Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 18:41
Behavioral task
behavioral1
Sample
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe
Resource
win10v2004-20241007-en
General
-
Target
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe
-
Size
213KB
-
MD5
32e6b3672eab46ff84ef46c7f69de519
-
SHA1
e64c15e987d9f46540cc79567e26d6572623a068
-
SHA256
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9
-
SHA512
ed4da348f9690c31db424c2ebc689a9c4d6784276a2bd7c314e937aee9ce91b48394dcaa7c0b3c277aa7533c31f709099732ad99e9a038a23b07435514584033
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmhf:5Cswq+AXYu7HGOSuZAlAILjqf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 4 IoCs
pid Process 5028 oneetx.exe 1352 oneetx.exe 2992 oneetx.exe 556 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3400 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3400 wrote to memory of 5028 3400 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 85 PID 3400 wrote to memory of 5028 3400 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 85 PID 3400 wrote to memory of 5028 3400 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 85 PID 5028 wrote to memory of 2844 5028 oneetx.exe 86 PID 5028 wrote to memory of 2844 5028 oneetx.exe 86 PID 5028 wrote to memory of 2844 5028 oneetx.exe 86 PID 5028 wrote to memory of 3732 5028 oneetx.exe 89 PID 5028 wrote to memory of 3732 5028 oneetx.exe 89 PID 5028 wrote to memory of 3732 5028 oneetx.exe 89 PID 3732 wrote to memory of 2624 3732 cmd.exe 91 PID 3732 wrote to memory of 2624 3732 cmd.exe 91 PID 3732 wrote to memory of 2624 3732 cmd.exe 91 PID 3732 wrote to memory of 2568 3732 cmd.exe 92 PID 3732 wrote to memory of 2568 3732 cmd.exe 92 PID 3732 wrote to memory of 2568 3732 cmd.exe 92 PID 3732 wrote to memory of 3376 3732 cmd.exe 93 PID 3732 wrote to memory of 3376 3732 cmd.exe 93 PID 3732 wrote to memory of 3376 3732 cmd.exe 93 PID 3732 wrote to memory of 2388 3732 cmd.exe 94 PID 3732 wrote to memory of 2388 3732 cmd.exe 94 PID 3732 wrote to memory of 2388 3732 cmd.exe 94 PID 3732 wrote to memory of 3392 3732 cmd.exe 95 PID 3732 wrote to memory of 3392 3732 cmd.exe 95 PID 3732 wrote to memory of 3392 3732 cmd.exe 95 PID 3732 wrote to memory of 3112 3732 cmd.exe 96 PID 3732 wrote to memory of 3112 3732 cmd.exe 96 PID 3732 wrote to memory of 3112 3732 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe"C:\Users\Admin\AppData\Local\Temp\fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1352
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2992
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD532e6b3672eab46ff84ef46c7f69de519
SHA1e64c15e987d9f46540cc79567e26d6572623a068
SHA256fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9
SHA512ed4da348f9690c31db424c2ebc689a9c4d6784276a2bd7c314e937aee9ce91b48394dcaa7c0b3c277aa7533c31f709099732ad99e9a038a23b07435514584033