Analysis
-
max time kernel
135s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:42
Static task
static1
General
-
Target
5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe
-
Size
480KB
-
MD5
8b1010a6c820c595e68cb2b3116024c8
-
SHA1
ab89ec48e5f89d2d7f7bc44194070abf1a2bfd49
-
SHA256
5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1
-
SHA512
00b98be021ae2450a2c37e98a1ed34a7e04cbc918c11c5cacef5947b65a280e220e47aaeb9678c8bab08367cd40c8ab2fad0975e13ff72f8cc0cd33eefda18d5
-
SSDEEP
12288:WMrPy905NOW90hzkvSRvhwA7+AWKhywZUF:ByY90hovaJ+AWbyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2195226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2195226.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2195226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2195226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2195226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2195226.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation d0591727.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2136 v2693839.exe 2008 a2195226.exe 4092 b9668604.exe 3488 d0591727.exe 4436 oneetx.exe 1460 oneetx.exe 3668 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4276 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2195226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2195226.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2693839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2693839.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2008 a2195226.exe 2008 a2195226.exe 4092 b9668604.exe 4092 b9668604.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 a2195226.exe Token: SeDebugPrivilege 4092 b9668604.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3488 d0591727.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3740 wrote to memory of 2136 3740 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe 83 PID 3740 wrote to memory of 2136 3740 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe 83 PID 3740 wrote to memory of 2136 3740 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe 83 PID 2136 wrote to memory of 2008 2136 v2693839.exe 84 PID 2136 wrote to memory of 2008 2136 v2693839.exe 84 PID 2136 wrote to memory of 2008 2136 v2693839.exe 84 PID 2136 wrote to memory of 4092 2136 v2693839.exe 86 PID 2136 wrote to memory of 4092 2136 v2693839.exe 86 PID 2136 wrote to memory of 4092 2136 v2693839.exe 86 PID 3740 wrote to memory of 3488 3740 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe 87 PID 3740 wrote to memory of 3488 3740 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe 87 PID 3740 wrote to memory of 3488 3740 5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe 87 PID 3488 wrote to memory of 4436 3488 d0591727.exe 88 PID 3488 wrote to memory of 4436 3488 d0591727.exe 88 PID 3488 wrote to memory of 4436 3488 d0591727.exe 88 PID 4436 wrote to memory of 2216 4436 oneetx.exe 89 PID 4436 wrote to memory of 2216 4436 oneetx.exe 89 PID 4436 wrote to memory of 2216 4436 oneetx.exe 89 PID 4436 wrote to memory of 2252 4436 oneetx.exe 91 PID 4436 wrote to memory of 2252 4436 oneetx.exe 91 PID 4436 wrote to memory of 2252 4436 oneetx.exe 91 PID 2252 wrote to memory of 4520 2252 cmd.exe 93 PID 2252 wrote to memory of 4520 2252 cmd.exe 93 PID 2252 wrote to memory of 4520 2252 cmd.exe 93 PID 2252 wrote to memory of 3948 2252 cmd.exe 94 PID 2252 wrote to memory of 3948 2252 cmd.exe 94 PID 2252 wrote to memory of 3948 2252 cmd.exe 94 PID 2252 wrote to memory of 5020 2252 cmd.exe 95 PID 2252 wrote to memory of 5020 2252 cmd.exe 95 PID 2252 wrote to memory of 5020 2252 cmd.exe 95 PID 2252 wrote to memory of 8 2252 cmd.exe 96 PID 2252 wrote to memory of 8 2252 cmd.exe 96 PID 2252 wrote to memory of 8 2252 cmd.exe 96 PID 2252 wrote to memory of 2076 2252 cmd.exe 97 PID 2252 wrote to memory of 2076 2252 cmd.exe 97 PID 2252 wrote to memory of 2076 2252 cmd.exe 97 PID 2252 wrote to memory of 5116 2252 cmd.exe 98 PID 2252 wrote to memory of 5116 2252 cmd.exe 98 PID 2252 wrote to memory of 5116 2252 cmd.exe 98 PID 4436 wrote to memory of 4276 4436 oneetx.exe 100 PID 4436 wrote to memory of 4276 4436 oneetx.exe 100 PID 4436 wrote to memory of 4276 4436 oneetx.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe"C:\Users\Admin\AppData\Local\Temp\5c2fb6ee18f213a067227914c5dabed82125cf34e5760b5d457c08d45cdac9f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2693839.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2693839.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2195226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2195226.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9668604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9668604.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0591727.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0591727.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:8
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:5116
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1460
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
308KB
MD5c9babcb06b31c3c45fb5e12c888b0177
SHA160afa48d789244c3f348631bc16f8d21c1ddb52f
SHA256b07fc5a69dc990a555b596d03f31ab6717f3f1ad888fd4b8a52770314abc55ab
SHA5129de271d8ecb8cc6dc96fdb0614fafecb261114851ece811ef90a9e602ddeaf4cb74c2d3aa491ab24796955cb018acf1051ea0453f7c6c1ec24b42964181b2f75
-
Filesize
308KB
MD5c9babcb06b31c3c45fb5e12c888b0177
SHA160afa48d789244c3f348631bc16f8d21c1ddb52f
SHA256b07fc5a69dc990a555b596d03f31ab6717f3f1ad888fd4b8a52770314abc55ab
SHA5129de271d8ecb8cc6dc96fdb0614fafecb261114851ece811ef90a9e602ddeaf4cb74c2d3aa491ab24796955cb018acf1051ea0453f7c6c1ec24b42964181b2f75
-
Filesize
175KB
MD532c3c65b32ec59ad1fa49c17b6c1a1b2
SHA1ae6d9d0168cdda769bbca80d2c6ac9611d6f3f33
SHA25604b1042911fa1c8fd8823cad5aa15a1970859435dd95c8188e973abb225fd6cb
SHA512fe7f0c0cc34c6bddfe1a0e8766a2b75ac2957fa259570fedeb9203500ee1660c5ebb7bdc3cf3112c916daee085db27422d4e7008982c98f1c46fee313948bc45
-
Filesize
175KB
MD532c3c65b32ec59ad1fa49c17b6c1a1b2
SHA1ae6d9d0168cdda769bbca80d2c6ac9611d6f3f33
SHA25604b1042911fa1c8fd8823cad5aa15a1970859435dd95c8188e973abb225fd6cb
SHA512fe7f0c0cc34c6bddfe1a0e8766a2b75ac2957fa259570fedeb9203500ee1660c5ebb7bdc3cf3112c916daee085db27422d4e7008982c98f1c46fee313948bc45
-
Filesize
136KB
MD54e5186dc89c0af1ef1c6650fdda35557
SHA1b8c0f7fdbdf1a9464dc8154d7e6a8fb95657c8af
SHA2565590d3636ea53a278cf14a0da69d4a2a24cbfc7d7e4f8bffa58be13511a0516a
SHA51231b485412919dc3778cce7acbe3a04ef959ccb7310a3c061eeb7fbdc895531cacebf7a825467457f8449e25de8c77fc07f3e200589f34b101bad9fccc0eee254
-
Filesize
136KB
MD54e5186dc89c0af1ef1c6650fdda35557
SHA1b8c0f7fdbdf1a9464dc8154d7e6a8fb95657c8af
SHA2565590d3636ea53a278cf14a0da69d4a2a24cbfc7d7e4f8bffa58be13511a0516a
SHA51231b485412919dc3778cce7acbe3a04ef959ccb7310a3c061eeb7fbdc895531cacebf7a825467457f8449e25de8c77fc07f3e200589f34b101bad9fccc0eee254
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
206KB
MD55f398f908e033f279f995a23d9e84d15
SHA1addf47cc3cc59150e96c0e42f00ff7da193c8339
SHA25682e0bf9af6d1db555826f559e31342b1a47dfe4791e0916180c5a85b303ab07e
SHA5129905881ff2481242190e118ae81d363d632c0cc9ef7777a1c2e34ac538dcf0d51788cd12756056c6bfabcfad375060177ac2d5ba2bb0046df640b2b3162cec0b
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5