Analysis
-
max time kernel
8s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 11:02
Behavioral task
behavioral1
Sample
Onetap V4 Crack.exe
Resource
win10v2004-20241007-en
General
-
Target
Onetap V4 Crack.exe
-
Size
31KB
-
MD5
fa359eb48f6cb886b23fd201bca7ae96
-
SHA1
69e0c3c335f7b30fd6ed49170c291e3f66faa937
-
SHA256
bb556186e266aac14231760de2f201ae43d2dd86493a77c8969db5a8cffcf9d9
-
SHA512
49a5c631445d552cad5659026011217f27d783dac4fcee74498aff369cbf25f45e6cf3d36a4e7e378861a927cf3af92b39681238341781b71bf6f4efe479660a
-
SSDEEP
768:PtJEpBZhjzOzx5+R4s/Hu56HdAbiTinvanQmIDUu0ti5Ij:gD6uukAbiT6UQVkzj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Onetap V4 Crack.exe -
Executes dropped EXE 1 IoCs
pid Process 536 WindowsServices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onetap V4 Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsServices.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1552 wrote to memory of 536 1552 Onetap V4 Crack.exe 82 PID 1552 wrote to memory of 536 1552 Onetap V4 Crack.exe 82 PID 1552 wrote to memory of 536 1552 Onetap V4 Crack.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Onetap V4 Crack.exe"C:\Users\Admin\AppData\Local\Temp\Onetap V4 Crack.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5fa359eb48f6cb886b23fd201bca7ae96
SHA169e0c3c335f7b30fd6ed49170c291e3f66faa937
SHA256bb556186e266aac14231760de2f201ae43d2dd86493a77c8969db5a8cffcf9d9
SHA51249a5c631445d552cad5659026011217f27d783dac4fcee74498aff369cbf25f45e6cf3d36a4e7e378861a927cf3af92b39681238341781b71bf6f4efe479660a