Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 10:09

General

  • Target

    0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe

  • Size

    480KB

  • MD5

    97cb9e7b490fed1ed8cb389347657e35

  • SHA1

    0b6094e3f0af68aeab17fa1dba83bf70c8d6c74f

  • SHA256

    0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5

  • SHA512

    45568988f9045887c62bd70c2977f60dca6baf207423a39820f3eb030b4e9cad91f1ac8b629a4fda0a75bc686fb23cf8fa99ac3d6087b40d0521e1a42d33981b

  • SSDEEP

    12288:OMr2y90q+KajZVpTieolYSs6jPj5nsGD1cwynemEWC9:EyzCjrMlbsKj5P1wEX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe
    "C:\Users\Admin\AppData\Local\Temp\0eef8460c835630dbe60a7db0247a591a1d463233c76adc2351abd2b09296fb5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0284992.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0284992.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6465954.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6465954.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1987411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1987411.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4571761.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4571761.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3688
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2656
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4920
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3168
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3708
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4424
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4152
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:4160
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3440
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4184
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:1520
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4356

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4571761.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4571761.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0284992.exe

                Filesize

                307KB

                MD5

                c39a432fd13d27a0c4b7a87e8eda7362

                SHA1

                308ffe09bd87365158a27930aa69a4e0ad4d05f7

                SHA256

                a4ec56182778f0908023ec614c9d0a043dd75fdbc31e81438160fa73b66a4927

                SHA512

                bc3769f5fe4cbf3ac4a103b6c31b1b9a83963d6f0229c58623e52b444d0e024ead1899ef28342a2a3a06d04748134ecf7024174dab4710afc20db623b7d408c8

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0284992.exe

                Filesize

                307KB

                MD5

                c39a432fd13d27a0c4b7a87e8eda7362

                SHA1

                308ffe09bd87365158a27930aa69a4e0ad4d05f7

                SHA256

                a4ec56182778f0908023ec614c9d0a043dd75fdbc31e81438160fa73b66a4927

                SHA512

                bc3769f5fe4cbf3ac4a103b6c31b1b9a83963d6f0229c58623e52b444d0e024ead1899ef28342a2a3a06d04748134ecf7024174dab4710afc20db623b7d408c8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6465954.exe

                Filesize

                136KB

                MD5

                5bd8f4b45b2f863b3cf01f77063860f4

                SHA1

                36aaa4669e0590f7b01be2735c6eef357f1d8e6b

                SHA256

                4a920107085b8b4819fb7bba5ea9d4723b95fead84fbc76e95d36359881c54a6

                SHA512

                a0d95ee61caae972359e75f8b14697ba431dea7e92cbf023586027ca7a714b0d56b1e21307fd8cd0550996d639959f6e76dd8f38f8009bf262855026dca360cd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6465954.exe

                Filesize

                136KB

                MD5

                5bd8f4b45b2f863b3cf01f77063860f4

                SHA1

                36aaa4669e0590f7b01be2735c6eef357f1d8e6b

                SHA256

                4a920107085b8b4819fb7bba5ea9d4723b95fead84fbc76e95d36359881c54a6

                SHA512

                a0d95ee61caae972359e75f8b14697ba431dea7e92cbf023586027ca7a714b0d56b1e21307fd8cd0550996d639959f6e76dd8f38f8009bf262855026dca360cd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1987411.exe

                Filesize

                175KB

                MD5

                adb8913bfe1d4a7f3b82ebba4d00274b

                SHA1

                c6133e9345d816914e8cb268f63215ba21715441

                SHA256

                c75781ce56449c99555c308525c87ebf6526362715e6d2dea55dce7c6a5e3018

                SHA512

                fd49d7b7210c5ba99e98df9dcd423b6c5f88adff87d573a98ba2c5a1649eae800c8870421f5cf370cddc8d7bdd4e0fd6a1471006e72eacf78344d14794f4a1dc

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1987411.exe

                Filesize

                175KB

                MD5

                adb8913bfe1d4a7f3b82ebba4d00274b

                SHA1

                c6133e9345d816914e8cb268f63215ba21715441

                SHA256

                c75781ce56449c99555c308525c87ebf6526362715e6d2dea55dce7c6a5e3018

                SHA512

                fd49d7b7210c5ba99e98df9dcd423b6c5f88adff87d573a98ba2c5a1649eae800c8870421f5cf370cddc8d7bdd4e0fd6a1471006e72eacf78344d14794f4a1dc

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                62d26d8146376c0e1c4406177568befd

                SHA1

                69d2ed90f08af2002ab26d116728253625401ee0

                SHA256

                7dd94595adbf6a81fee419f4897d01abb3dc44d75fdd270d280bd3efe81bda8a

                SHA512

                43a55214e5ecae508e53084cd904da36b739b892644cef2b2c48ce56cde3bb7ee5594f7ce1c0d5a3309c9034215a6294b7b18c6fe2c4fb93b868136dfda7c966

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1444-194-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/1444-188-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-195-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/1444-165-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-166-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-168-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-170-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-172-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-174-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-176-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-178-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-180-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-182-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-184-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-186-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-193-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/1444-190-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/1444-192-0x0000000002600000-0x0000000002612000-memory.dmp

                Filesize

                72KB

              • memory/2248-154-0x00000000086C0000-0x0000000008C64000-memory.dmp

                Filesize

                5.6MB

              • memory/2248-148-0x00000000078F0000-0x0000000007F08000-memory.dmp

                Filesize

                6.1MB

              • memory/2248-159-0x0000000008530000-0x000000000854E000-memory.dmp

                Filesize

                120KB

              • memory/2248-157-0x0000000008C70000-0x0000000008E32000-memory.dmp

                Filesize

                1.8MB

              • memory/2248-156-0x0000000008470000-0x00000000084E6000-memory.dmp

                Filesize

                472KB

              • memory/2248-155-0x00000000082F0000-0x0000000008382000-memory.dmp

                Filesize

                584KB

              • memory/2248-152-0x00000000073C0000-0x00000000073D0000-memory.dmp

                Filesize

                64KB

              • memory/2248-160-0x0000000004980000-0x00000000049D0000-memory.dmp

                Filesize

                320KB

              • memory/2248-158-0x0000000009370000-0x000000000989C000-memory.dmp

                Filesize

                5.2MB

              • memory/2248-151-0x00000000073D0000-0x000000000740C000-memory.dmp

                Filesize

                240KB

              • memory/2248-150-0x0000000007480000-0x000000000758A000-memory.dmp

                Filesize

                1.0MB

              • memory/2248-149-0x0000000007350000-0x0000000007362000-memory.dmp

                Filesize

                72KB

              • memory/2248-153-0x0000000007710000-0x0000000007776000-memory.dmp

                Filesize

                408KB

              • memory/2248-147-0x0000000000640000-0x0000000000668000-memory.dmp

                Filesize

                160KB