Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe
Resource
win7-20240903-en
General
-
Target
0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe
-
Size
256KB
-
MD5
745bccae46e39f3b911182718ffbecbe
-
SHA1
70022ee1ff309cf610128b3ec3792bdcf0e1037e
-
SHA256
0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8
-
SHA512
044c66dd6c16a19778225c83d80985dd54ec7bba8b54487a4d44bc0d599b15c9f6dea1d3e69962941c3d2c2416554fbd27e5d71dfbe84308195051dc12d1c5d0
-
SSDEEP
3072:jvoS9frdq8kutjr792c6n2Ey8qVEs7SEg/J9DvPxqkf5fgKwYPDpJKJRfD/I:77Tzr0c6n2EyssGlRqagzYPDWJhg
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4868 oneetx.exe 4924 oneetx.exe 3920 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 3020 5016 WerFault.exe 82 2620 5016 WerFault.exe 82 1984 5016 WerFault.exe 82 4620 5016 WerFault.exe 82 2240 5016 WerFault.exe 82 4568 5016 WerFault.exe 82 212 5016 WerFault.exe 82 1876 5016 WerFault.exe 82 1020 5016 WerFault.exe 82 3964 5016 WerFault.exe 82 3668 4868 WerFault.exe 106 3400 4868 WerFault.exe 106 3724 4868 WerFault.exe 106 3556 4868 WerFault.exe 106 4460 4868 WerFault.exe 106 4336 4868 WerFault.exe 106 1116 4868 WerFault.exe 106 3080 4868 WerFault.exe 106 2444 4868 WerFault.exe 106 4068 4868 WerFault.exe 106 440 4868 WerFault.exe 106 736 4868 WerFault.exe 106 644 4868 WerFault.exe 106 4452 4868 WerFault.exe 106 728 4924 WerFault.exe 156 3988 3920 WerFault.exe 159 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4624 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5016 0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4868 5016 0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe 106 PID 5016 wrote to memory of 4868 5016 0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe 106 PID 5016 wrote to memory of 4868 5016 0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe 106 PID 4868 wrote to memory of 4624 4868 oneetx.exe 127 PID 4868 wrote to memory of 4624 4868 oneetx.exe 127 PID 4868 wrote to memory of 4624 4868 oneetx.exe 127 PID 4868 wrote to memory of 2500 4868 oneetx.exe 133 PID 4868 wrote to memory of 2500 4868 oneetx.exe 133 PID 4868 wrote to memory of 2500 4868 oneetx.exe 133 PID 2500 wrote to memory of 1252 2500 cmd.exe 136 PID 2500 wrote to memory of 1252 2500 cmd.exe 136 PID 2500 wrote to memory of 1252 2500 cmd.exe 136 PID 2500 wrote to memory of 2872 2500 cmd.exe 137 PID 2500 wrote to memory of 2872 2500 cmd.exe 137 PID 2500 wrote to memory of 2872 2500 cmd.exe 137 PID 2500 wrote to memory of 2944 2500 cmd.exe 139 PID 2500 wrote to memory of 2944 2500 cmd.exe 139 PID 2500 wrote to memory of 2944 2500 cmd.exe 139 PID 2500 wrote to memory of 3212 2500 cmd.exe 140 PID 2500 wrote to memory of 3212 2500 cmd.exe 140 PID 2500 wrote to memory of 3212 2500 cmd.exe 140 PID 2500 wrote to memory of 3280 2500 cmd.exe 141 PID 2500 wrote to memory of 3280 2500 cmd.exe 141 PID 2500 wrote to memory of 3280 2500 cmd.exe 141 PID 2500 wrote to memory of 4972 2500 cmd.exe 142 PID 2500 wrote to memory of 4972 2500 cmd.exe 142 PID 2500 wrote to memory of 4972 2500 cmd.exe 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe"C:\Users\Admin\AppData\Local\Temp\0eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 5722⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 6562⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7202⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7282⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 7322⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 8642⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 11122⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 11362⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 12122⤵
- Program crash
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 5963⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 7083⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8003⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8483⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8483⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8483⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 9843⤵
- Program crash
PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 9163⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 5963⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:3280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 7843⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 11923⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 6843⤵
- Program crash
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 11923⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 10003⤵
- Program crash
PID:4452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 12602⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5016 -ip 50161⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5016 -ip 50161⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5016 -ip 50161⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5016 -ip 50161⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5016 -ip 50161⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5016 -ip 50161⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5016 -ip 50161⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5016 -ip 50161⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5016 -ip 50161⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5016 -ip 50161⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4868 -ip 48681⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4868 -ip 48681⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4868 -ip 48681⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4868 -ip 48681⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4868 -ip 48681⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4868 -ip 48681⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4868 -ip 48681⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4868 -ip 48681⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4868 -ip 48681⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4868 -ip 48681⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4868 -ip 48681⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4868 -ip 48681⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4868 -ip 48681⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4868 -ip 48681⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 4282⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4924 -ip 49241⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 4282⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3920 -ip 39201⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5745bccae46e39f3b911182718ffbecbe
SHA170022ee1ff309cf610128b3ec3792bdcf0e1037e
SHA2560eb71ab368a2c0d4185515a5f9aa1457c6ecaad066ad67ec7e6727e4aa8a76b8
SHA512044c66dd6c16a19778225c83d80985dd54ec7bba8b54487a4d44bc0d599b15c9f6dea1d3e69962941c3d2c2416554fbd27e5d71dfbe84308195051dc12d1c5d0