Analysis
-
max time kernel
104s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 11:33
Behavioral task
behavioral1
Sample
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe
Resource
win10v2004-20241007-en
General
-
Target
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe
-
Size
204KB
-
MD5
52e2b4b73b6aae15dda11b813dcb42b0
-
SHA1
d65bae062cda551497861d7c3df365b5a50135d6
-
SHA256
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23
-
SHA512
0486c9c8313b3f3c4095a4f6af06fdf6e696d755a5de59241bf27c4b1984a58771f09086f58f8e467e71f05f51f70405f250e760af71d2588e2ad5a141ff4994
-
SSDEEP
3072:c/frTDzurT1S3CzpdmnATE55zjExkKGruONMvhu5QTXzeJX2vkMfSDPwU:Wfrnzurs3Czpexj2kGOIu5QTyJMKk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4932 oneetx.exe 1656 oneetx.exe 1672 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3696 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 844 wrote to memory of 4932 844 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 84 PID 844 wrote to memory of 4932 844 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 84 PID 844 wrote to memory of 4932 844 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 84 PID 4932 wrote to memory of 3696 4932 oneetx.exe 86 PID 4932 wrote to memory of 3696 4932 oneetx.exe 86 PID 4932 wrote to memory of 3696 4932 oneetx.exe 86 PID 4932 wrote to memory of 1248 4932 oneetx.exe 88 PID 4932 wrote to memory of 1248 4932 oneetx.exe 88 PID 4932 wrote to memory of 1248 4932 oneetx.exe 88 PID 1248 wrote to memory of 948 1248 cmd.exe 90 PID 1248 wrote to memory of 948 1248 cmd.exe 90 PID 1248 wrote to memory of 948 1248 cmd.exe 90 PID 1248 wrote to memory of 952 1248 cmd.exe 91 PID 1248 wrote to memory of 952 1248 cmd.exe 91 PID 1248 wrote to memory of 952 1248 cmd.exe 91 PID 1248 wrote to memory of 3816 1248 cmd.exe 92 PID 1248 wrote to memory of 3816 1248 cmd.exe 92 PID 1248 wrote to memory of 3816 1248 cmd.exe 92 PID 1248 wrote to memory of 3360 1248 cmd.exe 93 PID 1248 wrote to memory of 3360 1248 cmd.exe 93 PID 1248 wrote to memory of 3360 1248 cmd.exe 93 PID 1248 wrote to memory of 3404 1248 cmd.exe 94 PID 1248 wrote to memory of 3404 1248 cmd.exe 94 PID 1248 wrote to memory of 3404 1248 cmd.exe 94 PID 1248 wrote to memory of 1500 1248 cmd.exe 95 PID 1248 wrote to memory of 1500 1248 cmd.exe 95 PID 1248 wrote to memory of 1500 1248 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe"C:\Users\Admin\AppData\Local\Temp\ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1656
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD552e2b4b73b6aae15dda11b813dcb42b0
SHA1d65bae062cda551497861d7c3df365b5a50135d6
SHA256ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23
SHA5120486c9c8313b3f3c4095a4f6af06fdf6e696d755a5de59241bf27c4b1984a58771f09086f58f8e467e71f05f51f70405f250e760af71d2588e2ad5a141ff4994