Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 11:23
Static task
static1
General
-
Target
fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe
-
Size
479KB
-
MD5
e51e0d1a8d4b258cfeccdee612af3275
-
SHA1
3c1f36d9616a1b4c28dac1bb38e13339b5b4bb1d
-
SHA256
fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c
-
SHA512
7659a5108b167da04414f119f2ab87cdf2bcecc975a0b9dd6771012c54ef0bb3b5cd3e72e9b0a67044f488d6977f60f0f0fba4fa421e9bddd8458eb47790a31f
-
SSDEEP
12288:oMrgy9085XQxYe0aERsoaoSQeI9Nf31bdL0:4yHXtRsVhMXflbJ0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5573808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5573808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5573808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5573808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5573808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5573808.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m5367977.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 5108 y8334296.exe 1404 k5573808.exe 4344 l4842539.exe 4688 m5367977.exe 3332 oneetx.exe 2496 oneetx.exe 1876 oneetx.exe 1600 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4984 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5573808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5573808.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8334296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8334296.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1404 k5573808.exe 1404 k5573808.exe 4344 l4842539.exe 4344 l4842539.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1404 k5573808.exe Token: SeDebugPrivilege 4344 l4842539.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4688 m5367977.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3208 wrote to memory of 5108 3208 fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe 78 PID 3208 wrote to memory of 5108 3208 fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe 78 PID 3208 wrote to memory of 5108 3208 fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe 78 PID 5108 wrote to memory of 1404 5108 y8334296.exe 79 PID 5108 wrote to memory of 1404 5108 y8334296.exe 79 PID 5108 wrote to memory of 1404 5108 y8334296.exe 79 PID 5108 wrote to memory of 4344 5108 y8334296.exe 85 PID 5108 wrote to memory of 4344 5108 y8334296.exe 85 PID 5108 wrote to memory of 4344 5108 y8334296.exe 85 PID 3208 wrote to memory of 4688 3208 fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe 86 PID 3208 wrote to memory of 4688 3208 fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe 86 PID 3208 wrote to memory of 4688 3208 fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe 86 PID 4688 wrote to memory of 3332 4688 m5367977.exe 87 PID 4688 wrote to memory of 3332 4688 m5367977.exe 87 PID 4688 wrote to memory of 3332 4688 m5367977.exe 87 PID 3332 wrote to memory of 4596 3332 oneetx.exe 88 PID 3332 wrote to memory of 4596 3332 oneetx.exe 88 PID 3332 wrote to memory of 4596 3332 oneetx.exe 88 PID 3332 wrote to memory of 4496 3332 oneetx.exe 90 PID 3332 wrote to memory of 4496 3332 oneetx.exe 90 PID 3332 wrote to memory of 4496 3332 oneetx.exe 90 PID 4496 wrote to memory of 4180 4496 cmd.exe 92 PID 4496 wrote to memory of 4180 4496 cmd.exe 92 PID 4496 wrote to memory of 4180 4496 cmd.exe 92 PID 4496 wrote to memory of 4812 4496 cmd.exe 93 PID 4496 wrote to memory of 4812 4496 cmd.exe 93 PID 4496 wrote to memory of 4812 4496 cmd.exe 93 PID 4496 wrote to memory of 940 4496 cmd.exe 94 PID 4496 wrote to memory of 940 4496 cmd.exe 94 PID 4496 wrote to memory of 940 4496 cmd.exe 94 PID 4496 wrote to memory of 952 4496 cmd.exe 95 PID 4496 wrote to memory of 952 4496 cmd.exe 95 PID 4496 wrote to memory of 952 4496 cmd.exe 95 PID 4496 wrote to memory of 4084 4496 cmd.exe 96 PID 4496 wrote to memory of 4084 4496 cmd.exe 96 PID 4496 wrote to memory of 4084 4496 cmd.exe 96 PID 4496 wrote to memory of 1132 4496 cmd.exe 97 PID 4496 wrote to memory of 1132 4496 cmd.exe 97 PID 4496 wrote to memory of 1132 4496 cmd.exe 97 PID 3332 wrote to memory of 4984 3332 oneetx.exe 104 PID 3332 wrote to memory of 4984 3332 oneetx.exe 104 PID 3332 wrote to memory of 4984 3332 oneetx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe"C:\Users\Admin\AppData\Local\Temp\fd62321e67373361909abe3463e1e149c6a5f96392281402c5b975e9d7edb98c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8334296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8334296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5573808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5573808.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4842539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4842539.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5367977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5367977.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1132
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2496
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1876
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
307KB
MD5f56eb5b6ec306044fb04ead05bf25700
SHA163d9f898c905761d8d8d3abedfc4ea1260ef40d2
SHA256fffcd98ec5c276b29275f6070e6effd182558dbdc5da2edadc2fba8bf029c2d3
SHA5121fcc77795351efcfd2c9b016c83a8a8180dd9372b61ceacdf36e1bede0c830bd98cebedaccbb8ccb974047d9c05c2c37e3e15a6c6014a11114d340db70815504
-
Filesize
307KB
MD5f56eb5b6ec306044fb04ead05bf25700
SHA163d9f898c905761d8d8d3abedfc4ea1260ef40d2
SHA256fffcd98ec5c276b29275f6070e6effd182558dbdc5da2edadc2fba8bf029c2d3
SHA5121fcc77795351efcfd2c9b016c83a8a8180dd9372b61ceacdf36e1bede0c830bd98cebedaccbb8ccb974047d9c05c2c37e3e15a6c6014a11114d340db70815504
-
Filesize
175KB
MD5a3782691104b964355a3f0d7fb77d22e
SHA11ec80a059608eb86ef2026e172859d4b88a90e11
SHA2563c06973d63043e29d3cc218bfeb3093eb92cf7c280e970c7d9634fb87813f5e5
SHA51205bfe41e9c27dc4e6b9d0fdc5af899e8c4c2d9c8353915cf4ec28a0afb867200d7000c867faef3b7b1324b41e07f0b9db7b7cbc9c85ff3927c48044ef7ee9ca1
-
Filesize
175KB
MD5a3782691104b964355a3f0d7fb77d22e
SHA11ec80a059608eb86ef2026e172859d4b88a90e11
SHA2563c06973d63043e29d3cc218bfeb3093eb92cf7c280e970c7d9634fb87813f5e5
SHA51205bfe41e9c27dc4e6b9d0fdc5af899e8c4c2d9c8353915cf4ec28a0afb867200d7000c867faef3b7b1324b41e07f0b9db7b7cbc9c85ff3927c48044ef7ee9ca1
-
Filesize
136KB
MD50e44061114cfa9f072bdbbd647c140df
SHA1f28b4d311fe3dd798e5b04025ffcb90a3b9289aa
SHA2561720e50c85dff51a617bcb75fe1b8b9b5f8d474f292ef774519e28507c2587da
SHA5127643bab925b0020ac74fb83c17bd67153824d2e973e1d1ebe19ea8b21dea81637df5661ee1a56e65376fabcc5fb6484b48e23b171a4d908f1c450f0c19d7c526
-
Filesize
136KB
MD50e44061114cfa9f072bdbbd647c140df
SHA1f28b4d311fe3dd798e5b04025ffcb90a3b9289aa
SHA2561720e50c85dff51a617bcb75fe1b8b9b5f8d474f292ef774519e28507c2587da
SHA5127643bab925b0020ac74fb83c17bd67153824d2e973e1d1ebe19ea8b21dea81637df5661ee1a56e65376fabcc5fb6484b48e23b171a4d908f1c450f0c19d7c526
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
207KB
MD5a4430ddf81cc2dc98a1f520a39dbe535
SHA12041428d611a00376df60148c65ad0bee53c1d9d
SHA2568b01458fe146e039f0a9b5ee421aa9b8eb09f725c8a2054ac09f33e44d08da85
SHA512dde8cdb0ab0cf12ca3498e476ccd9e0f1cc947fc0c236375b78f7f91004cc3a096f002fa013d325b5cc9e8acb2c757b74265034a61b67c19feb3005e5b739e41
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5