Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 05:41
Static task
static1
General
-
Target
280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe
-
Size
479KB
-
MD5
d329527ce79f18ddb1ad12adda308d7a
-
SHA1
5fd168980a4662f3db91e1eb467989c806d0ca21
-
SHA256
280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3
-
SHA512
9e5a5b68e4c7426a987b3e5bdc21e63f97c2446f85f31ae44f46ddb87b55697c1e020af241bf9d256c0bac202898864620b9e73f2ec5952bc5ddfe773557d4da
-
SSDEEP
12288:HMrBy90nC7hxEjHxZ7ADbb38ny0kHH/P4R1Rl:eyMcqAwyr34RDl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6348965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6348965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6348965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6348965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6348965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6348965.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation d2905810.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1124 v5086410.exe 3208 a6348965.exe 4912 b3905466.exe 5036 d2905810.exe 3932 oneetx.exe 4880 oneetx.exe 3192 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3612 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6348965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6348965.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5086410.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5086410.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3208 a6348965.exe 3208 a6348965.exe 4912 b3905466.exe 4912 b3905466.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3208 a6348965.exe Token: SeDebugPrivilege 4912 b3905466.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5036 d2905810.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1124 2320 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe 83 PID 2320 wrote to memory of 1124 2320 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe 83 PID 2320 wrote to memory of 1124 2320 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe 83 PID 1124 wrote to memory of 3208 1124 v5086410.exe 84 PID 1124 wrote to memory of 3208 1124 v5086410.exe 84 PID 1124 wrote to memory of 3208 1124 v5086410.exe 84 PID 1124 wrote to memory of 4912 1124 v5086410.exe 89 PID 1124 wrote to memory of 4912 1124 v5086410.exe 89 PID 1124 wrote to memory of 4912 1124 v5086410.exe 89 PID 2320 wrote to memory of 5036 2320 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe 93 PID 2320 wrote to memory of 5036 2320 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe 93 PID 2320 wrote to memory of 5036 2320 280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe 93 PID 5036 wrote to memory of 3932 5036 d2905810.exe 94 PID 5036 wrote to memory of 3932 5036 d2905810.exe 94 PID 5036 wrote to memory of 3932 5036 d2905810.exe 94 PID 3932 wrote to memory of 2580 3932 oneetx.exe 95 PID 3932 wrote to memory of 2580 3932 oneetx.exe 95 PID 3932 wrote to memory of 2580 3932 oneetx.exe 95 PID 3932 wrote to memory of 4276 3932 oneetx.exe 97 PID 3932 wrote to memory of 4276 3932 oneetx.exe 97 PID 3932 wrote to memory of 4276 3932 oneetx.exe 97 PID 4276 wrote to memory of 1324 4276 cmd.exe 99 PID 4276 wrote to memory of 1324 4276 cmd.exe 99 PID 4276 wrote to memory of 1324 4276 cmd.exe 99 PID 4276 wrote to memory of 1504 4276 cmd.exe 100 PID 4276 wrote to memory of 1504 4276 cmd.exe 100 PID 4276 wrote to memory of 1504 4276 cmd.exe 100 PID 4276 wrote to memory of 3000 4276 cmd.exe 101 PID 4276 wrote to memory of 3000 4276 cmd.exe 101 PID 4276 wrote to memory of 3000 4276 cmd.exe 101 PID 4276 wrote to memory of 2708 4276 cmd.exe 102 PID 4276 wrote to memory of 2708 4276 cmd.exe 102 PID 4276 wrote to memory of 2708 4276 cmd.exe 102 PID 4276 wrote to memory of 1240 4276 cmd.exe 103 PID 4276 wrote to memory of 1240 4276 cmd.exe 103 PID 4276 wrote to memory of 1240 4276 cmd.exe 103 PID 4276 wrote to memory of 4892 4276 cmd.exe 104 PID 4276 wrote to memory of 4892 4276 cmd.exe 104 PID 4276 wrote to memory of 4892 4276 cmd.exe 104 PID 3932 wrote to memory of 3612 3932 oneetx.exe 107 PID 3932 wrote to memory of 3612 3932 oneetx.exe 107 PID 3932 wrote to memory of 3612 3932 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe"C:\Users\Admin\AppData\Local\Temp\280d09d7c4ca9883bc2f5113757089a125486d0336f08fc826226968bd4f32f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5086410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5086410.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6348965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6348965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3905466.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3905466.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2905810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2905810.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4892
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4880
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
307KB
MD5f9b0044c7f520681b5541ac3b5d4a00e
SHA163d80969504f91bfba66dc1f5b9c8c281ae06ea6
SHA25609be293cdea68c92405c73f34fc4463af6579e7ac578d3c97abb6662e05a7213
SHA512301e197cf0f07cbe9f2dc30388473a1c3a56fde0b3b1a9ee05fe0b05dad98fc5203de43c02af477c73b1b3e3946d72cf1d5bb8c40b1ffb366ca9d5b8152585da
-
Filesize
307KB
MD5f9b0044c7f520681b5541ac3b5d4a00e
SHA163d80969504f91bfba66dc1f5b9c8c281ae06ea6
SHA25609be293cdea68c92405c73f34fc4463af6579e7ac578d3c97abb6662e05a7213
SHA512301e197cf0f07cbe9f2dc30388473a1c3a56fde0b3b1a9ee05fe0b05dad98fc5203de43c02af477c73b1b3e3946d72cf1d5bb8c40b1ffb366ca9d5b8152585da
-
Filesize
175KB
MD5b45a53356146ab76fa86608fe3e20f81
SHA1a38e691388657692f3ba8503c34540a1fb802e11
SHA2569fbb55e49e1a0e42c98642ee57209b56cf3396229b295b4992727558faf4cb29
SHA512c1c781357decf926c405bd2c1ff2b46fa1100e6fd91ea0e328488972b321140fa53eef2eb8a38224a30a2c507b311a6268e5dc6e685b018dfb3b18820468d2f2
-
Filesize
175KB
MD5b45a53356146ab76fa86608fe3e20f81
SHA1a38e691388657692f3ba8503c34540a1fb802e11
SHA2569fbb55e49e1a0e42c98642ee57209b56cf3396229b295b4992727558faf4cb29
SHA512c1c781357decf926c405bd2c1ff2b46fa1100e6fd91ea0e328488972b321140fa53eef2eb8a38224a30a2c507b311a6268e5dc6e685b018dfb3b18820468d2f2
-
Filesize
136KB
MD538cbb224dac560bbb19878c92d353b3d
SHA15ef3d64bd3765c36353af9e56a6b9788dc58fb9e
SHA25651366ba2dba94c287a6f2e22654e714f4f8b2db9e7d7dc47464f2a628f8097b5
SHA51285178bc98d09b41d10634751d2b0e998fd1962b073a854ba1e558ed507082ddb16e849e494aba81ef5a1cd5825f90d08ccb6f07e09479767b84820c4945a3414
-
Filesize
136KB
MD538cbb224dac560bbb19878c92d353b3d
SHA15ef3d64bd3765c36353af9e56a6b9788dc58fb9e
SHA25651366ba2dba94c287a6f2e22654e714f4f8b2db9e7d7dc47464f2a628f8097b5
SHA51285178bc98d09b41d10634751d2b0e998fd1962b073a854ba1e558ed507082ddb16e849e494aba81ef5a1cd5825f90d08ccb6f07e09479767b84820c4945a3414
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
207KB
MD563a05809aa36deaa130a59f6f75c8af6
SHA178273832fca11c947475f9a90163c2bb3c1861d0
SHA2566cfb664fdd48bbafccb0625502b1dc044e09324ed8d32e0b603d21ecf94f2a62
SHA512b89582a357032f0244cad2349b73cea39dabb05ae3ebbc3d73d6322415397146521344826d2dd1d29354384b9c641a3bede37698322c0ed8135851d736e3c724
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5