Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 01:56
Behavioral task
behavioral1
Sample
942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe
Resource
win10v2004-20241007-en
General
-
Target
942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe
-
Size
204KB
-
MD5
d11bba158cca8751ef2e95a8a555a355
-
SHA1
2d4ea2d13d083d1072d6715fae0089388034fb2a
-
SHA256
942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674
-
SHA512
1dc885ce46d27dd45d185ca04602fd8bffe30806d21b817862abc85e1f0634c2bab0f3a4cf1b735ca698ab26eb56627148ed1fa0af4900b19f7d76c67aaed86f
-
SSDEEP
3072:c/frTDzurT1S3CzpdmnATE55zjExkKGruONMvhu5QTXzeJX2vkMfSDPwU/:Wfrnzurs3Czpexj2kGOIu5QTyJMKkG
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2948 oneetx.exe 2260 oneetx.exe 2136 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2948 2164 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe 29 PID 2164 wrote to memory of 2948 2164 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe 29 PID 2164 wrote to memory of 2948 2164 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe 29 PID 2164 wrote to memory of 2948 2164 942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe 29 PID 2948 wrote to memory of 2944 2948 oneetx.exe 30 PID 2948 wrote to memory of 2944 2948 oneetx.exe 30 PID 2948 wrote to memory of 2944 2948 oneetx.exe 30 PID 2948 wrote to memory of 2944 2948 oneetx.exe 30 PID 2948 wrote to memory of 2980 2948 oneetx.exe 32 PID 2948 wrote to memory of 2980 2948 oneetx.exe 32 PID 2948 wrote to memory of 2980 2948 oneetx.exe 32 PID 2948 wrote to memory of 2980 2948 oneetx.exe 32 PID 2980 wrote to memory of 2848 2980 cmd.exe 34 PID 2980 wrote to memory of 2848 2980 cmd.exe 34 PID 2980 wrote to memory of 2848 2980 cmd.exe 34 PID 2980 wrote to memory of 2848 2980 cmd.exe 34 PID 2980 wrote to memory of 2988 2980 cmd.exe 35 PID 2980 wrote to memory of 2988 2980 cmd.exe 35 PID 2980 wrote to memory of 2988 2980 cmd.exe 35 PID 2980 wrote to memory of 2988 2980 cmd.exe 35 PID 2980 wrote to memory of 2868 2980 cmd.exe 36 PID 2980 wrote to memory of 2868 2980 cmd.exe 36 PID 2980 wrote to memory of 2868 2980 cmd.exe 36 PID 2980 wrote to memory of 2868 2980 cmd.exe 36 PID 2980 wrote to memory of 2844 2980 cmd.exe 37 PID 2980 wrote to memory of 2844 2980 cmd.exe 37 PID 2980 wrote to memory of 2844 2980 cmd.exe 37 PID 2980 wrote to memory of 2844 2980 cmd.exe 37 PID 2980 wrote to memory of 2936 2980 cmd.exe 38 PID 2980 wrote to memory of 2936 2980 cmd.exe 38 PID 2980 wrote to memory of 2936 2980 cmd.exe 38 PID 2980 wrote to memory of 2936 2980 cmd.exe 38 PID 2980 wrote to memory of 2748 2980 cmd.exe 39 PID 2980 wrote to memory of 2748 2980 cmd.exe 39 PID 2980 wrote to memory of 2748 2980 cmd.exe 39 PID 2980 wrote to memory of 2748 2980 cmd.exe 39 PID 2828 wrote to memory of 2260 2828 taskeng.exe 42 PID 2828 wrote to memory of 2260 2828 taskeng.exe 42 PID 2828 wrote to memory of 2260 2828 taskeng.exe 42 PID 2828 wrote to memory of 2260 2828 taskeng.exe 42 PID 2828 wrote to memory of 2136 2828 taskeng.exe 43 PID 2828 wrote to memory of 2136 2828 taskeng.exe 43 PID 2828 wrote to memory of 2136 2828 taskeng.exe 43 PID 2828 wrote to memory of 2136 2828 taskeng.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe"C:\Users\Admin\AppData\Local\Temp\942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {840FC0B6-2B98-4E3D-99E8-6439F75782AA} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5d11bba158cca8751ef2e95a8a555a355
SHA12d4ea2d13d083d1072d6715fae0089388034fb2a
SHA256942b5b45c76d896590c0e5ff555fbd741879526ba024ef4ddd1a54f628090674
SHA5121dc885ce46d27dd45d185ca04602fd8bffe30806d21b817862abc85e1f0634c2bab0f3a4cf1b735ca698ab26eb56627148ed1fa0af4900b19f7d76c67aaed86f