Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe
Resource
win7-20240708-en
General
-
Target
e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe
-
Size
277KB
-
MD5
4bf137e4d3e0423c58f12911777e5f50
-
SHA1
e21433ed125eca754ed822f2f0970a776178b872
-
SHA256
e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421
-
SHA512
a3142f51aa153105381630d7987a7c2709e8c2d0c3d52243c58806b5f87ea250b605f90e65f0d23c355d07e626ead848330e2a22abc2f69c10050a779f77327a
-
SSDEEP
3072:uSajbT5EbvRFGom1OHmU5k0oYaYmvuLhyK535irPFhZOpV:XajbTqGnmJ5k0oYfBLhJ5cYp
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 3676 oneetx.exe 3548 oneetx.exe 1416 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 3648 4236 WerFault.exe 82 724 4236 WerFault.exe 82 3360 4236 WerFault.exe 82 224 4236 WerFault.exe 82 1912 4236 WerFault.exe 82 4860 4236 WerFault.exe 82 4252 4236 WerFault.exe 82 4840 4236 WerFault.exe 82 4380 4236 WerFault.exe 82 4756 4236 WerFault.exe 82 5072 3676 WerFault.exe 111 3952 3676 WerFault.exe 111 1936 3676 WerFault.exe 111 1100 3676 WerFault.exe 111 4632 3676 WerFault.exe 111 3544 3676 WerFault.exe 111 4656 3676 WerFault.exe 111 4528 3676 WerFault.exe 111 3584 3676 WerFault.exe 111 4972 3676 WerFault.exe 111 1000 3676 WerFault.exe 111 2324 3676 WerFault.exe 111 3392 3676 WerFault.exe 111 4404 3676 WerFault.exe 111 2088 3548 WerFault.exe 161 2420 1416 WerFault.exe 164 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4236 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4236 wrote to memory of 3676 4236 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 111 PID 4236 wrote to memory of 3676 4236 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 111 PID 4236 wrote to memory of 3676 4236 e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe 111 PID 3676 wrote to memory of 4916 3676 oneetx.exe 134 PID 3676 wrote to memory of 4916 3676 oneetx.exe 134 PID 3676 wrote to memory of 4916 3676 oneetx.exe 134 PID 3676 wrote to memory of 3496 3676 oneetx.exe 140 PID 3676 wrote to memory of 3496 3676 oneetx.exe 140 PID 3676 wrote to memory of 3496 3676 oneetx.exe 140 PID 3496 wrote to memory of 1268 3496 cmd.exe 143 PID 3496 wrote to memory of 1268 3496 cmd.exe 143 PID 3496 wrote to memory of 1268 3496 cmd.exe 143 PID 3496 wrote to memory of 5112 3496 cmd.exe 145 PID 3496 wrote to memory of 5112 3496 cmd.exe 145 PID 3496 wrote to memory of 5112 3496 cmd.exe 145 PID 3496 wrote to memory of 1196 3496 cmd.exe 146 PID 3496 wrote to memory of 1196 3496 cmd.exe 146 PID 3496 wrote to memory of 1196 3496 cmd.exe 146 PID 3496 wrote to memory of 4276 3496 cmd.exe 147 PID 3496 wrote to memory of 4276 3496 cmd.exe 147 PID 3496 wrote to memory of 4276 3496 cmd.exe 147 PID 3496 wrote to memory of 3472 3496 cmd.exe 148 PID 3496 wrote to memory of 3472 3496 cmd.exe 148 PID 3496 wrote to memory of 3472 3496 cmd.exe 148 PID 3496 wrote to memory of 4432 3496 cmd.exe 149 PID 3496 wrote to memory of 4432 3496 cmd.exe 149 PID 3496 wrote to memory of 4432 3496 cmd.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe"C:\Users\Admin\AppData\Local\Temp\e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 5602⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 5922⤵
- Program crash
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 6762⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 7322⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 7282⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 8162⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 11082⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 11322⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 11762⤵
- Program crash
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 5843⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6803⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6803⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 9523⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 9723⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 9723⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 10043⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 8883⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6523⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 11883⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6723⤵
- Program crash
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 6603⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 12083⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 9523⤵
- Program crash
PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 12642⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4236 -ip 42361⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4236 -ip 42361⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4236 -ip 42361⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4236 -ip 42361⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4236 -ip 42361⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4236 -ip 42361⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4236 -ip 42361⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4236 -ip 42361⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4236 -ip 42361⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4236 -ip 42361⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3676 -ip 36761⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3676 -ip 36761⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3676 -ip 36761⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3676 -ip 36761⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3676 -ip 36761⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3676 -ip 36761⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3676 -ip 36761⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3676 -ip 36761⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3676 -ip 36761⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3676 -ip 36761⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3676 -ip 36761⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3676 -ip 36761⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3676 -ip 36761⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3676 -ip 36761⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 3202⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3548 -ip 35481⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 3122⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1416 -ip 14161⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD54bf137e4d3e0423c58f12911777e5f50
SHA1e21433ed125eca754ed822f2f0970a776178b872
SHA256e8311959aa67657aa9ca9c58c54d83327cf05bb7f1b4d0911e3e72bae1b18421
SHA512a3142f51aa153105381630d7987a7c2709e8c2d0c3d52243c58806b5f87ea250b605f90e65f0d23c355d07e626ead848330e2a22abc2f69c10050a779f77327a