Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-05-2023 22:36
Static task
static1
Behavioral task
behavioral1
Sample
h0330357.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
h0330357.exe
Resource
win10v2004-20230220-en
General
-
Target
h0330357.exe
-
Size
214KB
-
MD5
763d9033f929ca596e31001277df2d33
-
SHA1
9f9d57edd776dab0a8c8239622dce21d3b32933f
-
SHA256
e796dd52099d55a25fc7f65bcf686999ccbfc0b34e3fcc7fba192ebe4c5f2c9c
-
SHA512
28fcb909c8c4e0299fcd243f847d23bd37a31bc9957755283ff559747c9c60284331d401740c6643e2d45474650a08109dba3596c98dcc5688168321730ed18e
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmh:5Cswq+AXYu7HGOSuZAlAILjq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1972 oneetx.exe 580 oneetx.exe -
Loads dropped DLL 5 IoCs
pid Process 2040 h0330357.exe 916 rundll32.exe 916 rundll32.exe 916 rundll32.exe 916 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 576 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 h0330357.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1972 2040 h0330357.exe 28 PID 2040 wrote to memory of 1972 2040 h0330357.exe 28 PID 2040 wrote to memory of 1972 2040 h0330357.exe 28 PID 2040 wrote to memory of 1972 2040 h0330357.exe 28 PID 1972 wrote to memory of 576 1972 oneetx.exe 29 PID 1972 wrote to memory of 576 1972 oneetx.exe 29 PID 1972 wrote to memory of 576 1972 oneetx.exe 29 PID 1972 wrote to memory of 576 1972 oneetx.exe 29 PID 1972 wrote to memory of 1344 1972 oneetx.exe 31 PID 1972 wrote to memory of 1344 1972 oneetx.exe 31 PID 1972 wrote to memory of 1344 1972 oneetx.exe 31 PID 1972 wrote to memory of 1344 1972 oneetx.exe 31 PID 1344 wrote to memory of 320 1344 cmd.exe 33 PID 1344 wrote to memory of 320 1344 cmd.exe 33 PID 1344 wrote to memory of 320 1344 cmd.exe 33 PID 1344 wrote to memory of 320 1344 cmd.exe 33 PID 1344 wrote to memory of 1296 1344 cmd.exe 34 PID 1344 wrote to memory of 1296 1344 cmd.exe 34 PID 1344 wrote to memory of 1296 1344 cmd.exe 34 PID 1344 wrote to memory of 1296 1344 cmd.exe 34 PID 1344 wrote to memory of 1700 1344 cmd.exe 35 PID 1344 wrote to memory of 1700 1344 cmd.exe 35 PID 1344 wrote to memory of 1700 1344 cmd.exe 35 PID 1344 wrote to memory of 1700 1344 cmd.exe 35 PID 1344 wrote to memory of 1768 1344 cmd.exe 36 PID 1344 wrote to memory of 1768 1344 cmd.exe 36 PID 1344 wrote to memory of 1768 1344 cmd.exe 36 PID 1344 wrote to memory of 1768 1344 cmd.exe 36 PID 1344 wrote to memory of 1680 1344 cmd.exe 37 PID 1344 wrote to memory of 1680 1344 cmd.exe 37 PID 1344 wrote to memory of 1680 1344 cmd.exe 37 PID 1344 wrote to memory of 1680 1344 cmd.exe 37 PID 1344 wrote to memory of 540 1344 cmd.exe 38 PID 1344 wrote to memory of 540 1344 cmd.exe 38 PID 1344 wrote to memory of 540 1344 cmd.exe 38 PID 1344 wrote to memory of 540 1344 cmd.exe 38 PID 1552 wrote to memory of 580 1552 taskeng.exe 42 PID 1552 wrote to memory of 580 1552 taskeng.exe 42 PID 1552 wrote to memory of 580 1552 taskeng.exe 42 PID 1552 wrote to memory of 580 1552 taskeng.exe 42 PID 1972 wrote to memory of 916 1972 oneetx.exe 43 PID 1972 wrote to memory of 916 1972 oneetx.exe 43 PID 1972 wrote to memory of 916 1972 oneetx.exe 43 PID 1972 wrote to memory of 916 1972 oneetx.exe 43 PID 1972 wrote to memory of 916 1972 oneetx.exe 43 PID 1972 wrote to memory of 916 1972 oneetx.exe 43 PID 1972 wrote to memory of 916 1972 oneetx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\h0330357.exe"C:\Users\Admin\AppData\Local\Temp\h0330357.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:1296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵PID:1680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵PID:540
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:916
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7A3D2101-F8A9-4AC7-B357-B58D95EB59DB} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5763d9033f929ca596e31001277df2d33
SHA19f9d57edd776dab0a8c8239622dce21d3b32933f
SHA256e796dd52099d55a25fc7f65bcf686999ccbfc0b34e3fcc7fba192ebe4c5f2c9c
SHA51228fcb909c8c4e0299fcd243f847d23bd37a31bc9957755283ff559747c9c60284331d401740c6643e2d45474650a08109dba3596c98dcc5688168321730ed18e
-
Filesize
214KB
MD5763d9033f929ca596e31001277df2d33
SHA19f9d57edd776dab0a8c8239622dce21d3b32933f
SHA256e796dd52099d55a25fc7f65bcf686999ccbfc0b34e3fcc7fba192ebe4c5f2c9c
SHA51228fcb909c8c4e0299fcd243f847d23bd37a31bc9957755283ff559747c9c60284331d401740c6643e2d45474650a08109dba3596c98dcc5688168321730ed18e
-
Filesize
214KB
MD5763d9033f929ca596e31001277df2d33
SHA19f9d57edd776dab0a8c8239622dce21d3b32933f
SHA256e796dd52099d55a25fc7f65bcf686999ccbfc0b34e3fcc7fba192ebe4c5f2c9c
SHA51228fcb909c8c4e0299fcd243f847d23bd37a31bc9957755283ff559747c9c60284331d401740c6643e2d45474650a08109dba3596c98dcc5688168321730ed18e
-
Filesize
214KB
MD5763d9033f929ca596e31001277df2d33
SHA19f9d57edd776dab0a8c8239622dce21d3b32933f
SHA256e796dd52099d55a25fc7f65bcf686999ccbfc0b34e3fcc7fba192ebe4c5f2c9c
SHA51228fcb909c8c4e0299fcd243f847d23bd37a31bc9957755283ff559747c9c60284331d401740c6643e2d45474650a08109dba3596c98dcc5688168321730ed18e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
214KB
MD5763d9033f929ca596e31001277df2d33
SHA19f9d57edd776dab0a8c8239622dce21d3b32933f
SHA256e796dd52099d55a25fc7f65bcf686999ccbfc0b34e3fcc7fba192ebe4c5f2c9c
SHA51228fcb909c8c4e0299fcd243f847d23bd37a31bc9957755283ff559747c9c60284331d401740c6643e2d45474650a08109dba3596c98dcc5688168321730ed18e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53