Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe
Resource
win7-20240729-en
General
-
Target
1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe
-
Size
367KB
-
MD5
944be4b62367cb1ebba80569085df840
-
SHA1
31464bc2b9ba15cfc27975bfdcc89fbc947779a6
-
SHA256
1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a
-
SHA512
f00bb182d01ad46d82f2ec562111f1d36285c9c85cc08ad5893bb28f7edda9f3fdb5029a1d6f311157b1e508602065d5d9549b79afd2098810a777210979854b
-
SSDEEP
3072:oM+QXwgl9vHPbhy6VYnH88eY/8Fcy5iThp+vbeNNGPcbYq/NFPYNwPFcq+bERhVp:ojQXLP9PG1/S5KxNG81NFYqqq2EbzRv
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2416 oneetx.exe 2704 oneetx.exe 2924 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2416 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe 30 PID 3016 wrote to memory of 2416 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe 30 PID 3016 wrote to memory of 2416 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe 30 PID 3016 wrote to memory of 2416 3016 1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe 30 PID 2416 wrote to memory of 2904 2416 oneetx.exe 31 PID 2416 wrote to memory of 2904 2416 oneetx.exe 31 PID 2416 wrote to memory of 2904 2416 oneetx.exe 31 PID 2416 wrote to memory of 2904 2416 oneetx.exe 31 PID 2416 wrote to memory of 2772 2416 oneetx.exe 33 PID 2416 wrote to memory of 2772 2416 oneetx.exe 33 PID 2416 wrote to memory of 2772 2416 oneetx.exe 33 PID 2416 wrote to memory of 2772 2416 oneetx.exe 33 PID 2772 wrote to memory of 2880 2772 cmd.exe 35 PID 2772 wrote to memory of 2880 2772 cmd.exe 35 PID 2772 wrote to memory of 2880 2772 cmd.exe 35 PID 2772 wrote to memory of 2880 2772 cmd.exe 35 PID 2772 wrote to memory of 2892 2772 cmd.exe 36 PID 2772 wrote to memory of 2892 2772 cmd.exe 36 PID 2772 wrote to memory of 2892 2772 cmd.exe 36 PID 2772 wrote to memory of 2892 2772 cmd.exe 36 PID 2772 wrote to memory of 3020 2772 cmd.exe 37 PID 2772 wrote to memory of 3020 2772 cmd.exe 37 PID 2772 wrote to memory of 3020 2772 cmd.exe 37 PID 2772 wrote to memory of 3020 2772 cmd.exe 37 PID 2772 wrote to memory of 3012 2772 cmd.exe 38 PID 2772 wrote to memory of 3012 2772 cmd.exe 38 PID 2772 wrote to memory of 3012 2772 cmd.exe 38 PID 2772 wrote to memory of 3012 2772 cmd.exe 38 PID 2772 wrote to memory of 2872 2772 cmd.exe 39 PID 2772 wrote to memory of 2872 2772 cmd.exe 39 PID 2772 wrote to memory of 2872 2772 cmd.exe 39 PID 2772 wrote to memory of 2872 2772 cmd.exe 39 PID 2772 wrote to memory of 2396 2772 cmd.exe 40 PID 2772 wrote to memory of 2396 2772 cmd.exe 40 PID 2772 wrote to memory of 2396 2772 cmd.exe 40 PID 2772 wrote to memory of 2396 2772 cmd.exe 40 PID 2636 wrote to memory of 2704 2636 taskeng.exe 44 PID 2636 wrote to memory of 2704 2636 taskeng.exe 44 PID 2636 wrote to memory of 2704 2636 taskeng.exe 44 PID 2636 wrote to memory of 2704 2636 taskeng.exe 44 PID 2636 wrote to memory of 2924 2636 taskeng.exe 45 PID 2636 wrote to memory of 2924 2636 taskeng.exe 45 PID 2636 wrote to memory of 2924 2636 taskeng.exe 45 PID 2636 wrote to memory of 2924 2636 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe"C:\Users\Admin\AppData\Local\Temp\1c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FC258664-3311-47BF-9835-3A2DD5C98EC6} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5944be4b62367cb1ebba80569085df840
SHA131464bc2b9ba15cfc27975bfdcc89fbc947779a6
SHA2561c5b35952354a21126d2dc336bdb40e3de5084040fa734ccb1d890527fefc40a
SHA512f00bb182d01ad46d82f2ec562111f1d36285c9c85cc08ad5893bb28f7edda9f3fdb5029a1d6f311157b1e508602065d5d9549b79afd2098810a777210979854b