Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 06:41
Behavioral task
behavioral1
Sample
0x00090000000122fe-1071.exe
Resource
win7-20230220-en
General
-
Target
0x00090000000122fe-1071.exe
-
Size
236KB
-
MD5
c5ad51ae7ec23116acfae244be5babd9
-
SHA1
f647d0c1a6df223ac59ea4e234ce756d6767eb66
-
SHA256
82c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
-
SHA512
5b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
SSDEEP
3072:N2gKdS0PkjvF5fHdjdyhRGc6zMBdSkbcaKhSdctuVi1VWQO3eIb1NcaWVJ5L:A9d78jt5fHbyhRFMMBd/ySMuViNSc39
Malware Config
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0x00090000000122fe-1071.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 0x00090000000122fe-1071.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 4 IoCs
Processes:
oneetx.exeoneetx.exeoneetx.exeoneetx.exepid process 1348 oneetx.exe 4484 oneetx.exe 1020 oneetx.exe 4368 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4340 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
0x00090000000122fe-1071.exepid process 4480 0x00090000000122fe-1071.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
0x00090000000122fe-1071.exeoneetx.execmd.exedescription pid process target process PID 4480 wrote to memory of 1348 4480 0x00090000000122fe-1071.exe oneetx.exe PID 4480 wrote to memory of 1348 4480 0x00090000000122fe-1071.exe oneetx.exe PID 4480 wrote to memory of 1348 4480 0x00090000000122fe-1071.exe oneetx.exe PID 1348 wrote to memory of 5104 1348 oneetx.exe schtasks.exe PID 1348 wrote to memory of 5104 1348 oneetx.exe schtasks.exe PID 1348 wrote to memory of 5104 1348 oneetx.exe schtasks.exe PID 1348 wrote to memory of 2932 1348 oneetx.exe cmd.exe PID 1348 wrote to memory of 2932 1348 oneetx.exe cmd.exe PID 1348 wrote to memory of 2932 1348 oneetx.exe cmd.exe PID 2932 wrote to memory of 3448 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 3448 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 3448 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 3984 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 3984 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 3984 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 2732 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 2732 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 2732 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 632 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 632 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 632 2932 cmd.exe cmd.exe PID 2932 wrote to memory of 820 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 820 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 820 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 2560 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 2560 2932 cmd.exe cacls.exe PID 2932 wrote to memory of 2560 2932 cmd.exe cacls.exe PID 1348 wrote to memory of 4340 1348 oneetx.exe rundll32.exe PID 1348 wrote to memory of 4340 1348 oneetx.exe rundll32.exe PID 1348 wrote to memory of 4340 1348 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00090000000122fe-1071.exe"C:\Users\Admin\AppData\Local\Temp\0x00090000000122fe-1071.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:5104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3448
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:3984
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:632
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c5d2db5804" /P "Admin:N"4⤵PID:820
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c5d2db5804" /P "Admin:R" /E4⤵PID:2560
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4340
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe1⤵
- Executes dropped EXE
PID:4484
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe1⤵
- Executes dropped EXE
PID:1020
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe1⤵
- Executes dropped EXE
PID:4368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5c5ad51ae7ec23116acfae244be5babd9
SHA1f647d0c1a6df223ac59ea4e234ce756d6767eb66
SHA25682c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
SHA5125b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
Filesize
236KB
MD5c5ad51ae7ec23116acfae244be5babd9
SHA1f647d0c1a6df223ac59ea4e234ce756d6767eb66
SHA25682c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
SHA5125b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
Filesize
236KB
MD5c5ad51ae7ec23116acfae244be5babd9
SHA1f647d0c1a6df223ac59ea4e234ce756d6767eb66
SHA25682c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
SHA5125b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
Filesize
236KB
MD5c5ad51ae7ec23116acfae244be5babd9
SHA1f647d0c1a6df223ac59ea4e234ce756d6767eb66
SHA25682c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
SHA5125b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
Filesize
236KB
MD5c5ad51ae7ec23116acfae244be5babd9
SHA1f647d0c1a6df223ac59ea4e234ce756d6767eb66
SHA25682c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
SHA5125b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
Filesize
236KB
MD5c5ad51ae7ec23116acfae244be5babd9
SHA1f647d0c1a6df223ac59ea4e234ce756d6767eb66
SHA25682c5b91b2761765265d57c79aa4c47fbcc18205614524ca610b95b8003d6d661
SHA5125b735f36398559493f1f4c803539acd3e0c356fc5800935888e5c09dd757071fe36dafb6e11134c1051877d6e3eab2bcc4009d3b6f72681b5fce264c9609537f
-
Filesize
89KB
MD56a4c2f2b6e1bbce94b4d00e91e690d0d
SHA1f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57
SHA2568b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f
SHA5128c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01
-
Filesize
89KB
MD56a4c2f2b6e1bbce94b4d00e91e690d0d
SHA1f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57
SHA2568b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f
SHA5128c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01
-
Filesize
89KB
MD56a4c2f2b6e1bbce94b4d00e91e690d0d
SHA1f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57
SHA2568b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f
SHA5128c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5