Analysis
-
max time kernel
60s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
m2017249.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
m2017249.exe
Resource
win10v2004-20230220-en
General
-
Target
m2017249.exe
-
Size
968KB
-
MD5
8ce9f6c4cde0cc4c45f0f43ed0745368
-
SHA1
fc6a14a688eb00a110370330cc804b6131fd4683
-
SHA256
5151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
-
SHA512
0266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
SSDEEP
12288:6tLTyenMEh/rI+Ea4seWbh1/PjsrCe3NsGTzbEr6JeUc/X016JNHJPXFk2LxvTr2:6tieMEe+HeWXjsldP3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m2017249.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1940 oneetx.exe 4916 oneetx.exe 4028 oneetx.exe 4648 oneetx.exe 3920 oneetx.exe 752 oneetx.exe 3712 oneetx.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4364 set thread context of 3636 4364 m2017249.exe 83 PID 1940 set thread context of 4648 1940 oneetx.exe 90 PID 3920 set thread context of 3712 3920 oneetx.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4364 m2017249.exe Token: SeDebugPrivilege 1940 oneetx.exe Token: SeDebugPrivilege 3920 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3636 m2017249.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 4364 wrote to memory of 3636 4364 m2017249.exe 83 PID 3636 wrote to memory of 1940 3636 m2017249.exe 84 PID 3636 wrote to memory of 1940 3636 m2017249.exe 84 PID 3636 wrote to memory of 1940 3636 m2017249.exe 84 PID 1940 wrote to memory of 4916 1940 oneetx.exe 85 PID 1940 wrote to memory of 4916 1940 oneetx.exe 85 PID 1940 wrote to memory of 4916 1940 oneetx.exe 85 PID 1940 wrote to memory of 4916 1940 oneetx.exe 85 PID 1940 wrote to memory of 4028 1940 oneetx.exe 86 PID 1940 wrote to memory of 4028 1940 oneetx.exe 86 PID 1940 wrote to memory of 4028 1940 oneetx.exe 86 PID 1940 wrote to memory of 4028 1940 oneetx.exe 86 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 1940 wrote to memory of 4648 1940 oneetx.exe 90 PID 4648 wrote to memory of 2384 4648 oneetx.exe 92 PID 4648 wrote to memory of 2384 4648 oneetx.exe 92 PID 4648 wrote to memory of 2384 4648 oneetx.exe 92 PID 4648 wrote to memory of 1784 4648 oneetx.exe 94 PID 4648 wrote to memory of 1784 4648 oneetx.exe 94 PID 4648 wrote to memory of 1784 4648 oneetx.exe 94 PID 1784 wrote to memory of 5012 1784 cmd.exe 96 PID 1784 wrote to memory of 5012 1784 cmd.exe 96 PID 1784 wrote to memory of 5012 1784 cmd.exe 96 PID 1784 wrote to memory of 2636 1784 cmd.exe 97 PID 1784 wrote to memory of 2636 1784 cmd.exe 97 PID 1784 wrote to memory of 2636 1784 cmd.exe 97 PID 1784 wrote to memory of 4824 1784 cmd.exe 98 PID 1784 wrote to memory of 4824 1784 cmd.exe 98 PID 1784 wrote to memory of 4824 1784 cmd.exe 98 PID 1784 wrote to memory of 2828 1784 cmd.exe 99 PID 1784 wrote to memory of 2828 1784 cmd.exe 99 PID 1784 wrote to memory of 2828 1784 cmd.exe 99 PID 1784 wrote to memory of 1296 1784 cmd.exe 100 PID 1784 wrote to memory of 1296 1784 cmd.exe 100 PID 1784 wrote to memory of 1296 1784 cmd.exe 100 PID 1784 wrote to memory of 3656 1784 cmd.exe 101 PID 1784 wrote to memory of 3656 1784 cmd.exe 101 PID 1784 wrote to memory of 3656 1784 cmd.exe 101 PID 3920 wrote to memory of 752 3920 oneetx.exe 106 PID 3920 wrote to memory of 752 3920 oneetx.exe 106 PID 3920 wrote to memory of 752 3920 oneetx.exe 106 PID 3920 wrote to memory of 752 3920 oneetx.exe 106 PID 3920 wrote to memory of 3712 3920 oneetx.exe 107 PID 3920 wrote to memory of 3712 3920 oneetx.exe 107 PID 3920 wrote to memory of 3712 3920 oneetx.exe 107 PID 3920 wrote to memory of 3712 3920 oneetx.exe 107 PID 3920 wrote to memory of 3712 3920 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\m2017249.exe"C:\Users\Admin\AppData\Local\Temp\m2017249.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\m2017249.exeC:\Users\Admin\AppData\Local\Temp\m2017249.exe2⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe4⤵
- Executes dropped EXE
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe4⤵
- Executes dropped EXE
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:2384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"6⤵PID:1296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E6⤵PID:3656
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:3712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae
-
Filesize
968KB
MD58ce9f6c4cde0cc4c45f0f43ed0745368
SHA1fc6a14a688eb00a110370330cc804b6131fd4683
SHA2565151d9be1858521ad1539b519263c452d71dd626d0801ce72d349a42161b695e
SHA5120266252b44c97080f48f541ea672019eeab03855ce2f4d9b08f0ceb8ab14e07714f56f520d8fa21b9ca274ebff471fe1927793426a341ec5cea3454f5d4525ae