Analysis

  • max time kernel
    3s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/09/2024, 14:52

General

  • Target

    OmteExecutorV2.exe

  • Size

    154.6MB

  • MD5

    0dbd380f7db78f6f31a5778f594107dd

  • SHA1

    92441c90cd2995083dfee56f1ba6c1629d9940a2

  • SHA256

    fc1a85f7626dd3d7360a8a58a12e8f253e4fa0baa903b553eeddb8b29ee27363

  • SHA512

    a7ca02e758bb3643b44806071758676b7d2889a1eb497b64b57050adb733e914d1d879cb42e2e1f2254c1c2914ffa758eec0655ba741f3db16b1dfa6460cabb3

  • SSDEEP

    1572864:CCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:oDAgZi

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OmteExecutorV2.exe
    "C:\Users\Admin\AppData\Local\Temp\OmteExecutorV2.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "WMIC csproduct get UUID"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Windows\System32\Wbem\WMIC.exe
        WMIC csproduct get UUID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2420
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM taskmgr.exe /F"
      2⤵
        PID:1192
        • C:\Windows\system32\taskkill.exe
          taskkill /IM taskmgr.exe /F
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2000
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM cmd.exe /F"
        2⤵
          PID:2916
          • C:\Windows\system32\taskkill.exe
            taskkill /IM cmd.exe /F
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:564
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM powershell.exe /F"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4268
          • C:\Windows\system32\taskkill.exe
            taskkill /IM powershell.exe /F
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4076
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ProcessHacker.exe /F"
          2⤵
            PID:3104
            • C:\Windows\system32\taskkill.exe
              taskkill /IM ProcessHacker.exe /F
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4256
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ProcessLasso.exe /F"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:836
            • C:\Windows\system32\taskkill.exe
              taskkill /IM ProcessLasso.exe /F
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2812
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM regedit.exe /F"
            2⤵
              PID:1220
              • C:\Windows\system32\taskkill.exe
                taskkill /IM regedit.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2616
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM wmplayer.exe /F"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:5052
              • C:\Windows\system32\taskkill.exe
                taskkill /IM wmplayer.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:788
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM x64dbg.exe /F"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3116
              • C:\Windows\system32\taskkill.exe
                taskkill /IM x64dbg.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4580
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ollydbg.exe /F"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2296
              • C:\Windows\system32\taskkill.exe
                taskkill /IM ollydbg.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1380
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ida.exe /F"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1156
              • C:\Windows\system32\taskkill.exe
                taskkill /IM ida.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1488
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM ida64.exe /F"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1696
              • C:\Windows\system32\taskkill.exe
                taskkill /IM ida64.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3884
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM windbg.exe /F"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1548
              • C:\Windows\system32\taskkill.exe
                taskkill /IM windbg.exe /F
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4320
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM procexp.exe /F"
              2⤵
                PID:2804
                • C:\Windows\system32\taskkill.exe
                  taskkill /IM procexp.exe /F
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4168
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM procexp64.exe /F"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1008
                • C:\Windows\system32\taskkill.exe
                  taskkill /IM procexp64.exe /F
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1212
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM procmon.exe /F"
                2⤵
                  PID:1656
                  • C:\Windows\system32\taskkill.exe
                    taskkill /IM procmon.exe /F
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3768
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM tcpview.exe /F"
                  2⤵
                    PID:2544
                    • C:\Windows\system32\taskkill.exe
                      taskkill /IM tcpview.exe /F
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:640
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM autoruns.exe /F"
                    2⤵
                      PID:3868
                      • C:\Windows\system32\taskkill.exe
                        taskkill /IM autoruns.exe /F
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:704
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM autorunsc.exe /F"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2300
                      • C:\Windows\system32\taskkill.exe
                        taskkill /IM autorunsc.exe /F
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2364
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4732
                      • C:\Windows\system32\tasklist.exe
                        tasklist
                        3⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:912
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                      2⤵
                        PID:2928
                        • C:\Windows\system32\tasklist.exe
                          tasklist
                          3⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3636
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "wmic bios get serialnumber"
                        2⤵
                          PID:2372
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic bios get serialnumber
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5016

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\23f9f0de-1a70-4eaf-88f3-e0430a827509.tmp.node

                        Filesize

                        1.6MB

                        MD5

                        237f01c0ea8e2a1b0a4378e8e0c84096

                        SHA1

                        e46acb4f12db90c9e3908ef73b6c1e4363abd7c3

                        SHA256

                        f42ee378cc27b38863e1131cdc462e027031c1d6b9a9f189b82de0259e32cb67

                        SHA512

                        098093fc408c436f8f97e4ddb896a5b51cabeb1ccb4ed08f7e24a35a225a15a281e4ef2544645dc998766fa1bcc04e039b3bf55ba8b6dc4c0515a437b61f0620

                      • C:\Users\Admin\AppData\Local\Temp\445091b4-c39f-4e3f-af19-7c07db5f6250.tmp.node

                        Filesize

                        137KB

                        MD5

                        04bfbfec8db966420fe4c7b85ebb506a

                        SHA1

                        939bb742a354a92e1dcd3661a62d69e48030a335

                        SHA256

                        da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

                        SHA512

                        4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65