Analysis
-
max time kernel
108s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 09:06
Static task
static1
General
-
Target
6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe
-
Size
479KB
-
MD5
bb340bcd4785c4e523915a7bd0f2f585
-
SHA1
28a792125aa03bc58076b9162860c56634ba851e
-
SHA256
6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0
-
SHA512
7d907bf51ff622c4659546380a424f3e78bbda20263905a8dd1b5e256b7b9803becf3ecc8afa76713ae9267a2ffd93f74b49c985b6ad1e568a650cd29069cf06
-
SSDEEP
12288:qMrxy90PZir9g31j5c1u31pT2tQbxychB:vyYW9c1tXLTVMiB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6536580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6536580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6536580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6536580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6536580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6536580.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m8474593.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 832 y8903877.exe 4712 k6536580.exe 4164 l9933834.exe 1156 m8474593.exe 4044 oneetx.exe 1664 oneetx.exe 4220 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1168 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6536580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6536580.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8903877.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8903877.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4712 k6536580.exe 4712 k6536580.exe 4164 l9933834.exe 4164 l9933834.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4712 k6536580.exe Token: SeDebugPrivilege 4164 l9933834.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1156 m8474593.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5076 wrote to memory of 832 5076 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe 82 PID 5076 wrote to memory of 832 5076 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe 82 PID 5076 wrote to memory of 832 5076 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe 82 PID 832 wrote to memory of 4712 832 y8903877.exe 83 PID 832 wrote to memory of 4712 832 y8903877.exe 83 PID 832 wrote to memory of 4712 832 y8903877.exe 83 PID 832 wrote to memory of 4164 832 y8903877.exe 86 PID 832 wrote to memory of 4164 832 y8903877.exe 86 PID 832 wrote to memory of 4164 832 y8903877.exe 86 PID 5076 wrote to memory of 1156 5076 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe 87 PID 5076 wrote to memory of 1156 5076 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe 87 PID 5076 wrote to memory of 1156 5076 6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe 87 PID 1156 wrote to memory of 4044 1156 m8474593.exe 88 PID 1156 wrote to memory of 4044 1156 m8474593.exe 88 PID 1156 wrote to memory of 4044 1156 m8474593.exe 88 PID 4044 wrote to memory of 4836 4044 oneetx.exe 89 PID 4044 wrote to memory of 4836 4044 oneetx.exe 89 PID 4044 wrote to memory of 4836 4044 oneetx.exe 89 PID 4044 wrote to memory of 4040 4044 oneetx.exe 91 PID 4044 wrote to memory of 4040 4044 oneetx.exe 91 PID 4044 wrote to memory of 4040 4044 oneetx.exe 91 PID 4040 wrote to memory of 3044 4040 cmd.exe 93 PID 4040 wrote to memory of 3044 4040 cmd.exe 93 PID 4040 wrote to memory of 3044 4040 cmd.exe 93 PID 4040 wrote to memory of 2408 4040 cmd.exe 94 PID 4040 wrote to memory of 2408 4040 cmd.exe 94 PID 4040 wrote to memory of 2408 4040 cmd.exe 94 PID 4040 wrote to memory of 4464 4040 cmd.exe 95 PID 4040 wrote to memory of 4464 4040 cmd.exe 95 PID 4040 wrote to memory of 4464 4040 cmd.exe 95 PID 4040 wrote to memory of 1604 4040 cmd.exe 96 PID 4040 wrote to memory of 1604 4040 cmd.exe 96 PID 4040 wrote to memory of 1604 4040 cmd.exe 96 PID 4040 wrote to memory of 1452 4040 cmd.exe 97 PID 4040 wrote to memory of 1452 4040 cmd.exe 97 PID 4040 wrote to memory of 1452 4040 cmd.exe 97 PID 4040 wrote to memory of 4400 4040 cmd.exe 98 PID 4040 wrote to memory of 4400 4040 cmd.exe 98 PID 4040 wrote to memory of 4400 4040 cmd.exe 98 PID 4044 wrote to memory of 1168 4044 oneetx.exe 100 PID 4044 wrote to memory of 1168 4044 oneetx.exe 100 PID 4044 wrote to memory of 1168 4044 oneetx.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe"C:\Users\Admin\AppData\Local\Temp\6dc5e250c6e6b2c089a4b4ad70859886189e12ca9533458abc52c5f1894dbca0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8903877.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8903877.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6536580.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6536580.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9933834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9933834.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8474593.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8474593.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4400
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1664
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
307KB
MD596b920ee45609469b14fe959a0e72a81
SHA192777923d7289589a4652a452cbc035a6925c438
SHA256a258d988a0ffa35f1e715e6fbaa995b1501ddcaf087899ed53f1c86efb0a4e09
SHA5124f19fd5e47ae135fec6b6d6517726ab52fe7fdb57306bd445980d39fae641048452b4a98f205f8036f3624eea2d53e3a1284c596719ac555cd610e48dbef4568
-
Filesize
307KB
MD596b920ee45609469b14fe959a0e72a81
SHA192777923d7289589a4652a452cbc035a6925c438
SHA256a258d988a0ffa35f1e715e6fbaa995b1501ddcaf087899ed53f1c86efb0a4e09
SHA5124f19fd5e47ae135fec6b6d6517726ab52fe7fdb57306bd445980d39fae641048452b4a98f205f8036f3624eea2d53e3a1284c596719ac555cd610e48dbef4568
-
Filesize
175KB
MD5b3a60397cc8f19338ae4de7cfeee1dea
SHA136d24f4d0bd7a058a1d3f40db14bc049b3ac3bac
SHA25618d889308f955097c9dc9846ca8a527c447ffc7ae18763bc57e650b0ec5027b6
SHA512023dc6ba042e6e7053be9860d23fc91b4192e6cc83e27c2a07aaac11adf2425201beb87daf36a2465ce76a1c661a4a414c3030115b2dd04426e3dedad8a83358
-
Filesize
175KB
MD5b3a60397cc8f19338ae4de7cfeee1dea
SHA136d24f4d0bd7a058a1d3f40db14bc049b3ac3bac
SHA25618d889308f955097c9dc9846ca8a527c447ffc7ae18763bc57e650b0ec5027b6
SHA512023dc6ba042e6e7053be9860d23fc91b4192e6cc83e27c2a07aaac11adf2425201beb87daf36a2465ce76a1c661a4a414c3030115b2dd04426e3dedad8a83358
-
Filesize
137KB
MD5fbe99881850f85fc5dbdd6dab9caf707
SHA1e0289004b2e16f016110f8d13f053c29073a6307
SHA2564ceaf096760f9bdfd4589d09c5421cbce352f744fbf5cb5aef889d41fe8828be
SHA512dd875d4cf701d365a4b0b151a7b66acb4ef9cff4a44fdeb00816753a7e4bc2ae45d01e6471865d8f8b72814d2bfbcfc390f167d524744463e72c68a522221c92
-
Filesize
137KB
MD5fbe99881850f85fc5dbdd6dab9caf707
SHA1e0289004b2e16f016110f8d13f053c29073a6307
SHA2564ceaf096760f9bdfd4589d09c5421cbce352f744fbf5cb5aef889d41fe8828be
SHA512dd875d4cf701d365a4b0b151a7b66acb4ef9cff4a44fdeb00816753a7e4bc2ae45d01e6471865d8f8b72814d2bfbcfc390f167d524744463e72c68a522221c92
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
207KB
MD570b64b726606bae1158c836d27580cde
SHA142246bf3823a059442200917881991262a7b183b
SHA25627cbe2bc8b998347056c5e273e90c4383c8bd48fef94e7a90d0c54f9c02f8d11
SHA51245f03484402e44cdbecaae5de9d729ae745cdf5cd51536d247c3b49fc1e66f65b6b5a04152b8a1c27b1636d0523684ff664c0a52d8e73e8973d3e4bfece34ecb
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5