Analysis
-
max time kernel
111s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe
Resource
win7-20240903-en
General
-
Target
b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe
-
Size
256KB
-
MD5
a75f7ea987308049a22317140476bb40
-
SHA1
98533dbd1ffb72bdaa0077294d2d119700009c0f
-
SHA256
b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49
-
SHA512
822cb6c44009f7c42e419d905ac24d866a30ed677fea44d8b9dacaa351f4d13a6aa01ef79931c5427d8f9a41ea70b2637266784910cebe7d8b7024e41eb43950
-
SSDEEP
3072:fdg2WfgUqxS+dWIMOfdMsdmAYTH/lrsI3tbpxFTY5n5hwYPDpJKJRf8:1btUstdWROAOI9bpxZGQYPDWJ
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2028 oneetx.exe 2636 oneetx.exe 1764 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2296 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2028 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 30 PID 2388 wrote to memory of 2028 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 30 PID 2388 wrote to memory of 2028 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 30 PID 2388 wrote to memory of 2028 2388 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 30 PID 2028 wrote to memory of 2296 2028 oneetx.exe 31 PID 2028 wrote to memory of 2296 2028 oneetx.exe 31 PID 2028 wrote to memory of 2296 2028 oneetx.exe 31 PID 2028 wrote to memory of 2296 2028 oneetx.exe 31 PID 2028 wrote to memory of 2744 2028 oneetx.exe 33 PID 2028 wrote to memory of 2744 2028 oneetx.exe 33 PID 2028 wrote to memory of 2744 2028 oneetx.exe 33 PID 2028 wrote to memory of 2744 2028 oneetx.exe 33 PID 2744 wrote to memory of 2876 2744 cmd.exe 35 PID 2744 wrote to memory of 2876 2744 cmd.exe 35 PID 2744 wrote to memory of 2876 2744 cmd.exe 35 PID 2744 wrote to memory of 2876 2744 cmd.exe 35 PID 2744 wrote to memory of 2900 2744 cmd.exe 36 PID 2744 wrote to memory of 2900 2744 cmd.exe 36 PID 2744 wrote to memory of 2900 2744 cmd.exe 36 PID 2744 wrote to memory of 2900 2744 cmd.exe 36 PID 2744 wrote to memory of 1736 2744 cmd.exe 37 PID 2744 wrote to memory of 1736 2744 cmd.exe 37 PID 2744 wrote to memory of 1736 2744 cmd.exe 37 PID 2744 wrote to memory of 1736 2744 cmd.exe 37 PID 2744 wrote to memory of 2792 2744 cmd.exe 38 PID 2744 wrote to memory of 2792 2744 cmd.exe 38 PID 2744 wrote to memory of 2792 2744 cmd.exe 38 PID 2744 wrote to memory of 2792 2744 cmd.exe 38 PID 2744 wrote to memory of 2776 2744 cmd.exe 39 PID 2744 wrote to memory of 2776 2744 cmd.exe 39 PID 2744 wrote to memory of 2776 2744 cmd.exe 39 PID 2744 wrote to memory of 2776 2744 cmd.exe 39 PID 2744 wrote to memory of 2316 2744 cmd.exe 40 PID 2744 wrote to memory of 2316 2744 cmd.exe 40 PID 2744 wrote to memory of 2316 2744 cmd.exe 40 PID 2744 wrote to memory of 2316 2744 cmd.exe 40 PID 2924 wrote to memory of 2636 2924 taskeng.exe 43 PID 2924 wrote to memory of 2636 2924 taskeng.exe 43 PID 2924 wrote to memory of 2636 2924 taskeng.exe 43 PID 2924 wrote to memory of 2636 2924 taskeng.exe 43 PID 2924 wrote to memory of 1764 2924 taskeng.exe 45 PID 2924 wrote to memory of 1764 2924 taskeng.exe 45 PID 2924 wrote to memory of 1764 2924 taskeng.exe 45 PID 2924 wrote to memory of 1764 2924 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe"C:\Users\Admin\AppData\Local\Temp\b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5993C4A2-2FED-4873-BA16-0E0553C721C4} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a75f7ea987308049a22317140476bb40
SHA198533dbd1ffb72bdaa0077294d2d119700009c0f
SHA256b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49
SHA512822cb6c44009f7c42e419d905ac24d866a30ed677fea44d8b9dacaa351f4d13a6aa01ef79931c5427d8f9a41ea70b2637266784910cebe7d8b7024e41eb43950