Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 04:54
Behavioral task
behavioral1
Sample
9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe
Resource
win10v2004-20241007-en
General
-
Target
9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe
-
Size
213KB
-
MD5
c62cffddd49670b06074bf5f9a30feb0
-
SHA1
8dfebd1a4285fffbefac18000ad6e5a163a40089
-
SHA256
9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041
-
SHA512
227255fa9613dd24b4c82366c5b544bee098bb2b6ac5d75c1d485a4a8406ab295a5e200c50c58d9a3f0475f4c0cca81332ff298642f9022328eb71c7cdeb128c
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmh:5Cswq+AXYu7HGOSuZAlAILjq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 1940 oneetx.exe 2608 oneetx.exe 3700 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 904 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4228 9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1940 4228 9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe 84 PID 4228 wrote to memory of 1940 4228 9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe 84 PID 4228 wrote to memory of 1940 4228 9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe 84 PID 1940 wrote to memory of 904 1940 oneetx.exe 85 PID 1940 wrote to memory of 904 1940 oneetx.exe 85 PID 1940 wrote to memory of 904 1940 oneetx.exe 85 PID 1940 wrote to memory of 3516 1940 oneetx.exe 87 PID 1940 wrote to memory of 3516 1940 oneetx.exe 87 PID 1940 wrote to memory of 3516 1940 oneetx.exe 87 PID 3516 wrote to memory of 3744 3516 cmd.exe 89 PID 3516 wrote to memory of 3744 3516 cmd.exe 89 PID 3516 wrote to memory of 3744 3516 cmd.exe 89 PID 3516 wrote to memory of 3076 3516 cmd.exe 90 PID 3516 wrote to memory of 3076 3516 cmd.exe 90 PID 3516 wrote to memory of 3076 3516 cmd.exe 90 PID 3516 wrote to memory of 2616 3516 cmd.exe 91 PID 3516 wrote to memory of 2616 3516 cmd.exe 91 PID 3516 wrote to memory of 2616 3516 cmd.exe 91 PID 3516 wrote to memory of 2720 3516 cmd.exe 92 PID 3516 wrote to memory of 2720 3516 cmd.exe 92 PID 3516 wrote to memory of 2720 3516 cmd.exe 92 PID 3516 wrote to memory of 1260 3516 cmd.exe 93 PID 3516 wrote to memory of 1260 3516 cmd.exe 93 PID 3516 wrote to memory of 1260 3516 cmd.exe 93 PID 3516 wrote to memory of 2236 3516 cmd.exe 94 PID 3516 wrote to memory of 2236 3516 cmd.exe 94 PID 3516 wrote to memory of 2236 3516 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe"C:\Users\Admin\AppData\Local\Temp\9c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2608
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5c62cffddd49670b06074bf5f9a30feb0
SHA18dfebd1a4285fffbefac18000ad6e5a163a40089
SHA2569c2d4a27b520e44693cd203d4a731846641fad9c8ea05481be863e2951b84041
SHA512227255fa9613dd24b4c82366c5b544bee098bb2b6ac5d75c1d485a4a8406ab295a5e200c50c58d9a3f0475f4c0cca81332ff298642f9022328eb71c7cdeb128c