Analysis

  • max time kernel
    93s
  • max time network
    70s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/09/2024, 23:25

General

  • Target

    onibye-1.7.3b4.exe

  • Size

    499KB

  • MD5

    f195d71283c98d129d4550aaf2835251

  • SHA1

    fa1ef7fcae0588a2da0877d039856bb76ad18177

  • SHA256

    3b1d11c706e0d33fd54f3957aec1292e14c6aa66ce13b5c27f4d1971dd41ad9d

  • SHA512

    9dd7c3583f11b1bc0f06d947d567d4aeedf3bb3d5562998b50bfb6b95c7595844b3aa10894288e14b9bff7026221f48054acb9a436c7310f5889077afb7d95b1

  • SSDEEP

    12288:wbpvsCyQI8bU1RFJtrJAf4n1Nn9ARoAVgYq+D7h8bBzZiyrJAfdK:EpvsN8bU1rJtrJAf4nj8VgYqK8bBzIy/

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 55 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Users\Admin\AppData\Local\Temp\onibye-1.7.3b4.exe
        "C:\Users\Admin\AppData\Local\Temp\onibye-1.7.3b4.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:3860
    • C:\Users\Admin\AppData\Local\Temp\onibye-1.7.3b4.exe
      "C:\Users\Admin\AppData\Local\Temp\onibye-1.7.3b4.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4892
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4104
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3632
      • C:\Windows\system32\Taskmgr.exe
        "C:\Windows\system32\Taskmgr.exe"
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4848

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\onibye-1.7.3b4.exe.log

        Filesize

        425B

        MD5

        bb27934be8860266d478c13f2d65f45e

        SHA1

        a69a0e171864dcac9ade1b04fc0313e6b4024ccb

        SHA256

        85ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4

        SHA512

        87dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb

      • C:\Windows\System32\hpnsw5.exe

        Filesize

        7.2MB

        MD5

        f6d8913637f1d5d2dc846de70ce02dc5

        SHA1

        5fc9c6ab334db1f875fbc59a03f5506c478c6c3e

        SHA256

        4e72ca1baee2c7c0f50a42614d101159a9c653a8d6f7498f7bf9d7026c24c187

        SHA512

        21217a0a0eca58fc6058101aa69cf30d5dbe419c21fa7a160f44d8ebbcf5f4011203542c8f400a9bb8ee3826706417f2939c402f605817df597b7ff812b43036

      • memory/3860-6-0x00000000749F0000-0x0000000074A9B000-memory.dmp

        Filesize

        684KB

      • memory/3860-4-0x00000000749F0000-0x0000000074A9B000-memory.dmp

        Filesize

        684KB

      • memory/3860-5-0x00000000749F0000-0x0000000074A9B000-memory.dmp

        Filesize

        684KB

      • memory/4848-9-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-7-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-8-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-19-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-18-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-17-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-16-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-15-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-14-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4848-13-0x0000011C49620000-0x0000011C49621000-memory.dmp

        Filesize

        4KB

      • memory/4892-0-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

        Filesize

        4KB

      • memory/4892-1-0x0000000000F80000-0x0000000001004000-memory.dmp

        Filesize

        528KB