Malware Analysis Report

2025-01-23 13:37

Sample ID 241212-zn5qsaxkdx
Target OLS3.exe
SHA256 00a6532c23b35d5b1e5b726e3dfa8ab3e3e1fe095ed5575bf3aafc94b3725c6c
Tags
discovery cryptone packer
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

00a6532c23b35d5b1e5b726e3dfa8ab3e3e1fe095ed5575bf3aafc94b3725c6c

Threat Level: Likely malicious

The file OLS3.exe was found to be: Likely malicious.

Malicious Activity Summary

discovery cryptone packer

CryptOne packer

Loads dropped DLL

System Location Discovery: System Language Discovery

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-12 20:53

Signatures

CryptOne packer

cryptone packer
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-12 20:52

Reported

2024-12-12 20:55

Platform

win7-20241010-en

Max time kernel

7s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OLS3.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OLS3.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OLS3.exe

"C:\Users\Admin\AppData\Local\Temp\OLS3.exe"

Network

N/A

Files

memory/2220-2-0x0000000010000000-0x000000001001C000-memory.dmp

memory/2220-4-0x0000000000380000-0x0000000000381000-memory.dmp

memory/2220-5-0x0000000000400000-0x0000000003E49000-memory.dmp

memory/2220-7-0x0000000010000000-0x000000001001C000-memory.dmp

memory/2220-6-0x0000000077510000-0x0000000077511000-memory.dmp

memory/2220-10-0x0000000010000000-0x000000001001C000-memory.dmp

memory/2220-11-0x0000000000400000-0x0000000003E49000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-12 20:52

Reported

2024-12-12 20:55

Platform

win10v2004-20241007-en

Max time kernel

88s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OLS3.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\OLS3.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OLS3.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OLS3.exe

"C:\Users\Admin\AppData\Local\Temp\OLS3.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 151.133.100.95.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 133.130.81.91.in-addr.arpa udp

Files

memory/740-3-0x0000000010000000-0x000000001001C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\evbB3E0.tmp

MD5 f3412c9a5bf676cdf6653d433caa67f7
SHA1 d4b54d9f38f16f21c9406ec0c3fad2550677d52b
SHA256 eaa33bb4f4c1a60d706eabb580b2419b8299f5c26890171f494a88e145b6521e
SHA512 7d3ec8abe27df6af843f11e6ef7ff53d61cd10b9b8f4c1715f74f0d38c7c4a19fe3b5ec349fe80b5926649fbd097ec259e42af850a33078959c172b3ab787419

memory/740-5-0x00000000061F0000-0x00000000061F1000-memory.dmp

memory/740-6-0x0000000000400000-0x0000000003E49000-memory.dmp

memory/740-9-0x0000000010000000-0x000000001001C000-memory.dmp

memory/740-8-0x00000000778C3000-0x00000000778C4000-memory.dmp

memory/740-7-0x00000000778C2000-0x00000000778C3000-memory.dmp

memory/740-12-0x0000000010000000-0x000000001001C000-memory.dmp

memory/740-13-0x0000000000400000-0x0000000003E49000-memory.dmp