Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe
Resource
win7-20240708-en
General
-
Target
e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe
-
Size
277KB
-
MD5
4bf137e4d3e0423c58f12911777e5f50
-
SHA1
e21433ed125eca754ed822f2f0970a776178b872
-
SHA256
e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421
-
SHA512
a3142f51aa153105381630d7987a7c2709e8c2d0c3d52243c58806b5f87ea250b605f90e65f0d23c355d07e626ead848330e2a22abc2f69c10050a779f77327a
-
SSDEEP
3072:uSajbT5EbvRFGom1OHmU5k0oYaYmvuLhyK535irPFhZOpV:XajbTqGnmJ5k0oYfBLhJ5cYp
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 1932 oneetx.exe 1256 oneetx.exe 2848 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1924 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1932 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 30 PID 2992 wrote to memory of 1932 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 30 PID 2992 wrote to memory of 1932 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 30 PID 2992 wrote to memory of 1932 2992 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 30 PID 1932 wrote to memory of 1924 1932 oneetx.exe 31 PID 1932 wrote to memory of 1924 1932 oneetx.exe 31 PID 1932 wrote to memory of 1924 1932 oneetx.exe 31 PID 1932 wrote to memory of 1924 1932 oneetx.exe 31 PID 1932 wrote to memory of 2644 1932 oneetx.exe 33 PID 1932 wrote to memory of 2644 1932 oneetx.exe 33 PID 1932 wrote to memory of 2644 1932 oneetx.exe 33 PID 1932 wrote to memory of 2644 1932 oneetx.exe 33 PID 2644 wrote to memory of 2772 2644 cmd.exe 36 PID 2644 wrote to memory of 2772 2644 cmd.exe 36 PID 2644 wrote to memory of 2772 2644 cmd.exe 36 PID 2644 wrote to memory of 2772 2644 cmd.exe 36 PID 2644 wrote to memory of 2244 2644 cmd.exe 37 PID 2644 wrote to memory of 2244 2644 cmd.exe 37 PID 2644 wrote to memory of 2244 2644 cmd.exe 37 PID 2644 wrote to memory of 2244 2644 cmd.exe 37 PID 2644 wrote to memory of 1440 2644 cmd.exe 38 PID 2644 wrote to memory of 1440 2644 cmd.exe 38 PID 2644 wrote to memory of 1440 2644 cmd.exe 38 PID 2644 wrote to memory of 1440 2644 cmd.exe 38 PID 2644 wrote to memory of 2820 2644 cmd.exe 39 PID 2644 wrote to memory of 2820 2644 cmd.exe 39 PID 2644 wrote to memory of 2820 2644 cmd.exe 39 PID 2644 wrote to memory of 2820 2644 cmd.exe 39 PID 2644 wrote to memory of 2804 2644 cmd.exe 40 PID 2644 wrote to memory of 2804 2644 cmd.exe 40 PID 2644 wrote to memory of 2804 2644 cmd.exe 40 PID 2644 wrote to memory of 2804 2644 cmd.exe 40 PID 2644 wrote to memory of 2588 2644 cmd.exe 41 PID 2644 wrote to memory of 2588 2644 cmd.exe 41 PID 2644 wrote to memory of 2588 2644 cmd.exe 41 PID 2644 wrote to memory of 2588 2644 cmd.exe 41 PID 1656 wrote to memory of 1256 1656 taskeng.exe 44 PID 1656 wrote to memory of 1256 1656 taskeng.exe 44 PID 1656 wrote to memory of 1256 1656 taskeng.exe 44 PID 1656 wrote to memory of 1256 1656 taskeng.exe 44 PID 1656 wrote to memory of 2848 1656 taskeng.exe 45 PID 1656 wrote to memory of 2848 1656 taskeng.exe 45 PID 1656 wrote to memory of 2848 1656 taskeng.exe 45 PID 1656 wrote to memory of 2848 1656 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe"C:\Users\Admin\AppData\Local\Temp\e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {20AF0B82-95B9-48D6-B3A4-859D852FC09C} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD54bf137e4d3e0423c58f12911777e5f50
SHA1e21433ed125eca754ed822f2f0970a776178b872
SHA256e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421
SHA512a3142f51aa153105381630d7987a7c2709e8c2d0c3d52243c58806b5f87ea250b605f90e65f0d23c355d07e626ead848330e2a22abc2f69c10050a779f77327a