Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:06
Behavioral task
behavioral1
Sample
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe
Resource
win10v2004-20241007-en
General
-
Target
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe
-
Size
205KB
-
MD5
53abd18470691dd086debd4e57af2ca7
-
SHA1
7436658257572f42c7401d84c4a37b1075b88d70
-
SHA256
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53
-
SHA512
58491d03512b7555f8c5fdedc7880fe8fddc18e4a7a96fbbf28a192b6f91042910b74356073bc46db51cbf51d5f3bd66a57cc92badecd4dea39d8f1bdff99fe4
-
SSDEEP
3072:c/frTDzurT1S3CzpdmnATE55zjExkKGruONMvhu5QTXzeJX2vkMfSDPwU:Wfrnzurs3Czpexj2kGOIu5QTyJMKk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exeoneetx.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
Processes:
oneetx.exeoneetx.exeoneetx.exepid Process 4992 oneetx.exe 3704 oneetx.exe 1812 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.execmd.execacls.execacls.execacls.execacls.exed6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.execmd.execmd.exeoneetx.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exepid Process 868 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exeoneetx.execmd.exedescription pid Process procid_target PID 868 wrote to memory of 4992 868 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 83 PID 868 wrote to memory of 4992 868 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 83 PID 868 wrote to memory of 4992 868 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 83 PID 4992 wrote to memory of 4124 4992 oneetx.exe 84 PID 4992 wrote to memory of 4124 4992 oneetx.exe 84 PID 4992 wrote to memory of 4124 4992 oneetx.exe 84 PID 4992 wrote to memory of 3800 4992 oneetx.exe 86 PID 4992 wrote to memory of 3800 4992 oneetx.exe 86 PID 4992 wrote to memory of 3800 4992 oneetx.exe 86 PID 3800 wrote to memory of 5104 3800 cmd.exe 88 PID 3800 wrote to memory of 5104 3800 cmd.exe 88 PID 3800 wrote to memory of 5104 3800 cmd.exe 88 PID 3800 wrote to memory of 32 3800 cmd.exe 89 PID 3800 wrote to memory of 32 3800 cmd.exe 89 PID 3800 wrote to memory of 32 3800 cmd.exe 89 PID 3800 wrote to memory of 2060 3800 cmd.exe 90 PID 3800 wrote to memory of 2060 3800 cmd.exe 90 PID 3800 wrote to memory of 2060 3800 cmd.exe 90 PID 3800 wrote to memory of 3112 3800 cmd.exe 91 PID 3800 wrote to memory of 3112 3800 cmd.exe 91 PID 3800 wrote to memory of 3112 3800 cmd.exe 91 PID 3800 wrote to memory of 1136 3800 cmd.exe 92 PID 3800 wrote to memory of 1136 3800 cmd.exe 92 PID 3800 wrote to memory of 1136 3800 cmd.exe 92 PID 3800 wrote to memory of 4160 3800 cmd.exe 93 PID 3800 wrote to memory of 4160 3800 cmd.exe 93 PID 3800 wrote to memory of 4160 3800 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe"C:\Users\Admin\AppData\Local\Temp\d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3704
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD553abd18470691dd086debd4e57af2ca7
SHA17436658257572f42c7401d84c4a37b1075b88d70
SHA256d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53
SHA51258491d03512b7555f8c5fdedc7880fe8fddc18e4a7a96fbbf28a192b6f91042910b74356073bc46db51cbf51d5f3bd66a57cc92badecd4dea39d8f1bdff99fe4