Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
Oni.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Oni.exe
Resource
win10v2004-20240412-en
General
-
Target
Oni.exe
-
Size
142KB
-
MD5
78534f15d50bed84e216caf4c7cd87af
-
SHA1
b25bd675d56c80c29e35df6215a9d3fa38f56211
-
SHA256
eda08e8a55fb387c66a276102d40b02fdc380e999813ecd2d69fb1b4a4515c8c
-
SHA512
1d67a61d32210625e01b5827fb8d316ee789bbd4bf83b545f8aa208affe57cac314ce10075cc319b8ef34295392076ca9ca4fe3f985b382d7b7de94a2fba5f3d
-
SSDEEP
3072:tiS4omp03WQthI/US3BZC0EiRQ1G78IVn2tbSkcJ48ltlVKY:tiS4ompBUS3BZC0C1G78IVEc6ctLK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4144 WINWORD.EXE 4144 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE 4144 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Oni.exe"C:\Users\Admin\AppData\Local\Temp\Oni.exe"1⤵PID:4500
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\UseReceive.odt"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810