Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
oneetx.exe
Resource
win7-20230220-en
General
-
Target
oneetx.exe
-
Size
211KB
-
MD5
13c6b003e4cd8319299a50a51e14a222
-
SHA1
00f9e5a0204defd1a569bfbdf0c690b351349dde
-
SHA256
28f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
-
SHA512
ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
SSDEEP
6144:tWh1VL9EWeJanEYL7OuuT7Ujz41FiPRL:tg1VdSYL3uT7e0KF
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 884 oneetx.exe 836 oneetx.exe 572 oneetx.exe -
Loads dropped DLL 15 IoCs
pid Process 1736 oneetx.exe 1276 rundll32.exe 824 rundll32.exe 824 rundll32.exe 824 rundll32.exe 824 rundll32.exe 776 rundll32.exe 776 rundll32.exe 776 rundll32.exe 776 rundll32.exe 1276 rundll32.exe 1276 rundll32.exe 1276 rundll32.exe 1916 WerFault.exe 1916 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1916 776 WerFault.exe 43 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1480 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 oneetx.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1736 wrote to memory of 884 1736 oneetx.exe 28 PID 1736 wrote to memory of 884 1736 oneetx.exe 28 PID 1736 wrote to memory of 884 1736 oneetx.exe 28 PID 1736 wrote to memory of 884 1736 oneetx.exe 28 PID 884 wrote to memory of 1480 884 oneetx.exe 29 PID 884 wrote to memory of 1480 884 oneetx.exe 29 PID 884 wrote to memory of 1480 884 oneetx.exe 29 PID 884 wrote to memory of 1480 884 oneetx.exe 29 PID 884 wrote to memory of 668 884 oneetx.exe 31 PID 884 wrote to memory of 668 884 oneetx.exe 31 PID 884 wrote to memory of 668 884 oneetx.exe 31 PID 884 wrote to memory of 668 884 oneetx.exe 31 PID 668 wrote to memory of 1700 668 cmd.exe 33 PID 668 wrote to memory of 1700 668 cmd.exe 33 PID 668 wrote to memory of 1700 668 cmd.exe 33 PID 668 wrote to memory of 1700 668 cmd.exe 33 PID 668 wrote to memory of 1440 668 cmd.exe 34 PID 668 wrote to memory of 1440 668 cmd.exe 34 PID 668 wrote to memory of 1440 668 cmd.exe 34 PID 668 wrote to memory of 1440 668 cmd.exe 34 PID 668 wrote to memory of 1132 668 cmd.exe 35 PID 668 wrote to memory of 1132 668 cmd.exe 35 PID 668 wrote to memory of 1132 668 cmd.exe 35 PID 668 wrote to memory of 1132 668 cmd.exe 35 PID 668 wrote to memory of 556 668 cmd.exe 36 PID 668 wrote to memory of 556 668 cmd.exe 36 PID 668 wrote to memory of 556 668 cmd.exe 36 PID 668 wrote to memory of 556 668 cmd.exe 36 PID 668 wrote to memory of 1616 668 cmd.exe 37 PID 668 wrote to memory of 1616 668 cmd.exe 37 PID 668 wrote to memory of 1616 668 cmd.exe 37 PID 668 wrote to memory of 1616 668 cmd.exe 37 PID 668 wrote to memory of 384 668 cmd.exe 38 PID 668 wrote to memory of 384 668 cmd.exe 38 PID 668 wrote to memory of 384 668 cmd.exe 38 PID 668 wrote to memory of 384 668 cmd.exe 38 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 824 884 oneetx.exe 41 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 884 wrote to memory of 1276 884 oneetx.exe 42 PID 824 wrote to memory of 776 824 rundll32.exe 43 PID 824 wrote to memory of 776 824 rundll32.exe 43 PID 824 wrote to memory of 776 824 rundll32.exe 43 PID 824 wrote to memory of 776 824 rundll32.exe 43 PID 1168 wrote to memory of 836 1168 taskeng.exe 46 PID 1168 wrote to memory of 836 1168 taskeng.exe 46 PID 1168 wrote to memory of 836 1168 taskeng.exe 46 PID 1168 wrote to memory of 836 1168 taskeng.exe 46 PID 1168 wrote to memory of 572 1168 taskeng.exe 47 PID 1168 wrote to memory of 572 1168 taskeng.exe 47 PID 1168 wrote to memory of 572 1168 taskeng.exe 47 PID 1168 wrote to memory of 572 1168 taskeng.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\oneetx.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\6fd2e6071d" /P "Admin:N"&&CACLS "..\6fd2e6071d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1700
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:1440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\6fd2e6071d" /P "Admin:N"4⤵PID:1616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\6fd2e6071d" /P "Admin:R" /E4⤵PID:384
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\27d75989acd3e0\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\27d75989acd3e0\cred64.dll, Main4⤵
- Loads dropped DLL
PID:776 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 776 -s 3205⤵
- Loads dropped DLL
- Program crash
PID:1916
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\27d75989acd3e0\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1276
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BFF52AB9-C5E3-4FAC-A877-D755F3E57449} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exe2⤵
- Executes dropped EXE
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\6fd2e6071d\oneetx.exe2⤵
- Executes dropped EXE
PID:572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5b68363e222b6a2dc469d0eabb8736b87
SHA129d92d30dc0e0af1641d231ee59e84aec227a0d7
SHA2566ee632788bb6931a1595978b9ab4fa54daf95fd244e98c2d9b7239bcdd3addb9
SHA51287f703c5f0a0e2e1e40c07e73e1ef5eb996c9bc25e0a727c87d58ee973ab69a87a18fada827c68d07ae290b97bf29003d2b767eb513c28e04163b5342f450f75
-
Filesize
211KB
MD513c6b003e4cd8319299a50a51e14a222
SHA100f9e5a0204defd1a569bfbdf0c690b351349dde
SHA25628f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
SHA512ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
Filesize
211KB
MD513c6b003e4cd8319299a50a51e14a222
SHA100f9e5a0204defd1a569bfbdf0c690b351349dde
SHA25628f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
SHA512ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
Filesize
211KB
MD513c6b003e4cd8319299a50a51e14a222
SHA100f9e5a0204defd1a569bfbdf0c690b351349dde
SHA25628f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
SHA512ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
Filesize
211KB
MD513c6b003e4cd8319299a50a51e14a222
SHA100f9e5a0204defd1a569bfbdf0c690b351349dde
SHA25628f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
SHA512ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
Filesize
211KB
MD513c6b003e4cd8319299a50a51e14a222
SHA100f9e5a0204defd1a569bfbdf0c690b351349dde
SHA25628f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
SHA512ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
Filesize
89KB
MD5fb32ce419c5bea931a9e3c4ad70dec00
SHA1e1ca25f572063dba1d25e58929ddce168338998f
SHA2566e77875e1ef76b39cfc68d919b4919da77d320bf208d826b643bd7ba48a5b38c
SHA51287bee77b1b13c35a37e02bb26019956db12a77f6ceab3694f03dce5bd9d105de5711f6fb2371d0d4ae888932fd50e639634b217084316c5ea159e8aef7cae703
-
Filesize
89KB
MD5fb32ce419c5bea931a9e3c4ad70dec00
SHA1e1ca25f572063dba1d25e58929ddce168338998f
SHA2566e77875e1ef76b39cfc68d919b4919da77d320bf208d826b643bd7ba48a5b38c
SHA51287bee77b1b13c35a37e02bb26019956db12a77f6ceab3694f03dce5bd9d105de5711f6fb2371d0d4ae888932fd50e639634b217084316c5ea159e8aef7cae703
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
211KB
MD513c6b003e4cd8319299a50a51e14a222
SHA100f9e5a0204defd1a569bfbdf0c690b351349dde
SHA25628f5e5e43a67a48c6a41f9814a50b6faf5d20dfee6b17e867429efca82394681
SHA512ff5ae3c0cb40d17bd4aca3ad994ce251001aebcf3ba8a8a83ee7b4cc11f35ccd20523dc00888f150c89147a852a125b29a982dc06c1b6a152efd6b3cac12cb52
-
Filesize
89KB
MD5fb32ce419c5bea931a9e3c4ad70dec00
SHA1e1ca25f572063dba1d25e58929ddce168338998f
SHA2566e77875e1ef76b39cfc68d919b4919da77d320bf208d826b643bd7ba48a5b38c
SHA51287bee77b1b13c35a37e02bb26019956db12a77f6ceab3694f03dce5bd9d105de5711f6fb2371d0d4ae888932fd50e639634b217084316c5ea159e8aef7cae703
-
Filesize
89KB
MD5fb32ce419c5bea931a9e3c4ad70dec00
SHA1e1ca25f572063dba1d25e58929ddce168338998f
SHA2566e77875e1ef76b39cfc68d919b4919da77d320bf208d826b643bd7ba48a5b38c
SHA51287bee77b1b13c35a37e02bb26019956db12a77f6ceab3694f03dce5bd9d105de5711f6fb2371d0d4ae888932fd50e639634b217084316c5ea159e8aef7cae703
-
Filesize
89KB
MD5fb32ce419c5bea931a9e3c4ad70dec00
SHA1e1ca25f572063dba1d25e58929ddce168338998f
SHA2566e77875e1ef76b39cfc68d919b4919da77d320bf208d826b643bd7ba48a5b38c
SHA51287bee77b1b13c35a37e02bb26019956db12a77f6ceab3694f03dce5bd9d105de5711f6fb2371d0d4ae888932fd50e639634b217084316c5ea159e8aef7cae703
-
Filesize
89KB
MD5fb32ce419c5bea931a9e3c4ad70dec00
SHA1e1ca25f572063dba1d25e58929ddce168338998f
SHA2566e77875e1ef76b39cfc68d919b4919da77d320bf208d826b643bd7ba48a5b38c
SHA51287bee77b1b13c35a37e02bb26019956db12a77f6ceab3694f03dce5bd9d105de5711f6fb2371d0d4ae888932fd50e639634b217084316c5ea159e8aef7cae703
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924
-
Filesize
1.0MB
MD5a995fde990914d0ae4278af25213cac0
SHA1e610383a2c2ebd1de209539c1f6ec7e35436329f
SHA256af4ddfd4d441c924a034ef6bf800b07ac0bcfdf42616ef64178f2487c1d917e8
SHA5121362df3adeeac45c1e3aa52fd19eedb5340252d9879fa7a4c40da27e1f27bc1ba5c56a1883a8e81090a1d28d4f80c1ac3fdb7a1d144fb2b9c54e39ba48dd6924