Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe
Resource
win7-20240903-en
General
-
Target
b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe
-
Size
256KB
-
MD5
a75f7ea987308049a22317140476bb40
-
SHA1
98533dbd1ffb72bdaa0077294d2d119700009c0f
-
SHA256
b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49
-
SHA512
822cb6c44009f7c42e419d905ac24d866a30ed677fea44d8b9dacaa351f4d13a6aa01ef79931c5427d8f9a41ea70b2637266784910cebe7d8b7024e41eb43950
-
SSDEEP
3072:fdg2WfgUqxS+dWIMOfdMsdmAYTH/lrsI3tbpxFTY5n5hwYPDpJKJRf8:1btUstdWROAOI9bpxZGQYPDWJ
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 2 IoCs
pid Process 684 oneetx.exe 2848 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 25 IoCs
pid pid_target Process procid_target 2692 2348 WerFault.exe 82 3120 2348 WerFault.exe 82 3836 2348 WerFault.exe 82 2936 2348 WerFault.exe 82 1484 2348 WerFault.exe 82 4704 2348 WerFault.exe 82 4540 2348 WerFault.exe 82 2208 2348 WerFault.exe 82 876 2348 WerFault.exe 82 384 2348 WerFault.exe 82 1500 684 WerFault.exe 109 4208 684 WerFault.exe 109 2944 684 WerFault.exe 109 1920 684 WerFault.exe 109 4348 684 WerFault.exe 109 4576 684 WerFault.exe 109 2720 684 WerFault.exe 109 4168 684 WerFault.exe 109 4412 684 WerFault.exe 109 1576 684 WerFault.exe 109 3320 684 WerFault.exe 109 2512 684 WerFault.exe 109 1236 684 WerFault.exe 109 4732 684 WerFault.exe 109 1668 2848 WerFault.exe 163 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2348 wrote to memory of 684 2348 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 109 PID 2348 wrote to memory of 684 2348 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 109 PID 2348 wrote to memory of 684 2348 b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe 109 PID 684 wrote to memory of 2916 684 oneetx.exe 132 PID 684 wrote to memory of 2916 684 oneetx.exe 132 PID 684 wrote to memory of 2916 684 oneetx.exe 132 PID 684 wrote to memory of 2500 684 oneetx.exe 138 PID 684 wrote to memory of 2500 684 oneetx.exe 138 PID 684 wrote to memory of 2500 684 oneetx.exe 138 PID 2500 wrote to memory of 760 2500 cmd.exe 142 PID 2500 wrote to memory of 760 2500 cmd.exe 142 PID 2500 wrote to memory of 760 2500 cmd.exe 142 PID 2500 wrote to memory of 436 2500 cmd.exe 143 PID 2500 wrote to memory of 436 2500 cmd.exe 143 PID 2500 wrote to memory of 436 2500 cmd.exe 143 PID 2500 wrote to memory of 1976 2500 cmd.exe 144 PID 2500 wrote to memory of 1976 2500 cmd.exe 144 PID 2500 wrote to memory of 1976 2500 cmd.exe 144 PID 2500 wrote to memory of 2372 2500 cmd.exe 145 PID 2500 wrote to memory of 2372 2500 cmd.exe 145 PID 2500 wrote to memory of 2372 2500 cmd.exe 145 PID 2500 wrote to memory of 5028 2500 cmd.exe 146 PID 2500 wrote to memory of 5028 2500 cmd.exe 146 PID 2500 wrote to memory of 5028 2500 cmd.exe 146 PID 2500 wrote to memory of 1484 2500 cmd.exe 147 PID 2500 wrote to memory of 1484 2500 cmd.exe 147 PID 2500 wrote to memory of 1484 2500 cmd.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe"C:\Users\Admin\AppData\Local\Temp\b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 5722⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6722⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7322⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7402⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7402⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 8602⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 10962⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 11082⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 12122⤵
- Program crash
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 5963⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 7643⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 8283⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 8083⤵
- Program crash
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 9803⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 9803⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 9843⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 9283⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 6683⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 8043⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 7763⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 6443⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 11523⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 9723⤵
- Program crash
PID:4732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 8162⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2348 -ip 23481⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2348 -ip 23481⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2348 -ip 23481⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2348 -ip 23481⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2348 -ip 23481⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2348 -ip 23481⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2348 -ip 23481⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2348 -ip 23481⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2348 -ip 23481⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2348 -ip 23481⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 684 -ip 6841⤵PID:1760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 684 -ip 6841⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 684 -ip 6841⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 684 -ip 6841⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 684 -ip 6841⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 684 -ip 6841⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 684 -ip 6841⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 684 -ip 6841⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 684 -ip 6841⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 684 -ip 6841⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 684 -ip 6841⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 684 -ip 6841⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 684 -ip 6841⤵PID:884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 684 -ip 6841⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 4202⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2848 -ip 28481⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a75f7ea987308049a22317140476bb40
SHA198533dbd1ffb72bdaa0077294d2d119700009c0f
SHA256b273326184c376738fa6ba699dadee009e2f28ae74da04ed449179f99a2eef49
SHA512822cb6c44009f7c42e419d905ac24d866a30ed677fea44d8b9dacaa351f4d13a6aa01ef79931c5427d8f9a41ea70b2637266784910cebe7d8b7024e41eb43950