Analysis
-
max time kernel
258s -
max time network
268s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/05/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe
Resource
win7-20230220-en
General
-
Target
6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe
-
Size
479KB
-
MD5
45afad213156d81a50277110bc25e2ac
-
SHA1
18f557780f4e48e96ffc46d309226da1554fe105
-
SHA256
6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6
-
SHA512
68dd0ed8d908d2767f8b1caae5178c2655c5d2e6c76ec0bb056baa07aae49146bb963a78e0c55f97b2586b6fe4f16939ad2dd033ec3875a28031eefbaafd931a
-
SSDEEP
12288:MMrQy90XaXpwl3y/bWrg2Qb1xsgBRPKtOsgw:8yZpwl398B1xsgrP6d
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0194489.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0194489.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0194489.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0194489.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0194489.exe -
Executes dropped EXE 9 IoCs
pid Process 1720 y1514527.exe 1600 k0194489.exe 2828 l6690468.exe 4792 m9150950.exe 4188 oneetx.exe 3372 oneetx.exe 3444 oneetx.exe 3220 oneetx.exe 3856 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4856 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0194489.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0194489.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1514527.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1514527.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1600 k0194489.exe 1600 k0194489.exe 2828 l6690468.exe 2828 l6690468.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1600 k0194489.exe Token: SeDebugPrivilege 2828 l6690468.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4792 m9150950.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4300 wrote to memory of 1720 4300 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe 66 PID 4300 wrote to memory of 1720 4300 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe 66 PID 4300 wrote to memory of 1720 4300 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe 66 PID 1720 wrote to memory of 1600 1720 y1514527.exe 67 PID 1720 wrote to memory of 1600 1720 y1514527.exe 67 PID 1720 wrote to memory of 1600 1720 y1514527.exe 67 PID 1720 wrote to memory of 2828 1720 y1514527.exe 68 PID 1720 wrote to memory of 2828 1720 y1514527.exe 68 PID 1720 wrote to memory of 2828 1720 y1514527.exe 68 PID 4300 wrote to memory of 4792 4300 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe 70 PID 4300 wrote to memory of 4792 4300 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe 70 PID 4300 wrote to memory of 4792 4300 6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe 70 PID 4792 wrote to memory of 4188 4792 m9150950.exe 71 PID 4792 wrote to memory of 4188 4792 m9150950.exe 71 PID 4792 wrote to memory of 4188 4792 m9150950.exe 71 PID 4188 wrote to memory of 3684 4188 oneetx.exe 72 PID 4188 wrote to memory of 3684 4188 oneetx.exe 72 PID 4188 wrote to memory of 3684 4188 oneetx.exe 72 PID 4188 wrote to memory of 1740 4188 oneetx.exe 74 PID 4188 wrote to memory of 1740 4188 oneetx.exe 74 PID 4188 wrote to memory of 1740 4188 oneetx.exe 74 PID 1740 wrote to memory of 3776 1740 cmd.exe 76 PID 1740 wrote to memory of 3776 1740 cmd.exe 76 PID 1740 wrote to memory of 3776 1740 cmd.exe 76 PID 1740 wrote to memory of 1308 1740 cmd.exe 77 PID 1740 wrote to memory of 1308 1740 cmd.exe 77 PID 1740 wrote to memory of 1308 1740 cmd.exe 77 PID 1740 wrote to memory of 2904 1740 cmd.exe 78 PID 1740 wrote to memory of 2904 1740 cmd.exe 78 PID 1740 wrote to memory of 2904 1740 cmd.exe 78 PID 1740 wrote to memory of 4748 1740 cmd.exe 79 PID 1740 wrote to memory of 4748 1740 cmd.exe 79 PID 1740 wrote to memory of 4748 1740 cmd.exe 79 PID 1740 wrote to memory of 4048 1740 cmd.exe 80 PID 1740 wrote to memory of 4048 1740 cmd.exe 80 PID 1740 wrote to memory of 4048 1740 cmd.exe 80 PID 1740 wrote to memory of 984 1740 cmd.exe 81 PID 1740 wrote to memory of 984 1740 cmd.exe 81 PID 1740 wrote to memory of 984 1740 cmd.exe 81 PID 4188 wrote to memory of 4856 4188 oneetx.exe 82 PID 4188 wrote to memory of 4856 4188 oneetx.exe 82 PID 4188 wrote to memory of 4856 4188 oneetx.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe"C:\Users\Admin\AppData\Local\Temp\6c6cded1ba2a26013ccbb224ada9c53c5281928ef0149947047fd4372ed4abf6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1514527.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1514527.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0194489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0194489.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6690468.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6690468.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9150950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9150950.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:984
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3372
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3444
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3220
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
307KB
MD5a96824f1f412961bc54233f2ad636b40
SHA1048eb21b3b40dc32ac63d09b3bca455de34f7257
SHA25674a2a7a8524c2d6495e02362e484add906f02b213d679f858c90627867cdac0d
SHA5122a0ee34e7bc1c9a71f7c1644388bdf59aebf64ea3d9852e714f3fa5491ca2cbcb3a337f9093c9138c078946d357c879b6830e821968c65fac6bff2f0fe023546
-
Filesize
307KB
MD5a96824f1f412961bc54233f2ad636b40
SHA1048eb21b3b40dc32ac63d09b3bca455de34f7257
SHA25674a2a7a8524c2d6495e02362e484add906f02b213d679f858c90627867cdac0d
SHA5122a0ee34e7bc1c9a71f7c1644388bdf59aebf64ea3d9852e714f3fa5491ca2cbcb3a337f9093c9138c078946d357c879b6830e821968c65fac6bff2f0fe023546
-
Filesize
175KB
MD568598b75cdedee97f72b1171d2cbdd39
SHA1347434e7dce22e872758116edff6fa60f654d7e6
SHA25689515a3bac074ffed0f51d323acb12d95bed2845fab8d0b5d9568bddbe6829df
SHA5127383cde2136c30f5b6fb48325ab5809f85df7e43787773b2a5fe75b898e69239aa052c1af65917d576f7a9dd44c0ab6e41c108018805a5afafabdaaee455a087
-
Filesize
175KB
MD568598b75cdedee97f72b1171d2cbdd39
SHA1347434e7dce22e872758116edff6fa60f654d7e6
SHA25689515a3bac074ffed0f51d323acb12d95bed2845fab8d0b5d9568bddbe6829df
SHA5127383cde2136c30f5b6fb48325ab5809f85df7e43787773b2a5fe75b898e69239aa052c1af65917d576f7a9dd44c0ab6e41c108018805a5afafabdaaee455a087
-
Filesize
136KB
MD50dc10098404fadb6fd566c2be35c4534
SHA1538ba57b6488d4b8a52c186659a111ac5f1df203
SHA256d4554545e4da0fe85afd3298e1db4b57a7408a4dc6f1846622761a1fbdbec574
SHA512d5cd627b8691e34f6adbceeab270a6233e2d70c0cf053b78889f7ddce37c4d1a4b43b0957cadb866ccf32733e2a068485a140886bc938411524479c497ce4a73
-
Filesize
136KB
MD50dc10098404fadb6fd566c2be35c4534
SHA1538ba57b6488d4b8a52c186659a111ac5f1df203
SHA256d4554545e4da0fe85afd3298e1db4b57a7408a4dc6f1846622761a1fbdbec574
SHA512d5cd627b8691e34f6adbceeab270a6233e2d70c0cf053b78889f7ddce37c4d1a4b43b0957cadb866ccf32733e2a068485a140886bc938411524479c497ce4a73
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
207KB
MD557629d1ac2c62416ceb6cff690c15e14
SHA1900481ead0ab1b4ddb22b05b1a03944aedf717ef
SHA25616fbfffc7f990955beac7746e4cdefd625fc2448a87ee66b6b929ac2785211a6
SHA5128f89c35d2c55a79f7ba1fe30032bed729b6a47a1be1549902bf84ca7715167ebc68c2965ba381cc70624f1f1ebda6e6774fb03e7b808c11d537c4ece54b13c62
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53