Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 20:21
Behavioral task
behavioral1
Sample
2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe
Resource
win10v2004-20241007-en
General
-
Target
2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe
-
Size
215KB
-
MD5
30f94d2af05b3aad89c7bd198e83ae10
-
SHA1
89040c52efbb8a13d6205d574a8d57c41ceba912
-
SHA256
2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227
-
SHA512
7de6fe32c17b4bf2b8141346ba7d73dbb7a285283ae42f607622a5de32601b78c90871f717424d4744b9c387fd115d50aac546652342060f56aced0eb41a6b54
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmh:5Cswq+AXYu7HGOSuZAlAILjq
Malware Config
Extracted
amadey
3.81
f9a925
http://77.91.124.20
-
install_dir
c3912af058
-
install_file
oneetx.exe
-
strings_key
0504ce46646b0dc397a3c30d6692ec75
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2644 oneetx.exe 2636 oneetx.exe 2804 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1224 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2896 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1224 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2644 1224 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe 31 PID 1224 wrote to memory of 2644 1224 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe 31 PID 1224 wrote to memory of 2644 1224 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe 31 PID 1224 wrote to memory of 2644 1224 2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe 31 PID 2644 wrote to memory of 2896 2644 oneetx.exe 32 PID 2644 wrote to memory of 2896 2644 oneetx.exe 32 PID 2644 wrote to memory of 2896 2644 oneetx.exe 32 PID 2644 wrote to memory of 2896 2644 oneetx.exe 32 PID 2644 wrote to memory of 2192 2644 oneetx.exe 34 PID 2644 wrote to memory of 2192 2644 oneetx.exe 34 PID 2644 wrote to memory of 2192 2644 oneetx.exe 34 PID 2644 wrote to memory of 2192 2644 oneetx.exe 34 PID 2192 wrote to memory of 2704 2192 cmd.exe 36 PID 2192 wrote to memory of 2704 2192 cmd.exe 36 PID 2192 wrote to memory of 2704 2192 cmd.exe 36 PID 2192 wrote to memory of 2704 2192 cmd.exe 36 PID 2192 wrote to memory of 2956 2192 cmd.exe 37 PID 2192 wrote to memory of 2956 2192 cmd.exe 37 PID 2192 wrote to memory of 2956 2192 cmd.exe 37 PID 2192 wrote to memory of 2956 2192 cmd.exe 37 PID 2192 wrote to memory of 2816 2192 cmd.exe 38 PID 2192 wrote to memory of 2816 2192 cmd.exe 38 PID 2192 wrote to memory of 2816 2192 cmd.exe 38 PID 2192 wrote to memory of 2816 2192 cmd.exe 38 PID 2192 wrote to memory of 2856 2192 cmd.exe 39 PID 2192 wrote to memory of 2856 2192 cmd.exe 39 PID 2192 wrote to memory of 2856 2192 cmd.exe 39 PID 2192 wrote to memory of 2856 2192 cmd.exe 39 PID 2192 wrote to memory of 2864 2192 cmd.exe 40 PID 2192 wrote to memory of 2864 2192 cmd.exe 40 PID 2192 wrote to memory of 2864 2192 cmd.exe 40 PID 2192 wrote to memory of 2864 2192 cmd.exe 40 PID 2192 wrote to memory of 2812 2192 cmd.exe 41 PID 2192 wrote to memory of 2812 2192 cmd.exe 41 PID 2192 wrote to memory of 2812 2192 cmd.exe 41 PID 2192 wrote to memory of 2812 2192 cmd.exe 41 PID 2556 wrote to memory of 2636 2556 taskeng.exe 44 PID 2556 wrote to memory of 2636 2556 taskeng.exe 44 PID 2556 wrote to memory of 2636 2556 taskeng.exe 44 PID 2556 wrote to memory of 2636 2556 taskeng.exe 44 PID 2556 wrote to memory of 2804 2556 taskeng.exe 45 PID 2556 wrote to memory of 2804 2556 taskeng.exe 45 PID 2556 wrote to memory of 2804 2556 taskeng.exe 45 PID 2556 wrote to memory of 2804 2556 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe"C:\Users\Admin\AppData\Local\Temp\2e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5F61ADF7-2955-433E-A112-4C149F290B3A} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD530f94d2af05b3aad89c7bd198e83ae10
SHA189040c52efbb8a13d6205d574a8d57c41ceba912
SHA2562e37982832a976383db3a0e94fa3401d6b4af21ddcc662f3d75fb4be87c56227
SHA5127de6fe32c17b4bf2b8141346ba7d73dbb7a285283ae42f607622a5de32601b78c90871f717424d4744b9c387fd115d50aac546652342060f56aced0eb41a6b54