Overview
overview
7Static
static
3OmteExecutorV2.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3LICENSES.c...m.html
windows11-21h2-x64
3OmteExecutorV2.exe
windows11-21h2-x64
7d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
1resources/elevate.exe
windows11-21h2-x64
3vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...7z.dll
windows11-21h2-x64
3Analysis
-
max time kernel
3s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/09/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
OmteExecutorV2.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LICENSES.chromium.html
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
OmteExecutorV2.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
d3dcompiler_47.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
ffmpeg.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
libEGL.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
libGLESv2.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
resources/elevate.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
vk_swiftshader.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
vulkan-1.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240802-en
General
-
Target
OmteExecutorV2.exe
-
Size
154.6MB
-
MD5
0dbd380f7db78f6f31a5778f594107dd
-
SHA1
92441c90cd2995083dfee56f1ba6c1629d9940a2
-
SHA256
fc1a85f7626dd3d7360a8a58a12e8f253e4fa0baa903b553eeddb8b29ee27363
-
SHA512
a7ca02e758bb3643b44806071758676b7d2889a1eb497b64b57050adb733e914d1d879cb42e2e1f2254c1c2914ffa758eec0655ba741f3db16b1dfa6460cabb3
-
SSDEEP
1572864:CCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:oDAgZi
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3668 OmteExecutorV2.exe 3668 OmteExecutorV2.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 912 tasklist.exe 3636 tasklist.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OmteExecutorV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OmteExecutorV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OmteExecutorV2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 OmteExecutorV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz OmteExecutorV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString OmteExecutorV2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 OmteExecutorV2.exe -
Kills process with taskkill 18 IoCs
pid Process 788 taskkill.exe 4320 taskkill.exe 1488 taskkill.exe 704 taskkill.exe 4168 taskkill.exe 4076 taskkill.exe 4580 taskkill.exe 2812 taskkill.exe 640 taskkill.exe 2616 taskkill.exe 4256 taskkill.exe 3768 taskkill.exe 3884 taskkill.exe 1212 taskkill.exe 564 taskkill.exe 2364 taskkill.exe 1380 taskkill.exe 2000 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 OmteExecutorV2.exe 3668 OmteExecutorV2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2420 WMIC.exe Token: SeSecurityPrivilege 2420 WMIC.exe Token: SeTakeOwnershipPrivilege 2420 WMIC.exe Token: SeLoadDriverPrivilege 2420 WMIC.exe Token: SeSystemProfilePrivilege 2420 WMIC.exe Token: SeSystemtimePrivilege 2420 WMIC.exe Token: SeProfSingleProcessPrivilege 2420 WMIC.exe Token: SeIncBasePriorityPrivilege 2420 WMIC.exe Token: SeCreatePagefilePrivilege 2420 WMIC.exe Token: SeBackupPrivilege 2420 WMIC.exe Token: SeRestorePrivilege 2420 WMIC.exe Token: SeShutdownPrivilege 2420 WMIC.exe Token: SeDebugPrivilege 2420 WMIC.exe Token: SeSystemEnvironmentPrivilege 2420 WMIC.exe Token: SeRemoteShutdownPrivilege 2420 WMIC.exe Token: SeUndockPrivilege 2420 WMIC.exe Token: SeManageVolumePrivilege 2420 WMIC.exe Token: 33 2420 WMIC.exe Token: 34 2420 WMIC.exe Token: 35 2420 WMIC.exe Token: 36 2420 WMIC.exe Token: SeIncreaseQuotaPrivilege 2420 WMIC.exe Token: SeSecurityPrivilege 2420 WMIC.exe Token: SeTakeOwnershipPrivilege 2420 WMIC.exe Token: SeLoadDriverPrivilege 2420 WMIC.exe Token: SeSystemProfilePrivilege 2420 WMIC.exe Token: SeSystemtimePrivilege 2420 WMIC.exe Token: SeProfSingleProcessPrivilege 2420 WMIC.exe Token: SeIncBasePriorityPrivilege 2420 WMIC.exe Token: SeCreatePagefilePrivilege 2420 WMIC.exe Token: SeBackupPrivilege 2420 WMIC.exe Token: SeRestorePrivilege 2420 WMIC.exe Token: SeShutdownPrivilege 2420 WMIC.exe Token: SeDebugPrivilege 2420 WMIC.exe Token: SeSystemEnvironmentPrivilege 2420 WMIC.exe Token: SeRemoteShutdownPrivilege 2420 WMIC.exe Token: SeUndockPrivilege 2420 WMIC.exe Token: SeManageVolumePrivilege 2420 WMIC.exe Token: 33 2420 WMIC.exe Token: 34 2420 WMIC.exe Token: 35 2420 WMIC.exe Token: 36 2420 WMIC.exe Token: SeDebugPrivilege 912 tasklist.exe Token: SeDebugPrivilege 3884 taskkill.exe Token: SeDebugPrivilege 4580 taskkill.exe Token: SeDebugPrivilege 640 taskkill.exe Token: SeDebugPrivilege 788 taskkill.exe Token: SeDebugPrivilege 4320 taskkill.exe Token: SeDebugPrivilege 1380 taskkill.exe Token: SeDebugPrivilege 2364 taskkill.exe Token: SeDebugPrivilege 4076 taskkill.exe Token: SeDebugPrivilege 1488 taskkill.exe Token: SeDebugPrivilege 564 taskkill.exe Token: SeDebugPrivilege 2812 taskkill.exe Token: SeDebugPrivilege 704 taskkill.exe Token: SeDebugPrivilege 1212 taskkill.exe Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 3768 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 4168 taskkill.exe Token: SeDebugPrivilege 4256 taskkill.exe Token: SeDebugPrivilege 3636 tasklist.exe Token: SeIncreaseQuotaPrivilege 5016 WMIC.exe Token: SeSecurityPrivilege 5016 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1128 3668 OmteExecutorV2.exe 78 PID 3668 wrote to memory of 1128 3668 OmteExecutorV2.exe 78 PID 1128 wrote to memory of 2420 1128 cmd.exe 80 PID 1128 wrote to memory of 2420 1128 cmd.exe 80 PID 3668 wrote to memory of 1192 3668 OmteExecutorV2.exe 82 PID 3668 wrote to memory of 1192 3668 OmteExecutorV2.exe 82 PID 3668 wrote to memory of 2916 3668 OmteExecutorV2.exe 83 PID 3668 wrote to memory of 2916 3668 OmteExecutorV2.exe 83 PID 3668 wrote to memory of 4268 3668 OmteExecutorV2.exe 84 PID 3668 wrote to memory of 4268 3668 OmteExecutorV2.exe 84 PID 3668 wrote to memory of 3104 3668 OmteExecutorV2.exe 86 PID 3668 wrote to memory of 3104 3668 OmteExecutorV2.exe 86 PID 3668 wrote to memory of 836 3668 OmteExecutorV2.exe 88 PID 3668 wrote to memory of 836 3668 OmteExecutorV2.exe 88 PID 3668 wrote to memory of 1220 3668 OmteExecutorV2.exe 89 PID 3668 wrote to memory of 1220 3668 OmteExecutorV2.exe 89 PID 3668 wrote to memory of 5052 3668 OmteExecutorV2.exe 91 PID 3668 wrote to memory of 5052 3668 OmteExecutorV2.exe 91 PID 3668 wrote to memory of 3116 3668 OmteExecutorV2.exe 92 PID 3668 wrote to memory of 3116 3668 OmteExecutorV2.exe 92 PID 3668 wrote to memory of 2296 3668 OmteExecutorV2.exe 93 PID 3668 wrote to memory of 2296 3668 OmteExecutorV2.exe 93 PID 3668 wrote to memory of 1156 3668 OmteExecutorV2.exe 95 PID 3668 wrote to memory of 1156 3668 OmteExecutorV2.exe 95 PID 3668 wrote to memory of 1696 3668 OmteExecutorV2.exe 96 PID 3668 wrote to memory of 1696 3668 OmteExecutorV2.exe 96 PID 3668 wrote to memory of 1548 3668 OmteExecutorV2.exe 97 PID 3668 wrote to memory of 1548 3668 OmteExecutorV2.exe 97 PID 3668 wrote to memory of 2804 3668 OmteExecutorV2.exe 98 PID 3668 wrote to memory of 2804 3668 OmteExecutorV2.exe 98 PID 3668 wrote to memory of 1008 3668 OmteExecutorV2.exe 99 PID 3668 wrote to memory of 1008 3668 OmteExecutorV2.exe 99 PID 3668 wrote to memory of 1656 3668 OmteExecutorV2.exe 101 PID 3668 wrote to memory of 1656 3668 OmteExecutorV2.exe 101 PID 3668 wrote to memory of 2544 3668 OmteExecutorV2.exe 102 PID 3668 wrote to memory of 2544 3668 OmteExecutorV2.exe 102 PID 3668 wrote to memory of 3868 3668 OmteExecutorV2.exe 103 PID 3668 wrote to memory of 3868 3668 OmteExecutorV2.exe 103 PID 3668 wrote to memory of 2300 3668 OmteExecutorV2.exe 105 PID 3668 wrote to memory of 2300 3668 OmteExecutorV2.exe 105 PID 3668 wrote to memory of 4732 3668 OmteExecutorV2.exe 107 PID 3668 wrote to memory of 4732 3668 OmteExecutorV2.exe 107 PID 4732 wrote to memory of 912 4732 cmd.exe 120 PID 4732 wrote to memory of 912 4732 cmd.exe 120 PID 1696 wrote to memory of 3884 1696 cmd.exe 121 PID 1696 wrote to memory of 3884 1696 cmd.exe 121 PID 5052 wrote to memory of 788 5052 cmd.exe 122 PID 5052 wrote to memory of 788 5052 cmd.exe 122 PID 4268 wrote to memory of 4076 4268 cmd.exe 123 PID 4268 wrote to memory of 4076 4268 cmd.exe 123 PID 1008 wrote to memory of 1212 1008 cmd.exe 124 PID 1008 wrote to memory of 1212 1008 cmd.exe 124 PID 3116 wrote to memory of 4580 3116 cmd.exe 125 PID 3116 wrote to memory of 4580 3116 cmd.exe 125 PID 1548 wrote to memory of 4320 1548 cmd.exe 126 PID 1548 wrote to memory of 4320 1548 cmd.exe 126 PID 2296 wrote to memory of 1380 2296 cmd.exe 127 PID 2296 wrote to memory of 1380 2296 cmd.exe 127 PID 2300 wrote to memory of 2364 2300 cmd.exe 128 PID 2300 wrote to memory of 2364 2300 cmd.exe 128 PID 1156 wrote to memory of 1488 1156 cmd.exe 129 PID 1156 wrote to memory of 1488 1156 cmd.exe 129 PID 836 wrote to memory of 2812 836 cmd.exe 130 PID 836 wrote to memory of 2812 836 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\OmteExecutorV2.exe"C:\Users\Admin\AppData\Local\Temp\OmteExecutorV2.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "WMIC csproduct get UUID"2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\System32\Wbem\WMIC.exeWMIC csproduct get UUID3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM taskmgr.exe /F"2⤵PID:1192
-
C:\Windows\system32\taskkill.exetaskkill /IM taskmgr.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM cmd.exe /F"2⤵PID:2916
-
C:\Windows\system32\taskkill.exetaskkill /IM cmd.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM powershell.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\system32\taskkill.exetaskkill /IM powershell.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ProcessHacker.exe /F"2⤵PID:3104
-
C:\Windows\system32\taskkill.exetaskkill /IM ProcessHacker.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ProcessLasso.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\taskkill.exetaskkill /IM ProcessLasso.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM regedit.exe /F"2⤵PID:1220
-
C:\Windows\system32\taskkill.exetaskkill /IM regedit.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM wmplayer.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\taskkill.exetaskkill /IM wmplayer.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM x64dbg.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\system32\taskkill.exetaskkill /IM x64dbg.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ollydbg.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\taskkill.exetaskkill /IM ollydbg.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ida.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\system32\taskkill.exetaskkill /IM ida.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ida64.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\taskkill.exetaskkill /IM ida64.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM windbg.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\taskkill.exetaskkill /IM windbg.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM procexp.exe /F"2⤵PID:2804
-
C:\Windows\system32\taskkill.exetaskkill /IM procexp.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM procexp64.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\system32\taskkill.exetaskkill /IM procexp64.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM procmon.exe /F"2⤵PID:1656
-
C:\Windows\system32\taskkill.exetaskkill /IM procmon.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM tcpview.exe /F"2⤵PID:2544
-
C:\Windows\system32\taskkill.exetaskkill /IM tcpview.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM autoruns.exe /F"2⤵PID:3868
-
C:\Windows\system32\taskkill.exetaskkill /IM autoruns.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "taskkill /IM autorunsc.exe /F"2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\taskkill.exetaskkill /IM autorunsc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:2928
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic bios get serialnumber"2⤵PID:2372
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5237f01c0ea8e2a1b0a4378e8e0c84096
SHA1e46acb4f12db90c9e3908ef73b6c1e4363abd7c3
SHA256f42ee378cc27b38863e1131cdc462e027031c1d6b9a9f189b82de0259e32cb67
SHA512098093fc408c436f8f97e4ddb896a5b51cabeb1ccb4ed08f7e24a35a225a15a281e4ef2544645dc998766fa1bcc04e039b3bf55ba8b6dc4c0515a437b61f0620
-
Filesize
137KB
MD504bfbfec8db966420fe4c7b85ebb506a
SHA1939bb742a354a92e1dcd3661a62d69e48030a335
SHA256da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd
SHA5124ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65