Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:19
Behavioral task
behavioral1
Sample
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
Resource
win10v2004-20241007-en
General
-
Target
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
-
Size
211KB
-
MD5
d28da912c2e492b4a8039303ef2fcaa9
-
SHA1
33b838f202881152505b9f6800e27b87e5d5c298
-
SHA256
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8
-
SHA512
141bc8e83abebb8b4818f21959ada6dfa3f0f3bc0063d3353b74e1e6b8108688a4226e2635e8344c124ff7c868b94d215b797877af53b194f0a7873d076c0270
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmhd:5Cswq+AXYu7HGOSuZAlAILjqd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 4 IoCs
Processes:
oneetx.exeoneetx.exeoneetx.exeoneetx.exepid process 3956 oneetx.exe 1972 oneetx.exe 2516 oneetx.exe 2196 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.execacls.execacls.execmd.exeoneetx.exeschtasks.execacls.exe1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.execacls.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exepid process 2196 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exeoneetx.execmd.exedescription pid process target process PID 2196 wrote to memory of 3956 2196 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe oneetx.exe PID 2196 wrote to memory of 3956 2196 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe oneetx.exe PID 2196 wrote to memory of 3956 2196 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe oneetx.exe PID 3956 wrote to memory of 3384 3956 oneetx.exe schtasks.exe PID 3956 wrote to memory of 3384 3956 oneetx.exe schtasks.exe PID 3956 wrote to memory of 3384 3956 oneetx.exe schtasks.exe PID 3956 wrote to memory of 5064 3956 oneetx.exe cmd.exe PID 3956 wrote to memory of 5064 3956 oneetx.exe cmd.exe PID 3956 wrote to memory of 5064 3956 oneetx.exe cmd.exe PID 5064 wrote to memory of 1472 5064 cmd.exe cmd.exe PID 5064 wrote to memory of 1472 5064 cmd.exe cmd.exe PID 5064 wrote to memory of 1472 5064 cmd.exe cmd.exe PID 5064 wrote to memory of 4744 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 4744 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 4744 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 2616 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 2616 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 2616 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 1300 5064 cmd.exe cmd.exe PID 5064 wrote to memory of 1300 5064 cmd.exe cmd.exe PID 5064 wrote to memory of 1300 5064 cmd.exe cmd.exe PID 5064 wrote to memory of 4992 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 4992 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 4992 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 3572 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 3572 5064 cmd.exe cacls.exe PID 5064 wrote to memory of 3572 5064 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe"C:\Users\Admin\AppData\Local\Temp\1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1972
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2516
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5d28da912c2e492b4a8039303ef2fcaa9
SHA133b838f202881152505b9f6800e27b87e5d5c298
SHA2561bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8
SHA512141bc8e83abebb8b4818f21959ada6dfa3f0f3bc0063d3353b74e1e6b8108688a4226e2635e8344c124ff7c868b94d215b797877af53b194f0a7873d076c0270