Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
OneKey.exe
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
OneKey.exe
Resource
win10v2004-20230220-en
2 signatures
150 seconds
General
-
Target
OneKey.exe
-
Size
6.3MB
-
MD5
96d1d07d10a60d72715d9daaa07c5f47
-
SHA1
cf13a09949e88ab407ccd103b277f3a9f7ed082e
-
SHA256
ca13f808b1fd8a53164c3e7ecb0b8aae76070d1a9de98e53382baa3a6a771fe6
-
SHA512
68abad614ad86046d73b193e7ebcbc04ad134fc5db85e0bbecf5a55b0f619680ae8d3c0c9f405ab743966370965061ce9b13112c9df785b9c6fc80c5bef2ed78
-
SSDEEP
196608:X4Y1SGYPgZCQjccUA5XWywHGiLc9ixbsd:Xx6AIqmysBcIBsd
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: OneKey.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\BCDEdit.exe OneKey.exe