Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe
Resource
win7-20241010-en
General
-
Target
1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe
-
Size
256KB
-
MD5
b3ad16b5946755f8d5067573ada351d2
-
SHA1
7bb82f765456020139a9e3da9d6dde9624efe2d8
-
SHA256
1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d
-
SHA512
99e2db1fd335a8d8690d75b03b3f88715694eeffb3cc5d144af9192126b1f5cdfc31a85d971476595796b1c91fa8378f20e2fd992d4947e6777f40ebf6d65f4c
-
SSDEEP
6144:lWepsHGT+mbMuZPzkC30xG/Yjnh3wxBZYPDWJq:l1p/T+mbMuBaxG2AI
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4808 oneetx.exe 2392 oneetx.exe 5048 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 3832 3928 WerFault.exe 82 2064 3928 WerFault.exe 82 4928 3928 WerFault.exe 82 1900 3928 WerFault.exe 82 4004 3928 WerFault.exe 82 1852 3928 WerFault.exe 82 3476 3928 WerFault.exe 82 1444 3928 WerFault.exe 82 2392 3928 WerFault.exe 82 4388 3928 WerFault.exe 82 2132 4808 WerFault.exe 107 1604 4808 WerFault.exe 107 2020 4808 WerFault.exe 107 976 4808 WerFault.exe 107 2892 4808 WerFault.exe 107 4828 4808 WerFault.exe 107 4472 4808 WerFault.exe 107 4988 4808 WerFault.exe 107 1540 4808 WerFault.exe 107 4496 4808 WerFault.exe 107 804 4808 WerFault.exe 107 452 4808 WerFault.exe 107 212 4808 WerFault.exe 107 5068 2392 WerFault.exe 151 1412 4808 WerFault.exe 107 2520 5048 WerFault.exe 158 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3928 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4808 3928 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 107 PID 3928 wrote to memory of 4808 3928 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 107 PID 3928 wrote to memory of 4808 3928 1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe 107 PID 4808 wrote to memory of 4696 4808 oneetx.exe 126 PID 4808 wrote to memory of 4696 4808 oneetx.exe 126 PID 4808 wrote to memory of 4696 4808 oneetx.exe 126 PID 4808 wrote to memory of 4304 4808 oneetx.exe 133 PID 4808 wrote to memory of 4304 4808 oneetx.exe 133 PID 4808 wrote to memory of 4304 4808 oneetx.exe 133 PID 4304 wrote to memory of 2108 4304 cmd.exe 137 PID 4304 wrote to memory of 2108 4304 cmd.exe 137 PID 4304 wrote to memory of 2108 4304 cmd.exe 137 PID 4304 wrote to memory of 3992 4304 cmd.exe 138 PID 4304 wrote to memory of 3992 4304 cmd.exe 138 PID 4304 wrote to memory of 3992 4304 cmd.exe 138 PID 4304 wrote to memory of 1676 4304 cmd.exe 139 PID 4304 wrote to memory of 1676 4304 cmd.exe 139 PID 4304 wrote to memory of 1676 4304 cmd.exe 139 PID 4304 wrote to memory of 4796 4304 cmd.exe 140 PID 4304 wrote to memory of 4796 4304 cmd.exe 140 PID 4304 wrote to memory of 4796 4304 cmd.exe 140 PID 4304 wrote to memory of 3560 4304 cmd.exe 141 PID 4304 wrote to memory of 3560 4304 cmd.exe 141 PID 4304 wrote to memory of 3560 4304 cmd.exe 141 PID 4304 wrote to memory of 848 4304 cmd.exe 142 PID 4304 wrote to memory of 848 4304 cmd.exe 142 PID 4304 wrote to memory of 848 4304 cmd.exe 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe"C:\Users\Admin\AppData\Local\Temp\1b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 5722⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 6922⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 7202⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 8362⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 8562⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 8842⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 11002⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 11442⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 12082⤵
- Program crash
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 5963⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9043⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9123⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9883⤵
- Program crash
PID:976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9883⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 10363⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 10563⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 8923⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 6643⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 6003⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 6563⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 6723⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 12163⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 10323⤵
- Program crash
PID:1412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 13322⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3928 -ip 39281⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3928 -ip 39281⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3928 -ip 39281⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3928 -ip 39281⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3928 -ip 39281⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3928 -ip 39281⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3928 -ip 39281⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3928 -ip 39281⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3928 -ip 39281⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3928 -ip 39281⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4808 -ip 48081⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4808 -ip 48081⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4808 -ip 48081⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4808 -ip 48081⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4808 -ip 48081⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4808 -ip 48081⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4808 -ip 48081⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4808 -ip 48081⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4808 -ip 48081⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4808 -ip 48081⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4808 -ip 48081⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4808 -ip 48081⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4808 -ip 48081⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 4282⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2392 -ip 23921⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4808 -ip 48081⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 3562⤵
- Program crash
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 5048 -ip 50481⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5b3ad16b5946755f8d5067573ada351d2
SHA17bb82f765456020139a9e3da9d6dde9624efe2d8
SHA2561b688e21b8f04a453ece6bc7a6a2374c0ce5b4da1e259571d59c4c6d15b9f98d
SHA51299e2db1fd335a8d8690d75b03b3f88715694eeffb3cc5d144af9192126b1f5cdfc31a85d971476595796b1c91fa8378f20e2fd992d4947e6777f40ebf6d65f4c