Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
Resource
win7-20230220-en
General
-
Target
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
-
Size
5.0MB
-
MD5
890e29d78179dc4611286b863c50df53
-
SHA1
7bee367b02f66898b9ffb0f2569ca79c04edc19a
-
SHA256
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
-
SHA512
3b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
SSDEEP
98304:I95KeVzJFLYDAQlsumF2SEGKhq1v/28fV4AAc0cq9FcFzUkKm:ArQm2FGKq28tIbWzSm
Malware Config
Extracted
amadey
3.80
45.15.156.208/jd9dd3Vw/index.php
second.amadgood.com/jd9dd3Vw/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 3768 oneetx.exe 2696 oneetx.exe 2152 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4124 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 4124 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 3768 oneetx.exe 3768 oneetx.exe 2696 oneetx.exe 2696 oneetx.exe 2152 oneetx.exe 2152 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4124 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3768 4124 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 84 PID 4124 wrote to memory of 3768 4124 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 84 PID 4124 wrote to memory of 3768 4124 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 84 PID 3768 wrote to memory of 3124 3768 oneetx.exe 85 PID 3768 wrote to memory of 3124 3768 oneetx.exe 85 PID 3768 wrote to memory of 3124 3768 oneetx.exe 85 PID 3768 wrote to memory of 4580 3768 oneetx.exe 87 PID 3768 wrote to memory of 4580 3768 oneetx.exe 87 PID 3768 wrote to memory of 4580 3768 oneetx.exe 87 PID 4580 wrote to memory of 2896 4580 cmd.exe 89 PID 4580 wrote to memory of 2896 4580 cmd.exe 89 PID 4580 wrote to memory of 2896 4580 cmd.exe 89 PID 4580 wrote to memory of 5116 4580 cmd.exe 90 PID 4580 wrote to memory of 5116 4580 cmd.exe 90 PID 4580 wrote to memory of 5116 4580 cmd.exe 90 PID 4580 wrote to memory of 3872 4580 cmd.exe 91 PID 4580 wrote to memory of 3872 4580 cmd.exe 91 PID 4580 wrote to memory of 3872 4580 cmd.exe 91 PID 4580 wrote to memory of 4904 4580 cmd.exe 92 PID 4580 wrote to memory of 4904 4580 cmd.exe 92 PID 4580 wrote to memory of 4904 4580 cmd.exe 92 PID 4580 wrote to memory of 352 4580 cmd.exe 93 PID 4580 wrote to memory of 352 4580 cmd.exe 93 PID 4580 wrote to memory of 352 4580 cmd.exe 93 PID 4580 wrote to memory of 228 4580 cmd.exe 94 PID 4580 wrote to memory of 228 4580 cmd.exe 94 PID 4580 wrote to memory of 228 4580 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe"C:\Users\Admin\AppData\Local\Temp\2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:3124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:5116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:3872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"4⤵PID:352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E4⤵PID:228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5943e58f68d04aad64f0f4e0eac5a6bb8
SHA12a76bb1f399e0fb7d1d07b4e0f522e846fb2101c
SHA2561c6eeefd99228fea921e66c3d19c55aeddda15380c8c58b5a3c79fe644361071
SHA512fb5f7faca93aba7107b34d4b12a52a171bd4ab804af6b646667cb469ede20066cbda9ed8b638e73112a808a1eae972e70256f028f2dadde0b1789da79717fb11
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08