124.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5428769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5428769.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1576
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1472
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
308KB
MD58db723b4d67ab8cca7bf5a8216079037
SHA14922f61b19381b28bd5a4e7e4dcf43b38ff1afab
SHA25617829180a01c4eefb1a16c55813740c5655d061ec85aa91da76901ee25a663ce
SHA5124a97e8de6bdac19ac4a46df631749dd630c7c927e3aef85a199ae8d3993032b49fec5703ae51b49df7e501118bdbd8b299fdbde8e709a1d06062fdb32dedb753
-
Filesize
308KB
MD58db723b4d67ab8cca7bf5a8216079037
SHA14922f61b19381b28bd5a4e7e4dcf43b38ff1afab
SHA25617829180a01c4eefb1a16c55813740c5655d061ec85aa91da76901ee25a663ce
SHA5124a97e8de6bdac19ac4a46df631749dd630c7c927e3aef85a199ae8d3993032b49fec5703ae51b49df7e501118bdbd8b299fdbde8e709a1d06062fdb32dedb753
-
Filesize
136KB
MD5d0fe3af1aa2204989d270f1b111c791a
SHA1fdba542ffff85a37a6c22a7edb470e643b2f8b8f
SHA2566c202090ece5f93c74dcb186a22a3c255e7e29494e05fc0c5d65814b0d2181b2
SHA5128fc4800056decc6f512317476ec359167c7bdfd97e60f04ed3c18a6f69bd3848d687f90a05bffa853e1eded20b5528e9d4367a453e67dade2b97a6e24fb0bf9f
-
Filesize
136KB
MD5d0fe3af1aa2204989d270f1b111c791a
SHA1fdba542ffff85a37a6c22a7edb470e643b2f8b8f
SHA2566c202090ece5f93c74dcb186a22a3c255e7e29494e05fc0c5d65814b0d2181b2
SHA5128fc4800056decc6f512317476ec359167c7bdfd97e60f04ed3c18a6f69bd3848d687f90a05bffa853e1eded20b5528e9d4367a453e67dade2b97a6e24fb0bf9f
-
Filesize
175KB
MD5c51061d01cb7ebb16bb5f25d7eaddfaa
SHA1aa003e2f07b434aad8a790c4374313117dc48cfc
SHA256e1f320522ce99845bb7e22f6b5e96d06e65c402bf6236b8ea1794ea4848c3954
SHA51294a770993fc929a09ed533393d51893b3be4fded599faea9cfc3be7f8eb9729dfe54097056a783a65f8c88b1ae2cae6d3bc9be68ed8a50fbcf4e8fe9314c7549
-
Filesize
175KB
MD5c51061d01cb7ebb16bb5f25d7eaddfaa
SHA1aa003e2f07b434aad8a790c4374313117dc48cfc
SHA256e1f320522ce99845bb7e22f6b5e96d06e65c402bf6236b8ea1794ea4848c3954
SHA51294a770993fc929a09ed533393d51893b3be4fded599faea9cfc3be7f8eb9729dfe54097056a783a65f8c88b1ae2cae6d3bc9be68ed8a50fbcf4e8fe9314c7549
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
206KB
MD546889a8916d3c0b762cc286f98d2369f
SHA1a4a36d8b428378a2f05ac85abd414600a084c86f
SHA2565c8fb05408508c84d869a42e82708b7b5b2a9b163bc95c8b48005b964d55c596
SHA512f2fd17e5f2f3a53d7513de6271517e5b0a2c3cc550dc80fcf7825fcf6dbad3840fb9908d4acb71b686607dda2741dae8f741a3528fd1c71f9d37ed604a9c1f87
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5