Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 05:34
Static task
static1
General
-
Target
63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe
-
Size
479KB
-
MD5
9303d7e08095bd78949fc0cc4bb10866
-
SHA1
18a45b8b465d102c52cd4b2a8c66fad055d4a16d
-
SHA256
63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1
-
SHA512
826b84d2db8fa565a8599d3efea01402a6f6b67b784c62052ced9941b0ed646fed79bf9020654a2b174ee3e28d0b25b1ad08e178c0c07a3cc7ebcb15daf39719
-
SSDEEP
12288:KMrEy90r35rYb52M3ErZrb+YnyLtAjzh0wn8RE8B/:+yA35U4MO+QyBAhJnX8B/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4062081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4062081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4062081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4062081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4062081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4062081.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation d1397294.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 4552 v3438294.exe 1544 a4062081.exe 5020 b4645838.exe 1924 d1397294.exe 1568 oneetx.exe 4168 oneetx.exe 2728 oneetx.exe 224 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 940 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4062081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4062081.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3438294.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3438294.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1544 a4062081.exe 1544 a4062081.exe 5020 b4645838.exe 5020 b4645838.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1544 a4062081.exe Token: SeDebugPrivilege 5020 b4645838.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 d1397294.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4552 3376 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe 85 PID 3376 wrote to memory of 4552 3376 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe 85 PID 3376 wrote to memory of 4552 3376 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe 85 PID 4552 wrote to memory of 1544 4552 v3438294.exe 86 PID 4552 wrote to memory of 1544 4552 v3438294.exe 86 PID 4552 wrote to memory of 1544 4552 v3438294.exe 86 PID 4552 wrote to memory of 5020 4552 v3438294.exe 91 PID 4552 wrote to memory of 5020 4552 v3438294.exe 91 PID 4552 wrote to memory of 5020 4552 v3438294.exe 91 PID 3376 wrote to memory of 1924 3376 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe 95 PID 3376 wrote to memory of 1924 3376 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe 95 PID 3376 wrote to memory of 1924 3376 63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe 95 PID 1924 wrote to memory of 1568 1924 d1397294.exe 96 PID 1924 wrote to memory of 1568 1924 d1397294.exe 96 PID 1924 wrote to memory of 1568 1924 d1397294.exe 96 PID 1568 wrote to memory of 2664 1568 oneetx.exe 97 PID 1568 wrote to memory of 2664 1568 oneetx.exe 97 PID 1568 wrote to memory of 2664 1568 oneetx.exe 97 PID 1568 wrote to memory of 4912 1568 oneetx.exe 99 PID 1568 wrote to memory of 4912 1568 oneetx.exe 99 PID 1568 wrote to memory of 4912 1568 oneetx.exe 99 PID 4912 wrote to memory of 1976 4912 cmd.exe 101 PID 4912 wrote to memory of 1976 4912 cmd.exe 101 PID 4912 wrote to memory of 1976 4912 cmd.exe 101 PID 4912 wrote to memory of 1708 4912 cmd.exe 102 PID 4912 wrote to memory of 1708 4912 cmd.exe 102 PID 4912 wrote to memory of 1708 4912 cmd.exe 102 PID 4912 wrote to memory of 5040 4912 cmd.exe 103 PID 4912 wrote to memory of 5040 4912 cmd.exe 103 PID 4912 wrote to memory of 5040 4912 cmd.exe 103 PID 4912 wrote to memory of 4216 4912 cmd.exe 104 PID 4912 wrote to memory of 4216 4912 cmd.exe 104 PID 4912 wrote to memory of 4216 4912 cmd.exe 104 PID 4912 wrote to memory of 4996 4912 cmd.exe 105 PID 4912 wrote to memory of 4996 4912 cmd.exe 105 PID 4912 wrote to memory of 4996 4912 cmd.exe 105 PID 4912 wrote to memory of 1244 4912 cmd.exe 106 PID 4912 wrote to memory of 1244 4912 cmd.exe 106 PID 4912 wrote to memory of 1244 4912 cmd.exe 106 PID 1568 wrote to memory of 940 1568 oneetx.exe 109 PID 1568 wrote to memory of 940 1568 oneetx.exe 109 PID 1568 wrote to memory of 940 1568 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe"C:\Users\Admin\AppData\Local\Temp\63598af12f6622f0ecd11a18954e396235b26b9b2142ad2e43d209ebd62ae0b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3438294.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3438294.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4062081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4062081.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4645838.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4645838.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1397294.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1397294.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1244
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4168
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
307KB
MD568b27a2af20c8bfa701ff11bc95112dc
SHA1f0e37b9b9dbde6c439357d8b44c02901be6dd7de
SHA256fb28870698b7ab641b2fa3430141e05673d12131fbaee6e090477bc730a91e9a
SHA512a9b305b531cce67ea9ae5222d37bf993b6436f1b1ee47a75fa6643849316dc3e7d9754809bf0771e0e8b3de08cb5a86525696c958441ef5f6805c414daec7900
-
Filesize
307KB
MD568b27a2af20c8bfa701ff11bc95112dc
SHA1f0e37b9b9dbde6c439357d8b44c02901be6dd7de
SHA256fb28870698b7ab641b2fa3430141e05673d12131fbaee6e090477bc730a91e9a
SHA512a9b305b531cce67ea9ae5222d37bf993b6436f1b1ee47a75fa6643849316dc3e7d9754809bf0771e0e8b3de08cb5a86525696c958441ef5f6805c414daec7900
-
Filesize
175KB
MD5e305aacde72f4cdeddd3e2c843825816
SHA17b55bfe28d81e6c3b188a86a179f7d400a2eefb7
SHA2565b7eca3ea23b00943be8ab4e391c5d2fc8c8f709ea623e03f4efeb608665f50a
SHA512e5428ad78fe791d3dc640f5be846d5c04bb37c03165b5d5e137b65f84e6710350b8a23960ec933984625412864135064c4db2c16bc5fae423c1282fc2592798e
-
Filesize
175KB
MD5e305aacde72f4cdeddd3e2c843825816
SHA17b55bfe28d81e6c3b188a86a179f7d400a2eefb7
SHA2565b7eca3ea23b00943be8ab4e391c5d2fc8c8f709ea623e03f4efeb608665f50a
SHA512e5428ad78fe791d3dc640f5be846d5c04bb37c03165b5d5e137b65f84e6710350b8a23960ec933984625412864135064c4db2c16bc5fae423c1282fc2592798e
-
Filesize
136KB
MD54d2ad9321b7ac3767edca382ba86b2bc
SHA110c9cd4b8d337d7ac427a21292070fe1587e4694
SHA25696a86e555aed714db8e1e75cd171003b7886834746f055893a9db9c963456ce6
SHA5127b4e184c24dcdf4c4f25b10e956f5496ec863623cf946f7505023c9c37d5c2dd5c02190747c535cb3c91568aa024f373a9c5afe2c4897f4e66967ccb35bfae9f
-
Filesize
136KB
MD54d2ad9321b7ac3767edca382ba86b2bc
SHA110c9cd4b8d337d7ac427a21292070fe1587e4694
SHA25696a86e555aed714db8e1e75cd171003b7886834746f055893a9db9c963456ce6
SHA5127b4e184c24dcdf4c4f25b10e956f5496ec863623cf946f7505023c9c37d5c2dd5c02190747c535cb3c91568aa024f373a9c5afe2c4897f4e66967ccb35bfae9f
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
207KB
MD543a70e1ea47a09f5e029d7773c9f38bb
SHA1c6ec7a48e2a45320189bd82547aea7c94a01f87e
SHA25646a7f3d5b91567a930b3d17597befc35769c4c83a655c6132f5360cf27c0b503
SHA51207b679dba371df52f60fd509bed16ffbe6681b6469ddb6f163846e38c4ace801f225d7e9ba6ba7c1189f801ca70205c5363dcdc5d1edea6edc6f3a9aed53a44c
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5