Resubmissions
06-01-2025 07:36
250106-jfgqzssphq 1010-11-2024 20:22
241110-y5rd2sthpk 1010-11-2024 20:19
241110-y34xcstmfz 10Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-11-2024 20:22
Static task
static1
General
-
Target
7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe
-
Size
726KB
-
MD5
fdd2f331e1db9a18195c1f0526a7cfee
-
SHA1
392566b780e71f753143b23d6f5605bca3c5b17c
-
SHA256
7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e
-
SHA512
29d7190b85cf43450609e862b6bfa4aca329a8d71167e4884d58b5c9aaa3bcf769f759f12cd6a7eef23baa216319c375886dafc8af93548deeaf699a2c4c173c
-
SSDEEP
12288:Zy90+68F8orpSTIGB/42kKYteK6AFhgye2sVyrDG+KMHiKUFFwlFat3:ZytNVru+JtfUysYOvpFFUS3
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2424-2149-0x0000000005420000-0x000000000542A000-memory.dmp healer behavioral1/files/0x0028000000045036-2155.dat healer behavioral1/memory/1920-2166-0x00000000000D0000-0x00000000000DA000-memory.dmp healer behavioral1/memory/5968-2172-0x00000000028D0000-0x00000000028EA000-memory.dmp healer behavioral1/memory/5968-2173-0x0000000004DA0000-0x0000000004DB8000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b98473584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b98473584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b98473584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b98473584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b98473584.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation a75386788.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation c73513741.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2192 oB572042.exe 2424 a75386788.exe 1920 1.exe 5968 b98473584.exe 3732 c73513741.exe 1220 oneetx.exe 3548 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b98473584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b98473584.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" oB572042.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5380 5968 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b98473584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c73513741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a75386788.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oB572042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2080 notepad.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1920 1.exe 1920 1.exe 5968 b98473584.exe 5968 b98473584.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2424 a75386788.exe Token: SeDebugPrivilege 5968 b98473584.exe Token: SeDebugPrivilege 1920 1.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2192 1036 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe 83 PID 1036 wrote to memory of 2192 1036 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe 83 PID 1036 wrote to memory of 2192 1036 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe 83 PID 2192 wrote to memory of 2424 2192 oB572042.exe 84 PID 2192 wrote to memory of 2424 2192 oB572042.exe 84 PID 2192 wrote to memory of 2424 2192 oB572042.exe 84 PID 2424 wrote to memory of 1920 2424 a75386788.exe 86 PID 2424 wrote to memory of 1920 2424 a75386788.exe 86 PID 2192 wrote to memory of 5968 2192 oB572042.exe 87 PID 2192 wrote to memory of 5968 2192 oB572042.exe 87 PID 2192 wrote to memory of 5968 2192 oB572042.exe 87 PID 1036 wrote to memory of 3732 1036 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe 93 PID 1036 wrote to memory of 3732 1036 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe 93 PID 1036 wrote to memory of 3732 1036 7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe 93 PID 3732 wrote to memory of 1220 3732 c73513741.exe 94 PID 3732 wrote to memory of 1220 3732 c73513741.exe 94 PID 3732 wrote to memory of 1220 3732 c73513741.exe 94 PID 1220 wrote to memory of 4296 1220 oneetx.exe 95 PID 1220 wrote to memory of 4296 1220 oneetx.exe 95 PID 1220 wrote to memory of 4296 1220 oneetx.exe 95 PID 1220 wrote to memory of 5360 1220 oneetx.exe 97 PID 1220 wrote to memory of 5360 1220 oneetx.exe 97 PID 1220 wrote to memory of 5360 1220 oneetx.exe 97 PID 5360 wrote to memory of 5668 5360 cmd.exe 99 PID 5360 wrote to memory of 5668 5360 cmd.exe 99 PID 5360 wrote to memory of 5668 5360 cmd.exe 99 PID 5360 wrote to memory of 5720 5360 cmd.exe 100 PID 5360 wrote to memory of 5720 5360 cmd.exe 100 PID 5360 wrote to memory of 5720 5360 cmd.exe 100 PID 5360 wrote to memory of 5772 5360 cmd.exe 101 PID 5360 wrote to memory of 5772 5360 cmd.exe 101 PID 5360 wrote to memory of 5772 5360 cmd.exe 101 PID 5360 wrote to memory of 2808 5360 cmd.exe 102 PID 5360 wrote to memory of 2808 5360 cmd.exe 102 PID 5360 wrote to memory of 2808 5360 cmd.exe 102 PID 5360 wrote to memory of 3184 5360 cmd.exe 103 PID 5360 wrote to memory of 3184 5360 cmd.exe 103 PID 5360 wrote to memory of 3184 5360 cmd.exe 103 PID 5360 wrote to memory of 4304 5360 cmd.exe 104 PID 5360 wrote to memory of 4304 5360 cmd.exe 104 PID 5360 wrote to memory of 4304 5360 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe"C:\Users\Admin\AppData\Local\Temp\7d92590f737289782fe5b7ede951364751df3a2247020cbae34310b82da9571e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oB572042.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oB572042.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a75386788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a75386788.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b98473584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b98473584.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5968 -s 12124⤵
- Program crash
PID:5380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c73513741.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c73513741.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
- System Location Discovery: System Language Discovery
PID:5668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵
- System Location Discovery: System Language Discovery
PID:5720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\GrantNew.ps1"1⤵
- Opens file in notepad (likely ransom note)
PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5968 -ip 59681⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"1⤵
- Executes dropped EXE
PID:3548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5c0f3e16b7835c3509e02f2b10e4842a7
SHA17554fdbafc2a8cfce6e0da1f374051eef7ec20f3
SHA256bd1ec029ee262347fa00d8ba373f5b98ff8065fc5f9c72a6c2af1ed8226376bf
SHA51212f7f49a81b948cba6db65a52cf612c66e7699a9583f583880a5a24c437ee747e4ad8cef1f6b0a48f24bd2f3bc3209969cd1713ba2f33a6044a95ea3d97a0845
-
Filesize
554KB
MD50ac2f085f095d5221f17cf86abf74f74
SHA1a99be0095b942f1b7814a37dc4450bf7028ba3ad
SHA256b1e2514af449153b55cdd4e173e164ddf62cf7a4fdf7b9af37933c47b7057d49
SHA512ee6e5578b43f1a97f9475be52c35edf007ef5f8c82b0c29b53063ed90207f3b90bdf7477209a04f42af5523504fa69a864d63614a03c67be26d03ad21f798c3a
-
Filesize
303KB
MD5f4c9d997b5b571231598486e0dbdc13f
SHA187d70445606133aa26664d2f20260a134a7701f9
SHA25699c9e0c9c5e0054d51960c56da7003d4f3003bf7279d1d253883bf5d52ef0003
SHA5124ffed8141409ab592fdc3fc67d9ccd275f810dd137342cfd12a8efa7d11787c243f5158824ee386ee3a37c4d2a6ab0212d04b6221cd7b54b4990749dc2dadf17
-
Filesize
391KB
MD5d7da11dd2fddb539d8700e738f0f6be1
SHA1933a977bf4b614576f16bdd0e2e6716f87eb02c1
SHA2569287230cd4ec5e44c5426fb2f778558677818a58e480bdf41326aaac2e3990ef
SHA51263abf9ebdfbe777a92e931c9fd9e4b3bbbb803166ceab2f59efeaab45a5ada2cbfc38b8d781597aaaf5e4caebfea869fc31a0ae92268eff1cbd2532cbf600e90
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91