Analysis
-
max time kernel
113s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe
Resource
win7-20241010-en
General
-
Target
1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe
-
Size
256KB
-
MD5
b3ad16b5946755f8d5067573ada351d2
-
SHA1
7bb82f765456020139a9e3da9d6dde9624efe2d8
-
SHA256
1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d
-
SHA512
99e2db1fd335a8d8690d75b03b3f88715694eeffb3cc5d144af9192126b1f5cdfc31a85d971476595796b1c91fa8378f20e2fd992d4947e6777f40ebf6d65f4c
-
SSDEEP
6144:lWepsHGT+mbMuZPzkC30xG/Yjnh3wxBZYPDWJq:l1p/T+mbMuBaxG2AI
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 2 IoCs
pid Process 2840 oneetx.exe 1400 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2840 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 29 PID 2380 wrote to memory of 2840 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 29 PID 2380 wrote to memory of 2840 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 29 PID 2380 wrote to memory of 2840 2380 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 29 PID 2840 wrote to memory of 2828 2840 oneetx.exe 30 PID 2840 wrote to memory of 2828 2840 oneetx.exe 30 PID 2840 wrote to memory of 2828 2840 oneetx.exe 30 PID 2840 wrote to memory of 2828 2840 oneetx.exe 30 PID 2840 wrote to memory of 2572 2840 oneetx.exe 32 PID 2840 wrote to memory of 2572 2840 oneetx.exe 32 PID 2840 wrote to memory of 2572 2840 oneetx.exe 32 PID 2840 wrote to memory of 2572 2840 oneetx.exe 32 PID 2572 wrote to memory of 2776 2572 cmd.exe 34 PID 2572 wrote to memory of 2776 2572 cmd.exe 34 PID 2572 wrote to memory of 2776 2572 cmd.exe 34 PID 2572 wrote to memory of 2776 2572 cmd.exe 34 PID 2572 wrote to memory of 2712 2572 cmd.exe 35 PID 2572 wrote to memory of 2712 2572 cmd.exe 35 PID 2572 wrote to memory of 2712 2572 cmd.exe 35 PID 2572 wrote to memory of 2712 2572 cmd.exe 35 PID 2572 wrote to memory of 2744 2572 cmd.exe 36 PID 2572 wrote to memory of 2744 2572 cmd.exe 36 PID 2572 wrote to memory of 2744 2572 cmd.exe 36 PID 2572 wrote to memory of 2744 2572 cmd.exe 36 PID 2572 wrote to memory of 2784 2572 cmd.exe 37 PID 2572 wrote to memory of 2784 2572 cmd.exe 37 PID 2572 wrote to memory of 2784 2572 cmd.exe 37 PID 2572 wrote to memory of 2784 2572 cmd.exe 37 PID 2572 wrote to memory of 2832 2572 cmd.exe 38 PID 2572 wrote to memory of 2832 2572 cmd.exe 38 PID 2572 wrote to memory of 2832 2572 cmd.exe 38 PID 2572 wrote to memory of 2832 2572 cmd.exe 38 PID 2572 wrote to memory of 2588 2572 cmd.exe 39 PID 2572 wrote to memory of 2588 2572 cmd.exe 39 PID 2572 wrote to memory of 2588 2572 cmd.exe 39 PID 2572 wrote to memory of 2588 2572 cmd.exe 39 PID 2764 wrote to memory of 1400 2764 taskeng.exe 42 PID 2764 wrote to memory of 1400 2764 taskeng.exe 42 PID 2764 wrote to memory of 1400 2764 taskeng.exe 42 PID 2764 wrote to memory of 1400 2764 taskeng.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe"C:\Users\Admin\AppData\Local\Temp\1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E1484604-27E7-4E6B-AE1E-7E91CA1F55F9} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5b3ad16b5946755f8d5067573ada351d2
SHA17bb82f765456020139a9e3da9d6dde9624efe2d8
SHA2561b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d
SHA51299e2db1fd335a8d8690d75b03b3f88715694eeffb3cc5d144af9192126b1f5cdfc31a85d971476595796b1c91fa8378f20e2fd992d4947e6777f40ebf6d65f4c