Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe
Resource
win7-20240903-en
General
-
Target
9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe
-
Size
367KB
-
MD5
345d32a43a2adae9f81003dda4f9bcb1
-
SHA1
ad6ef9aeb0f1c850e55b9c0de472f821b33d71e2
-
SHA256
9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67
-
SHA512
6f6ee7e83f21ccc8954cbc8515d62eec11c75e5564b9b3e449c6766cb25521246a1a5783ae0a532960efd63ace9f1eaf71c33077b74e4d66ec889beb51086662
-
SSDEEP
3072:os+QXwgl9vHPbhy6VYnH88eY/8Fcy5iThp+vbeNNGPcbYq/NFPYNwPFcq+bERhV7:oDQXLP9PG1/S5KxNG81NFYqqq2EbzRN
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2872 oneetx.exe 2952 oneetx.exe 1684 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2588 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2872 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe 30 PID 2852 wrote to memory of 2872 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe 30 PID 2852 wrote to memory of 2872 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe 30 PID 2852 wrote to memory of 2872 2852 9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe 30 PID 2872 wrote to memory of 2588 2872 oneetx.exe 31 PID 2872 wrote to memory of 2588 2872 oneetx.exe 31 PID 2872 wrote to memory of 2588 2872 oneetx.exe 31 PID 2872 wrote to memory of 2588 2872 oneetx.exe 31 PID 2872 wrote to memory of 2616 2872 oneetx.exe 33 PID 2872 wrote to memory of 2616 2872 oneetx.exe 33 PID 2872 wrote to memory of 2616 2872 oneetx.exe 33 PID 2872 wrote to memory of 2616 2872 oneetx.exe 33 PID 2616 wrote to memory of 3064 2616 cmd.exe 35 PID 2616 wrote to memory of 3064 2616 cmd.exe 35 PID 2616 wrote to memory of 3064 2616 cmd.exe 35 PID 2616 wrote to memory of 3064 2616 cmd.exe 35 PID 2616 wrote to memory of 2628 2616 cmd.exe 36 PID 2616 wrote to memory of 2628 2616 cmd.exe 36 PID 2616 wrote to memory of 2628 2616 cmd.exe 36 PID 2616 wrote to memory of 2628 2616 cmd.exe 36 PID 2616 wrote to memory of 2076 2616 cmd.exe 37 PID 2616 wrote to memory of 2076 2616 cmd.exe 37 PID 2616 wrote to memory of 2076 2616 cmd.exe 37 PID 2616 wrote to memory of 2076 2616 cmd.exe 37 PID 2616 wrote to memory of 264 2616 cmd.exe 38 PID 2616 wrote to memory of 264 2616 cmd.exe 38 PID 2616 wrote to memory of 264 2616 cmd.exe 38 PID 2616 wrote to memory of 264 2616 cmd.exe 38 PID 2616 wrote to memory of 320 2616 cmd.exe 39 PID 2616 wrote to memory of 320 2616 cmd.exe 39 PID 2616 wrote to memory of 320 2616 cmd.exe 39 PID 2616 wrote to memory of 320 2616 cmd.exe 39 PID 2616 wrote to memory of 592 2616 cmd.exe 40 PID 2616 wrote to memory of 592 2616 cmd.exe 40 PID 2616 wrote to memory of 592 2616 cmd.exe 40 PID 2616 wrote to memory of 592 2616 cmd.exe 40 PID 2416 wrote to memory of 2952 2416 taskeng.exe 44 PID 2416 wrote to memory of 2952 2416 taskeng.exe 44 PID 2416 wrote to memory of 2952 2416 taskeng.exe 44 PID 2416 wrote to memory of 2952 2416 taskeng.exe 44 PID 2416 wrote to memory of 1684 2416 taskeng.exe 45 PID 2416 wrote to memory of 1684 2416 taskeng.exe 45 PID 2416 wrote to memory of 1684 2416 taskeng.exe 45 PID 2416 wrote to memory of 1684 2416 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe"C:\Users\Admin\AppData\Local\Temp\9accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {42934CC8-578B-46AD-989D-939DC125196B} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5345d32a43a2adae9f81003dda4f9bcb1
SHA1ad6ef9aeb0f1c850e55b9c0de472f821b33d71e2
SHA2569accad21b56c8203721abd6bd80c9cddb70759ba4581c270dd6a1f064ee9df67
SHA5126f6ee7e83f21ccc8954cbc8515d62eec11c75e5564b9b3e449c6766cb25521246a1a5783ae0a532960efd63ace9f1eaf71c33077b74e4d66ec889beb51086662