Analysis

  • max time kernel
    119s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 05:41

General

  • Target

    280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe

  • Size

    479KB

  • MD5

    d329527ce79f18ddb1ad12adda308d7a

  • SHA1

    5fd168980a4662f3db91e1eb467989c806d0ca21

  • SHA256

    280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3

  • SHA512

    9e5a5b68e4c7426a987b3e5bdc21e63f97c2446f85f31ae44f46ddb87b55697c1e020af241bf9d256c0bac202898864620b9e73f2ec5952bc5ddfe773557d4da

  • SSDEEP

    12288:HMrBy90nC7hxEjHxZ7ADbb38ny0kHH/P4R1Rl:eyMcqAwyr34RDl

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe
    "C:\Users\Admin\AppData\Local\Temp\280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5086410.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5086410.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6348965.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6348965.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3905466.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3905466.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2905810.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2905810.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2580
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4276
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1324
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1504
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3000
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2708
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:1240
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:4892
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3612
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4880
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3192

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2905810.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2905810.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5086410.exe

                      Filesize

                      307KB

                      MD5

                      f9b0044c7f520681b5541ac3b5d4a00e

                      SHA1

                      63d80969504f91bfba66dc1f5b9c8c281ae06ea6

                      SHA256

                      09be293cdea68c92405c73f34fc4463af6579e7ac578d3c97abb6662e05a7213

                      SHA512

                      301e197cf0f07cbe9f2dc30388473a1c3a56fde0b3b1a9ee05fe0b05dad98fc5203de43c02af477c73b1b3e3946d72cf1d5bb8c40b1ffb366ca9d5b8152585da

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5086410.exe

                      Filesize

                      307KB

                      MD5

                      f9b0044c7f520681b5541ac3b5d4a00e

                      SHA1

                      63d80969504f91bfba66dc1f5b9c8c281ae06ea6

                      SHA256

                      09be293cdea68c92405c73f34fc4463af6579e7ac578d3c97abb6662e05a7213

                      SHA512

                      301e197cf0f07cbe9f2dc30388473a1c3a56fde0b3b1a9ee05fe0b05dad98fc5203de43c02af477c73b1b3e3946d72cf1d5bb8c40b1ffb366ca9d5b8152585da

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6348965.exe

                      Filesize

                      175KB

                      MD5

                      b45a53356146ab76fa86608fe3e20f81

                      SHA1

                      a38e691388657692f3ba8503c34540a1fb802e11

                      SHA256

                      9fbb55e49e1a0e42c98642ee57209b56cf3396229b295b4992727558faf4cb29

                      SHA512

                      c1c781357decf926c405bd2c1ff2b46fa1100e6fd91ea0e328488972b321140fa53eef2eb8a38224a30a2c507b311a6268e5dc6e685b018dfb3b18820468d2f2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6348965.exe

                      Filesize

                      175KB

                      MD5

                      b45a53356146ab76fa86608fe3e20f81

                      SHA1

                      a38e691388657692f3ba8503c34540a1fb802e11

                      SHA256

                      9fbb55e49e1a0e42c98642ee57209b56cf3396229b295b4992727558faf4cb29

                      SHA512

                      c1c781357decf926c405bd2c1ff2b46fa1100e6fd91ea0e328488972b321140fa53eef2eb8a38224a30a2c507b311a6268e5dc6e685b018dfb3b18820468d2f2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3905466.exe

                      Filesize

                      136KB

                      MD5

                      38cbb224dac560bbb19878c92d353b3d

                      SHA1

                      5ef3d64bd3765c36353af9e56a6b9788dc58fb9e

                      SHA256

                      51366ba2dba94c287a6f2e22654e714f4f8b2db9e7d7dc47464f2a628f8097b5

                      SHA512

                      85178bc98d09b41d10634751d2b0e998fd1962b073a854ba1e558ed507082ddb16e849e494aba81ef5a1cd5825f90d08ccb6f07e09479767b84820c4945a3414

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3905466.exe

                      Filesize

                      136KB

                      MD5

                      38cbb224dac560bbb19878c92d353b3d

                      SHA1

                      5ef3d64bd3765c36353af9e56a6b9788dc58fb9e

                      SHA256

                      51366ba2dba94c287a6f2e22654e714f4f8b2db9e7d7dc47464f2a628f8097b5

                      SHA512

                      85178bc98d09b41d10634751d2b0e998fd1962b073a854ba1e558ed507082ddb16e849e494aba81ef5a1cd5825f90d08ccb6f07e09479767b84820c4945a3414

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      207KB

                      MD5

                      63a05809aa36deaa130a59f6f75c8af6

                      SHA1

                      78273832fca11c947475f9a90163c2bb3c1861d0

                      SHA256

                      6cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62

                      SHA512

                      b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/3208-160-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-162-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-172-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-174-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-176-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-178-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-179-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/3208-180-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/3208-181-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/3208-168-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-166-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-147-0x0000000004A50000-0x0000000004FF4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/3208-148-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/3208-149-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/3208-150-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/3208-151-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-152-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-154-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-156-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-158-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-170-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/3208-164-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4912-192-0x00000000072D0000-0x0000000007336000-memory.dmp

                      Filesize

                      408KB

                    • memory/4912-198-0x00000000082A0000-0x00000000082F0000-memory.dmp

                      Filesize

                      320KB

                    • memory/4912-196-0x0000000009170000-0x000000000969C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4912-195-0x0000000008A70000-0x0000000008C32000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4912-194-0x0000000008100000-0x0000000008176000-memory.dmp

                      Filesize

                      472KB

                    • memory/4912-193-0x0000000007E70000-0x0000000007F02000-memory.dmp

                      Filesize

                      584KB

                    • memory/4912-197-0x0000000008200000-0x000000000821E000-memory.dmp

                      Filesize

                      120KB

                    • memory/4912-191-0x0000000006FC0000-0x0000000006FD0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4912-190-0x0000000006FD0000-0x000000000700C000-memory.dmp

                      Filesize

                      240KB

                    • memory/4912-189-0x0000000007060000-0x000000000716A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4912-188-0x0000000006F30000-0x0000000006F42000-memory.dmp

                      Filesize

                      72KB

                    • memory/4912-187-0x00000000074B0000-0x0000000007AC8000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/4912-186-0x0000000000200000-0x0000000000228000-memory.dmp

                      Filesize

                      160KB