Analysis
-
max time kernel
260s -
max time network
254s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe
Resource
win7-20230220-en
General
-
Target
d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe
-
Size
940KB
-
MD5
a18bebbed0e0917c7bcd1161a1ef9166
-
SHA1
6e3e9b944a1ce3d5557d75a1c06848f6886de637
-
SHA256
d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
-
SHA512
af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
SSDEEP
24576:+bByb8Bx4tSVuUXG4fM+hGmqhvitP3o5R:+bM5O7U+hZqhvitP3o5R
Malware Config
Extracted
amadey
3.83
78.46.242.112/so57Nst/index.php
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1764 oneetx.exe 1840 oneetx.exe 964 oneetx.exe 1448 oneetx.exe 520 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe 1764 oneetx.exe 1840 oneetx.exe 964 oneetx.exe 1448 oneetx.exe 520 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1764 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe 28 PID 1352 wrote to memory of 1764 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe 28 PID 1352 wrote to memory of 1764 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe 28 PID 1352 wrote to memory of 1764 1352 d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe 28 PID 1764 wrote to memory of 1148 1764 oneetx.exe 29 PID 1764 wrote to memory of 1148 1764 oneetx.exe 29 PID 1764 wrote to memory of 1148 1764 oneetx.exe 29 PID 1764 wrote to memory of 1148 1764 oneetx.exe 29 PID 1764 wrote to memory of 860 1764 oneetx.exe 31 PID 1764 wrote to memory of 860 1764 oneetx.exe 31 PID 1764 wrote to memory of 860 1764 oneetx.exe 31 PID 1764 wrote to memory of 860 1764 oneetx.exe 31 PID 860 wrote to memory of 1544 860 cmd.exe 33 PID 860 wrote to memory of 1544 860 cmd.exe 33 PID 860 wrote to memory of 1544 860 cmd.exe 33 PID 860 wrote to memory of 1544 860 cmd.exe 33 PID 860 wrote to memory of 1572 860 cmd.exe 34 PID 860 wrote to memory of 1572 860 cmd.exe 34 PID 860 wrote to memory of 1572 860 cmd.exe 34 PID 860 wrote to memory of 1572 860 cmd.exe 34 PID 860 wrote to memory of 1464 860 cmd.exe 35 PID 860 wrote to memory of 1464 860 cmd.exe 35 PID 860 wrote to memory of 1464 860 cmd.exe 35 PID 860 wrote to memory of 1464 860 cmd.exe 35 PID 860 wrote to memory of 1096 860 cmd.exe 36 PID 860 wrote to memory of 1096 860 cmd.exe 36 PID 860 wrote to memory of 1096 860 cmd.exe 36 PID 860 wrote to memory of 1096 860 cmd.exe 36 PID 860 wrote to memory of 1020 860 cmd.exe 37 PID 860 wrote to memory of 1020 860 cmd.exe 37 PID 860 wrote to memory of 1020 860 cmd.exe 37 PID 860 wrote to memory of 1020 860 cmd.exe 37 PID 860 wrote to memory of 1372 860 cmd.exe 38 PID 860 wrote to memory of 1372 860 cmd.exe 38 PID 860 wrote to memory of 1372 860 cmd.exe 38 PID 860 wrote to memory of 1372 860 cmd.exe 38 PID 1536 wrote to memory of 1840 1536 taskeng.exe 42 PID 1536 wrote to memory of 1840 1536 taskeng.exe 42 PID 1536 wrote to memory of 1840 1536 taskeng.exe 42 PID 1536 wrote to memory of 1840 1536 taskeng.exe 42 PID 1536 wrote to memory of 964 1536 taskeng.exe 43 PID 1536 wrote to memory of 964 1536 taskeng.exe 43 PID 1536 wrote to memory of 964 1536 taskeng.exe 43 PID 1536 wrote to memory of 964 1536 taskeng.exe 43 PID 1536 wrote to memory of 1448 1536 taskeng.exe 44 PID 1536 wrote to memory of 1448 1536 taskeng.exe 44 PID 1536 wrote to memory of 1448 1536 taskeng.exe 44 PID 1536 wrote to memory of 1448 1536 taskeng.exe 44 PID 1536 wrote to memory of 520 1536 taskeng.exe 45 PID 1536 wrote to memory of 520 1536 taskeng.exe 45 PID 1536 wrote to memory of 520 1536 taskeng.exe 45 PID 1536 wrote to memory of 520 1536 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe"C:\Users\Admin\AppData\Local\Temp\d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1148
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\6bb5824ec4" /P "Admin:N"&&CACLS "..\6bb5824ec4" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:1572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:1464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\6bb5824ec4" /P "Admin:N"4⤵PID:1020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\6bb5824ec4" /P "Admin:R" /E4⤵PID:1372
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AAC2BD26-CA12-4338-B3C3-231F52BFBAE6} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exeC:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exeC:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exeC:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exeC:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a
-
Filesize
940KB
MD5a18bebbed0e0917c7bcd1161a1ef9166
SHA16e3e9b944a1ce3d5557d75a1c06848f6886de637
SHA256d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6
SHA512af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a