Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 18:02
Behavioral task
behavioral1
Sample
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
Resource
win10v2004-20241007-en
General
-
Target
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
-
Size
211KB
-
MD5
d28da912c2e492b4a8039303ef2fcaa9
-
SHA1
33b838f202881152505b9f6800e27b87e5d5c298
-
SHA256
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8
-
SHA512
141bc8e83abebb8b4818f21959ada6dfa3f0f3bc0063d3353b74e1e6b8108688a4226e2635e8344c124ff7c868b94d215b797877af53b194f0a7873d076c0270
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmhd:5Cswq+AXYu7HGOSuZAlAILjqd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 1380 oneetx.exe 3680 oneetx.exe 3584 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1520 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3416 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3416 wrote to memory of 1380 3416 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 82 PID 3416 wrote to memory of 1380 3416 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 82 PID 3416 wrote to memory of 1380 3416 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 82 PID 1380 wrote to memory of 1520 1380 oneetx.exe 83 PID 1380 wrote to memory of 1520 1380 oneetx.exe 83 PID 1380 wrote to memory of 1520 1380 oneetx.exe 83 PID 1380 wrote to memory of 5112 1380 oneetx.exe 85 PID 1380 wrote to memory of 5112 1380 oneetx.exe 85 PID 1380 wrote to memory of 5112 1380 oneetx.exe 85 PID 5112 wrote to memory of 1116 5112 cmd.exe 87 PID 5112 wrote to memory of 1116 5112 cmd.exe 87 PID 5112 wrote to memory of 1116 5112 cmd.exe 87 PID 5112 wrote to memory of 1988 5112 cmd.exe 88 PID 5112 wrote to memory of 1988 5112 cmd.exe 88 PID 5112 wrote to memory of 1988 5112 cmd.exe 88 PID 5112 wrote to memory of 1656 5112 cmd.exe 89 PID 5112 wrote to memory of 1656 5112 cmd.exe 89 PID 5112 wrote to memory of 1656 5112 cmd.exe 89 PID 5112 wrote to memory of 1468 5112 cmd.exe 90 PID 5112 wrote to memory of 1468 5112 cmd.exe 90 PID 5112 wrote to memory of 1468 5112 cmd.exe 90 PID 5112 wrote to memory of 2452 5112 cmd.exe 91 PID 5112 wrote to memory of 2452 5112 cmd.exe 91 PID 5112 wrote to memory of 2452 5112 cmd.exe 91 PID 5112 wrote to memory of 184 5112 cmd.exe 92 PID 5112 wrote to memory of 184 5112 cmd.exe 92 PID 5112 wrote to memory of 184 5112 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe"C:\Users\Admin\AppData\Local\Temp\1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3680
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5d28da912c2e492b4a8039303ef2fcaa9
SHA133b838f202881152505b9f6800e27b87e5d5c298
SHA2561bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8
SHA512141bc8e83abebb8b4818f21959ada6dfa3f0f3bc0063d3353b74e1e6b8108688a4226e2635e8344c124ff7c868b94d215b797877af53b194f0a7873d076c0270