Analysis
-
max time kernel
112s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
XONELauncher.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
XONELauncher.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
XONELauncher.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
XONELauncher.exe
Resource
win11-20240426-en
General
-
Target
XONELauncher.exe
-
Size
510KB
-
MD5
0ed4e0764b8acdc4b7d11e4a1506575a
-
SHA1
1f20519e4a7716239da265696c815e2d76dae033
-
SHA256
4f3d3cefe0e1e946aa00d23f4d23c9c9f4d59b0f2728446d9c29dd12a4e88bd9
-
SHA512
c5a099c4b2f3335bc441b57c4bd6bb3e16f8e895fcae17f553fffc1a34458982069090babbe45d104d57175ad32796c8e22f50f59143060df7a32f628b334390
-
SSDEEP
3072:63kdTXHpVjSOupBoxJ0u0+ssa6oL9YORen2909vKK9kvDFwsH5CewvoDt41JMabv:TpVjSO0BsdLop5eX9vKliA5VkoDZao
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation XONELauncher.exe -
Executes dropped EXE 1 IoCs
pid Process 4088 WINRAR.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINRAR.exe = "\"C:\\Windows\\WINRAR.exe\" .." WINRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WINRAR.exe = "\"C:\\Windows\\WINRAR.exe\" .." WINRAR.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\WINRAR.exe XONELauncher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 7 IoCs
pid Process 1536 taskkill.exe 2192 taskkill.exe 4700 taskkill.exe 5004 taskkill.exe 2488 taskkill.exe 3360 taskkill.exe 1340 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe Token: 33 4088 WINRAR.exe Token: SeIncBasePriorityPrivilege 4088 WINRAR.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4088 4604 XONELauncher.exe 93 PID 4604 wrote to memory of 4088 4604 XONELauncher.exe 93 PID 4604 wrote to memory of 4088 4604 XONELauncher.exe 93 PID 4604 wrote to memory of 4936 4604 XONELauncher.exe 94 PID 4604 wrote to memory of 4936 4604 XONELauncher.exe 94 PID 4604 wrote to memory of 4936 4604 XONELauncher.exe 94 PID 4936 wrote to memory of 3280 4936 cmd.exe 96 PID 4936 wrote to memory of 3280 4936 cmd.exe 96 PID 4936 wrote to memory of 3280 4936 cmd.exe 96 PID 4088 wrote to memory of 2488 4088 WINRAR.exe 100 PID 4088 wrote to memory of 2488 4088 WINRAR.exe 100 PID 4088 wrote to memory of 2488 4088 WINRAR.exe 100 PID 4088 wrote to memory of 3360 4088 WINRAR.exe 104 PID 4088 wrote to memory of 3360 4088 WINRAR.exe 104 PID 4088 wrote to memory of 3360 4088 WINRAR.exe 104 PID 4088 wrote to memory of 1340 4088 WINRAR.exe 107 PID 4088 wrote to memory of 1340 4088 WINRAR.exe 107 PID 4088 wrote to memory of 1340 4088 WINRAR.exe 107 PID 4088 wrote to memory of 1536 4088 WINRAR.exe 109 PID 4088 wrote to memory of 1536 4088 WINRAR.exe 109 PID 4088 wrote to memory of 1536 4088 WINRAR.exe 109 PID 4088 wrote to memory of 2192 4088 WINRAR.exe 111 PID 4088 wrote to memory of 2192 4088 WINRAR.exe 111 PID 4088 wrote to memory of 2192 4088 WINRAR.exe 111 PID 4088 wrote to memory of 4700 4088 WINRAR.exe 119 PID 4088 wrote to memory of 4700 4088 WINRAR.exe 119 PID 4088 wrote to memory of 4700 4088 WINRAR.exe 119 PID 4088 wrote to memory of 5004 4088 WINRAR.exe 121 PID 4088 wrote to memory of 5004 4088 WINRAR.exe 121 PID 4088 wrote to memory of 5004 4088 WINRAR.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\XONELauncher.exe"C:\Users\Admin\AppData\Local\Temp\XONELauncher.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\WINRAR.exe"C:\Windows\WINRAR.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:2488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:3360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:1340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:4700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im kaspersky.exe3⤵
- Kills process with taskkill
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\XONELauncher.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵PID:3280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
510KB
MD50ed4e0764b8acdc4b7d11e4a1506575a
SHA11f20519e4a7716239da265696c815e2d76dae033
SHA2564f3d3cefe0e1e946aa00d23f4d23c9c9f4d59b0f2728446d9c29dd12a4e88bd9
SHA512c5a099c4b2f3335bc441b57c4bd6bb3e16f8e895fcae17f553fffc1a34458982069090babbe45d104d57175ad32796c8e22f50f59143060df7a32f628b334390