Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe
Resource
win7-20240903-en
General
-
Target
b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe
-
Size
256KB
-
MD5
ba066c39ca1482b02e5f9f335d899198
-
SHA1
839f925526051f66ef29ad549d8dffde8d5c2461
-
SHA256
b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684
-
SHA512
9c56c1337234c81b27a9251d5d7df2916a50c4c8bfa13b925a4f96eea9ef505e70440378614e22dc690163cacedb3f04ce6a7cd3586e529a9103ef0317360e0e
-
SSDEEP
3072://MnwnqSiQunb5x8BAG8nweqXnzIL6qvUsbqC6N25/jAtwYPDpJKJRfyI:HaJSvMjwjwDw8MqYPDWJ
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2792 oneetx.exe 2368 oneetx.exe 2260 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2848 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2792 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe 31 PID 1388 wrote to memory of 2792 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe 31 PID 1388 wrote to memory of 2792 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe 31 PID 1388 wrote to memory of 2792 1388 b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe 31 PID 2792 wrote to memory of 2848 2792 oneetx.exe 32 PID 2792 wrote to memory of 2848 2792 oneetx.exe 32 PID 2792 wrote to memory of 2848 2792 oneetx.exe 32 PID 2792 wrote to memory of 2848 2792 oneetx.exe 32 PID 2792 wrote to memory of 2688 2792 oneetx.exe 34 PID 2792 wrote to memory of 2688 2792 oneetx.exe 34 PID 2792 wrote to memory of 2688 2792 oneetx.exe 34 PID 2792 wrote to memory of 2688 2792 oneetx.exe 34 PID 2688 wrote to memory of 2600 2688 cmd.exe 36 PID 2688 wrote to memory of 2600 2688 cmd.exe 36 PID 2688 wrote to memory of 2600 2688 cmd.exe 36 PID 2688 wrote to memory of 2600 2688 cmd.exe 36 PID 2688 wrote to memory of 1600 2688 cmd.exe 37 PID 2688 wrote to memory of 1600 2688 cmd.exe 37 PID 2688 wrote to memory of 1600 2688 cmd.exe 37 PID 2688 wrote to memory of 1600 2688 cmd.exe 37 PID 2688 wrote to memory of 2556 2688 cmd.exe 38 PID 2688 wrote to memory of 2556 2688 cmd.exe 38 PID 2688 wrote to memory of 2556 2688 cmd.exe 38 PID 2688 wrote to memory of 2556 2688 cmd.exe 38 PID 2688 wrote to memory of 2568 2688 cmd.exe 39 PID 2688 wrote to memory of 2568 2688 cmd.exe 39 PID 2688 wrote to memory of 2568 2688 cmd.exe 39 PID 2688 wrote to memory of 2568 2688 cmd.exe 39 PID 2688 wrote to memory of 2584 2688 cmd.exe 40 PID 2688 wrote to memory of 2584 2688 cmd.exe 40 PID 2688 wrote to memory of 2584 2688 cmd.exe 40 PID 2688 wrote to memory of 2584 2688 cmd.exe 40 PID 2688 wrote to memory of 2624 2688 cmd.exe 41 PID 2688 wrote to memory of 2624 2688 cmd.exe 41 PID 2688 wrote to memory of 2624 2688 cmd.exe 41 PID 2688 wrote to memory of 2624 2688 cmd.exe 41 PID 860 wrote to memory of 2368 860 taskeng.exe 44 PID 860 wrote to memory of 2368 860 taskeng.exe 44 PID 860 wrote to memory of 2368 860 taskeng.exe 44 PID 860 wrote to memory of 2368 860 taskeng.exe 44 PID 860 wrote to memory of 2260 860 taskeng.exe 46 PID 860 wrote to memory of 2260 860 taskeng.exe 46 PID 860 wrote to memory of 2260 860 taskeng.exe 46 PID 860 wrote to memory of 2260 860 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe"C:\Users\Admin\AppData\Local\Temp\b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {ECD4FE92-0940-423C-878F-7CBA65A5CBFA} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5ba066c39ca1482b02e5f9f335d899198
SHA1839f925526051f66ef29ad549d8dffde8d5c2461
SHA256b743eaf6ad342cb220471e154312e43517118126a3975893ccf3aa9b417d5684
SHA5129c56c1337234c81b27a9251d5d7df2916a50c4c8bfa13b925a4f96eea9ef505e70440378614e22dc690163cacedb3f04ce6a7cd3586e529a9103ef0317360e0e