Analysis
-
max time kernel
266s -
max time network
254s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-06-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
Resource
win7-20230220-en
General
-
Target
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
-
Size
5.0MB
-
MD5
890e29d78179dc4611286b863c50df53
-
SHA1
7bee367b02f66898b9ffb0f2569ca79c04edc19a
-
SHA256
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
-
SHA512
3b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
SSDEEP
98304:I95KeVzJFLYDAQlsumF2SEGKhq1v/28fV4AAc0cq9FcFzUkKm:ArQm2FGKq28tIbWzSm
Malware Config
Extracted
amadey
3.80
45.15.156.208/jd9dd3Vw/index.php
second.amadgood.com/jd9dd3Vw/index.php
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2608 oneetx.exe 4796 oneetx.exe 1328 oneetx.exe 4664 oneetx.exe 4944 oneetx.exe 524 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2132 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 2132 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 2608 oneetx.exe 2608 oneetx.exe 4796 oneetx.exe 4796 oneetx.exe 1328 oneetx.exe 1328 oneetx.exe 4664 oneetx.exe 4664 oneetx.exe 4944 oneetx.exe 4944 oneetx.exe 524 oneetx.exe 524 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2608 2132 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 66 PID 2132 wrote to memory of 2608 2132 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 66 PID 2132 wrote to memory of 2608 2132 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 66 PID 2608 wrote to memory of 3932 2608 oneetx.exe 67 PID 2608 wrote to memory of 3932 2608 oneetx.exe 67 PID 2608 wrote to memory of 3932 2608 oneetx.exe 67 PID 2608 wrote to memory of 4224 2608 oneetx.exe 69 PID 2608 wrote to memory of 4224 2608 oneetx.exe 69 PID 2608 wrote to memory of 4224 2608 oneetx.exe 69 PID 4224 wrote to memory of 2612 4224 cmd.exe 71 PID 4224 wrote to memory of 2612 4224 cmd.exe 71 PID 4224 wrote to memory of 2612 4224 cmd.exe 71 PID 4224 wrote to memory of 2008 4224 cmd.exe 72 PID 4224 wrote to memory of 2008 4224 cmd.exe 72 PID 4224 wrote to memory of 2008 4224 cmd.exe 72 PID 4224 wrote to memory of 3516 4224 cmd.exe 73 PID 4224 wrote to memory of 3516 4224 cmd.exe 73 PID 4224 wrote to memory of 3516 4224 cmd.exe 73 PID 4224 wrote to memory of 4728 4224 cmd.exe 75 PID 4224 wrote to memory of 4728 4224 cmd.exe 75 PID 4224 wrote to memory of 4728 4224 cmd.exe 75 PID 4224 wrote to memory of 3732 4224 cmd.exe 74 PID 4224 wrote to memory of 3732 4224 cmd.exe 74 PID 4224 wrote to memory of 3732 4224 cmd.exe 74 PID 4224 wrote to memory of 3456 4224 cmd.exe 76 PID 4224 wrote to memory of 3456 4224 cmd.exe 76 PID 4224 wrote to memory of 3456 4224 cmd.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe"C:\Users\Admin\AppData\Local\Temp\2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:3932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:2008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:3516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"4⤵PID:3732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E4⤵PID:3456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5293e9d67309fd84b9d520bb808dcb79d
SHA1c6f5520a6eba11026fce9c5e3dd4e6615cabb564
SHA25626b720cc9fa9841b638ecccbe0661040c702d5569130cd19747cd4b64984214b
SHA512c02b0f93aa71f7e87e596b841dab51a6fb3d7d1b8cd1196aaeb369d1485b1809408c6d8859b4a65ea47b2b7918282029af2dfe3575cba0c603ab540630fa7997
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08