Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe
Resource
win7-20240903-en
General
-
Target
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe
-
Size
1.0MB
-
MD5
0ef38dbc5d7d1d22974c3d4d3a201467
-
SHA1
60217cdeee89ba6129b367ef7b17f113438d86b9
-
SHA256
c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf
-
SHA512
cba0a9bebb9215d901ffb306f402a83b7fa03da5deed4bd45a326b440b026cab9bcf4f30bb02cf485bc427bbb9077aa56ce516e9d03916eb0c9c9b42bd6eca2c
-
SSDEEP
12288:RUaYxiov1kJQaAdVWlbQeep6tgUDs3thCa9abuLNihYS0UvHZrm:RUaLoNbHI9465YthCag+shGM
Malware Config
Extracted
amadey
3.70
98844c
http://79.137.203.19
-
install_dir
aee1d75f06
-
install_file
oneetx.exe
-
strings_key
702c2e1ea76ddd4af8e80d8cf9ace72f
-
url_paths
/7hgd5fx4/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 4 IoCs
pid Process 1060 oneetx.exe 4060 oneetx.exe 4328 oneetx.exe 2232 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 392 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1836 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1060 1836 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 86 PID 1836 wrote to memory of 1060 1836 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 86 PID 1836 wrote to memory of 1060 1836 c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe 86 PID 1060 wrote to memory of 392 1060 oneetx.exe 93 PID 1060 wrote to memory of 392 1060 oneetx.exe 93 PID 1060 wrote to memory of 392 1060 oneetx.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe"C:\Users\Admin\AppData\Local\Temp\c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exeC:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe1⤵
- Executes dropped EXE
PID:4060
-
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exeC:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe1⤵
- Executes dropped EXE
PID:4328
-
C:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exeC:\Users\Admin\AppData\Local\Temp\aee1d75f06\oneetx.exe1⤵
- Executes dropped EXE
PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5f9a8f8d43846223c597629d19b7ef2aa
SHA1d2d459b991e8707531aeeb993c9b6ec8cf53a022
SHA256a28a13e39dae09d068697bca9f6411e94f01913fdf95fcc766af07ac79f669c6
SHA512a60e7414b1d7a43604cc806d915c941d3c79e58b1599cefb51cb9c0686aa32bda8e47e93b01e33f96e515ed964fe7a203fca7d0bf3f4a2dd3534a697eceebed9
-
Filesize
1.0MB
MD50ef38dbc5d7d1d22974c3d4d3a201467
SHA160217cdeee89ba6129b367ef7b17f113438d86b9
SHA256c3ebfddf9e19c430535564d03c68b2bfbc4b24591539f0f6a27f6a954bcf51cf
SHA512cba0a9bebb9215d901ffb306f402a83b7fa03da5deed4bd45a326b440b026cab9bcf4f30bb02cf485bc427bbb9077aa56ce516e9d03916eb0c9c9b42bd6eca2c