Overview
overview
10Static
static
5Oneclick-main.zip
windows7-x64
1Oneclick-main.zip
windows10-2004-x64
1Oneclick-m...MD.bat
windows7-x64
1Oneclick-m...MD.bat
windows10-2004-x64
1OneclickTo...MD.bat
windows7-x64
1OneclickTo...MD.bat
windows10-2004-x64
1OneclickTo...at.exe
windows7-x64
8OneclickTo...at.exe
windows10-2004-x64
8OneclickTo...ol.exe
windows7-x64
10OneclickTo...ol.exe
windows10-2004-x64
5OneclickTo...LG.exe
windows7-x64
1OneclickTo...LG.exe
windows10-2004-x64
1OneclickTo...10.exe
windows7-x64
1OneclickTo...10.exe
windows10-2004-x64
1OneclickTo...ca.bat
windows7-x64
1OneclickTo...ca.bat
windows10-2004-x64
1OneclickTo...nd.bat
windows7-x64
4OneclickTo...nd.bat
windows10-2004-x64
4OneclickTo...on.exe
windows7-x64
1OneclickTo...on.exe
windows10-2004-x64
1Oneclick-m...me.xml
windows7-x64
3Oneclick-m...me.xml
windows10-2004-x64
1Oneclick-m...ca.bat
windows7-x64
1Oneclick-m...ca.bat
windows10-2004-x64
1Oneclick-m...nd.bat
windows7-x64
4Oneclick-m...nd.bat
windows10-2004-x64
4Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 18:57
Behavioral task
behavioral1
Sample
Oneclick-main.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Oneclick-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Oneclick-main/Downloads/AMD.bat
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Oneclick-main/Downloads/AMD.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
OneclickTools/Amd/AMD.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
OneclickTools/Amd/AMD.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
OneclickTools/DPC Checker/dpclat.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
OneclickTools/DPC Checker/dpclat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OneclickTools/Dcontrol/dControl.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
OneclickTools/Dcontrol/dControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
OneclickTools/NSudo/NSudoLG.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
OneclickTools/NSudo/NSudoLG.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
OneclickTools/OOshutup10/OOSU10.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
OneclickTools/OOshutup10/OOSU10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
OneclickTools/Orca/Orca.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OneclickTools/Orca/Orca.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
OneclickTools/Sound/Sound.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
OneclickTools/Sound/Sound.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
OneclickTools/Timer Resolution/SetTimerResolution.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
OneclickTools/Timer Resolution/SetTimerResolution.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Oneclick-main/Downloads/OpenShellTheme.xml
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Oneclick-main/Downloads/OpenShellTheme.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Oneclick-main/Downloads/Orca.bat
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Oneclick-main/Downloads/Orca.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Oneclick-main/Downloads/Sound.bat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Oneclick-main/Downloads/Sound.bat
Resource
win10v2004-20241007-en
General
-
Target
OneclickTools/Sound/Sound.bat
-
Size
1KB
-
MD5
aa79a42a515c7013ee6d746bc2033af8
-
SHA1
f703e84f64c5d8061f2aea7f636e57576b5bb2c6
-
SHA256
9989b6443318155275d5e8011e6395f57a9723444f06c7de78ad1a07a8049c6e
-
SHA512
4bcf14e930fa090d0efbad5416ea48bcdb162ddef00baf9433186736a238c3e1ff28c1fc8447a4749af2413856dd597257dbed3f7b80340d1ff0a63144c90e43
Malware Config
Signatures
-
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2588 sc.exe 3060 sc.exe 2792 sc.exe -
Kills process with taskkill 5 IoCs
pid Process 2576 taskkill.exe 2764 taskkill.exe 2824 taskkill.exe 2864 taskkill.exe 2820 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 2824 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 2820 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2764 2656 cmd.exe 32 PID 2656 wrote to memory of 2764 2656 cmd.exe 32 PID 2656 wrote to memory of 2764 2656 cmd.exe 32 PID 2656 wrote to memory of 2552 2656 cmd.exe 34 PID 2656 wrote to memory of 2552 2656 cmd.exe 34 PID 2656 wrote to memory of 2552 2656 cmd.exe 34 PID 2552 wrote to memory of 2384 2552 net.exe 35 PID 2552 wrote to memory of 2384 2552 net.exe 35 PID 2552 wrote to memory of 2384 2552 net.exe 35 PID 2656 wrote to memory of 2792 2656 cmd.exe 36 PID 2656 wrote to memory of 2792 2656 cmd.exe 36 PID 2656 wrote to memory of 2792 2656 cmd.exe 36 PID 2656 wrote to memory of 2824 2656 cmd.exe 37 PID 2656 wrote to memory of 2824 2656 cmd.exe 37 PID 2656 wrote to memory of 2824 2656 cmd.exe 37 PID 2656 wrote to memory of 2864 2656 cmd.exe 38 PID 2656 wrote to memory of 2864 2656 cmd.exe 38 PID 2656 wrote to memory of 2864 2656 cmd.exe 38 PID 2656 wrote to memory of 2684 2656 cmd.exe 39 PID 2656 wrote to memory of 2684 2656 cmd.exe 39 PID 2656 wrote to memory of 2684 2656 cmd.exe 39 PID 2684 wrote to memory of 2720 2684 net.exe 40 PID 2684 wrote to memory of 2720 2684 net.exe 40 PID 2684 wrote to memory of 2720 2684 net.exe 40 PID 2656 wrote to memory of 2588 2656 cmd.exe 41 PID 2656 wrote to memory of 2588 2656 cmd.exe 41 PID 2656 wrote to memory of 2588 2656 cmd.exe 41 PID 2656 wrote to memory of 2820 2656 cmd.exe 42 PID 2656 wrote to memory of 2820 2656 cmd.exe 42 PID 2656 wrote to memory of 2820 2656 cmd.exe 42 PID 2656 wrote to memory of 2576 2656 cmd.exe 43 PID 2656 wrote to memory of 2576 2656 cmd.exe 43 PID 2656 wrote to memory of 2576 2656 cmd.exe 43 PID 2656 wrote to memory of 784 2656 cmd.exe 44 PID 2656 wrote to memory of 784 2656 cmd.exe 44 PID 2656 wrote to memory of 784 2656 cmd.exe 44 PID 784 wrote to memory of 2984 784 net.exe 45 PID 784 wrote to memory of 2984 784 net.exe 45 PID 784 wrote to memory of 2984 784 net.exe 45 PID 2656 wrote to memory of 3060 2656 cmd.exe 46 PID 2656 wrote to memory of 3060 2656 cmd.exe 46 PID 2656 wrote to memory of 3060 2656 cmd.exe 46
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\OneclickTools\Sound\Sound.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\taskkill.exetaskkill /F /IM RtkAudUService64.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\net.exenet stop "RtkAudioUniversalService"2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "RtkAudioUniversalService"3⤵PID:2384
-
-
-
C:\Windows\system32\sc.exesc config RtkAudioUniversalService start=disabled2⤵
- Launches sc.exe
PID:2792
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im SECOMNService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im SECOCL.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\system32\net.exenet stop "SECOMNService"2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SECOMNService"3⤵PID:2720
-
-
-
C:\Windows\system32\sc.exesc config SECOMNService start=disabled2⤵
- Launches sc.exe
PID:2588
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im VSHelper.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im VSSrv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\system32\net.exenet stop "VSSrv"2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSSrv"3⤵PID:2984
-
-
-
C:\Windows\system32\sc.exesc config VSSrv start=disabled2⤵
- Launches sc.exe
PID:3060
-