Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 10:09
Static task
static1
General
-
Target
0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe
-
Size
480KB
-
MD5
97cb9e7b490fed1ed8cb389347657e35
-
SHA1
0b6094e3f0af68aeab17fa1dba83bf70c8d6c74f
-
SHA256
0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5
-
SHA512
45568988f9045887c62bd70c2977f60dca6baf207423a39820f3eb030b4e9cad91f1ac8b629a4fda0a75bc686fb23cf8fa99ac3d6087b40d0521e1a42d33981b
-
SSDEEP
12288:OMr2y90q+KajZVpTieolYSs6jPj5nsGD1cwynemEWC9:EyzCjrMlbsKj5P1wEX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1987411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1987411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1987411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1987411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1987411.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1987411.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i4571761.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3344 x0284992.exe 2248 g6465954.exe 1444 h1987411.exe 4124 i4571761.exe 3688 oneetx.exe 1520 oneetx.exe 4356 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4184 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1987411.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1987411.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0284992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0284992.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2248 g6465954.exe 2248 g6465954.exe 1444 h1987411.exe 1444 h1987411.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2248 g6465954.exe Token: SeDebugPrivilege 1444 h1987411.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4124 i4571761.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3344 2604 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe 84 PID 2604 wrote to memory of 3344 2604 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe 84 PID 2604 wrote to memory of 3344 2604 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe 84 PID 3344 wrote to memory of 2248 3344 x0284992.exe 85 PID 3344 wrote to memory of 2248 3344 x0284992.exe 85 PID 3344 wrote to memory of 2248 3344 x0284992.exe 85 PID 3344 wrote to memory of 1444 3344 x0284992.exe 89 PID 3344 wrote to memory of 1444 3344 x0284992.exe 89 PID 3344 wrote to memory of 1444 3344 x0284992.exe 89 PID 2604 wrote to memory of 4124 2604 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe 93 PID 2604 wrote to memory of 4124 2604 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe 93 PID 2604 wrote to memory of 4124 2604 0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe 93 PID 4124 wrote to memory of 3688 4124 i4571761.exe 94 PID 4124 wrote to memory of 3688 4124 i4571761.exe 94 PID 4124 wrote to memory of 3688 4124 i4571761.exe 94 PID 3688 wrote to memory of 2656 3688 oneetx.exe 95 PID 3688 wrote to memory of 2656 3688 oneetx.exe 95 PID 3688 wrote to memory of 2656 3688 oneetx.exe 95 PID 3688 wrote to memory of 4920 3688 oneetx.exe 97 PID 3688 wrote to memory of 4920 3688 oneetx.exe 97 PID 3688 wrote to memory of 4920 3688 oneetx.exe 97 PID 4920 wrote to memory of 3168 4920 cmd.exe 99 PID 4920 wrote to memory of 3168 4920 cmd.exe 99 PID 4920 wrote to memory of 3168 4920 cmd.exe 99 PID 4920 wrote to memory of 3708 4920 cmd.exe 100 PID 4920 wrote to memory of 3708 4920 cmd.exe 100 PID 4920 wrote to memory of 3708 4920 cmd.exe 100 PID 4920 wrote to memory of 4424 4920 cmd.exe 101 PID 4920 wrote to memory of 4424 4920 cmd.exe 101 PID 4920 wrote to memory of 4424 4920 cmd.exe 101 PID 4920 wrote to memory of 4152 4920 cmd.exe 102 PID 4920 wrote to memory of 4152 4920 cmd.exe 102 PID 4920 wrote to memory of 4152 4920 cmd.exe 102 PID 4920 wrote to memory of 4160 4920 cmd.exe 103 PID 4920 wrote to memory of 4160 4920 cmd.exe 103 PID 4920 wrote to memory of 4160 4920 cmd.exe 103 PID 4920 wrote to memory of 3440 4920 cmd.exe 104 PID 4920 wrote to memory of 3440 4920 cmd.exe 104 PID 4920 wrote to memory of 3440 4920 cmd.exe 104 PID 3688 wrote to memory of 4184 3688 oneetx.exe 107 PID 3688 wrote to memory of 4184 3688 oneetx.exe 107 PID 3688 wrote to memory of 4184 3688 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe"C:\Users\Admin\AppData\Local\Temp\0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0284992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0284992.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6465954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6465954.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1987411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1987411.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4571761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4571761.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3440
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1520
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
307KB
MD5c39a432fd13d27a0c4b7a87e8eda7362
SHA1308ffe09bd87365158a27930aa69a4e0ad4d05f7
SHA256a4ec56182778f0908023ec614c9d0a043dd75fdbc31e81438160fa73b66a4927
SHA512bc3769f5fe4cbf3ac4a103b6c31b1b9a83963d6f0229c58623e52b444d0e024ead1899ef28342a2a3a06d04748134ecf7024174dab4710afc20db623b7d408c8
-
Filesize
307KB
MD5c39a432fd13d27a0c4b7a87e8eda7362
SHA1308ffe09bd87365158a27930aa69a4e0ad4d05f7
SHA256a4ec56182778f0908023ec614c9d0a043dd75fdbc31e81438160fa73b66a4927
SHA512bc3769f5fe4cbf3ac4a103b6c31b1b9a83963d6f0229c58623e52b444d0e024ead1899ef28342a2a3a06d04748134ecf7024174dab4710afc20db623b7d408c8
-
Filesize
136KB
MD55bd8f4b45b2f863b3cf01f77063860f4
SHA136aaa4669e0590f7b01be2735c6eef357f1d8e6b
SHA2564a920107085b8b4819fb7bba5ea9d4723b95fead84fbc76e95d36359881c54a6
SHA512a0d95ee61caae972359e75f8b14697ba431dea7e92cbf023586027ca7a714b0d56b1e21307fd8cd0550996d639959f6e76dd8f38f8009bf262855026dca360cd
-
Filesize
136KB
MD55bd8f4b45b2f863b3cf01f77063860f4
SHA136aaa4669e0590f7b01be2735c6eef357f1d8e6b
SHA2564a920107085b8b4819fb7bba5ea9d4723b95fead84fbc76e95d36359881c54a6
SHA512a0d95ee61caae972359e75f8b14697ba431dea7e92cbf023586027ca7a714b0d56b1e21307fd8cd0550996d639959f6e76dd8f38f8009bf262855026dca360cd
-
Filesize
175KB
MD5adb8913bfe1d4a7f3b82ebba4d00274b
SHA1c6133e9345d816914e8cb268f63215ba21715441
SHA256c75781ce56449c99555c308525c87ebf6526362715e6d2dea55dce7c6a5e3018
SHA512fd49d7b7210c5ba99e98df9dcd423b6c5f88adff87d573a98ba2c5a1649eae800c8870421f5cf370cddc8d7bdd4e0fd6a1471006e72eacf78344d14794f4a1dc
-
Filesize
175KB
MD5adb8913bfe1d4a7f3b82ebba4d00274b
SHA1c6133e9345d816914e8cb268f63215ba21715441
SHA256c75781ce56449c99555c308525c87ebf6526362715e6d2dea55dce7c6a5e3018
SHA512fd49d7b7210c5ba99e98df9dcd423b6c5f88adff87d573a98ba2c5a1649eae800c8870421f5cf370cddc8d7bdd4e0fd6a1471006e72eacf78344d14794f4a1dc
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
207KB
MD562d26d8146376c0e1c4406177568befd
SHA169d2ed90f08af2002ab26d116728253625401ee0
SHA2567dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a
SHA51243a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5