Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe
Resource
win7-20240903-en
General
-
Target
fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe
-
Size
383KB
-
MD5
fadce53b46151704d5689113280b2813
-
SHA1
e20f02fdc0b7829ebc5942672e1b1442e65a056d
-
SHA256
fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a
-
SHA512
fa0213d681dbbcb3e475844c6d77fd68fb3f0212673c8bcda2b266578973a8b87168eead019f6501715e2117bdf8f592137f5c050bab1e75d27e5e8e64a984e2
-
SSDEEP
6144:1/AyOER4u8Lvj+9JNGoQGXZcnufnLPNJ5J1b59U9fBCmRJ:1/A5A4TLr+lG5wUqnLPn5Jt5aBbJ
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4180 oneetx.exe 2160 oneetx.exe 4500 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 1512 2672 WerFault.exe 82 3144 2672 WerFault.exe 82 3148 2672 WerFault.exe 82 2432 2672 WerFault.exe 82 3384 2672 WerFault.exe 82 244 2672 WerFault.exe 82 2828 2672 WerFault.exe 82 940 2672 WerFault.exe 82 1952 2672 WerFault.exe 82 3356 2672 WerFault.exe 82 636 4180 WerFault.exe 109 3844 4180 WerFault.exe 109 3136 4180 WerFault.exe 109 2596 4180 WerFault.exe 109 2192 4180 WerFault.exe 109 5088 4180 WerFault.exe 109 1864 4180 WerFault.exe 109 3552 4180 WerFault.exe 109 1308 4180 WerFault.exe 109 2148 4180 WerFault.exe 109 4880 4180 WerFault.exe 109 4864 4180 WerFault.exe 109 4052 4180 WerFault.exe 109 2296 4180 WerFault.exe 109 1080 2160 WerFault.exe 156 2208 4500 WerFault.exe 159 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4180 2672 fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe 109 PID 2672 wrote to memory of 4180 2672 fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe 109 PID 2672 wrote to memory of 4180 2672 fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe 109 PID 4180 wrote to memory of 5036 4180 oneetx.exe 128 PID 4180 wrote to memory of 5036 4180 oneetx.exe 128 PID 4180 wrote to memory of 5036 4180 oneetx.exe 128 PID 4180 wrote to memory of 2612 4180 oneetx.exe 134 PID 4180 wrote to memory of 2612 4180 oneetx.exe 134 PID 4180 wrote to memory of 2612 4180 oneetx.exe 134 PID 2612 wrote to memory of 1872 2612 cmd.exe 138 PID 2612 wrote to memory of 1872 2612 cmd.exe 138 PID 2612 wrote to memory of 1872 2612 cmd.exe 138 PID 2612 wrote to memory of 4884 2612 cmd.exe 139 PID 2612 wrote to memory of 4884 2612 cmd.exe 139 PID 2612 wrote to memory of 4884 2612 cmd.exe 139 PID 2612 wrote to memory of 3060 2612 cmd.exe 140 PID 2612 wrote to memory of 3060 2612 cmd.exe 140 PID 2612 wrote to memory of 3060 2612 cmd.exe 140 PID 2612 wrote to memory of 2896 2612 cmd.exe 141 PID 2612 wrote to memory of 2896 2612 cmd.exe 141 PID 2612 wrote to memory of 2896 2612 cmd.exe 141 PID 2612 wrote to memory of 5040 2612 cmd.exe 142 PID 2612 wrote to memory of 5040 2612 cmd.exe 142 PID 2612 wrote to memory of 5040 2612 cmd.exe 142 PID 2612 wrote to memory of 5000 2612 cmd.exe 143 PID 2612 wrote to memory of 5000 2612 cmd.exe 143 PID 2612 wrote to memory of 5000 2612 cmd.exe 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe"C:\Users\Admin\AppData\Local\Temp\fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 5602⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 6442⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 7202⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 8442⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 8802⤵
- Program crash
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 8442⤵
- Program crash
PID:244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 11042⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 11282⤵
- Program crash
PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 12162⤵
- Program crash
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 5883⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 7283⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 7843⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 9443⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 9443⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 9443⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 9923⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 8883⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 12003⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 6603⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 6643⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 8883⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 8043⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 9963⤵
- Program crash
PID:2296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 12642⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2672 -ip 26721⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2672 -ip 26721⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2672 -ip 26721⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2672 -ip 26721⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2672 -ip 26721⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2672 -ip 26721⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2672 -ip 26721⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2672 -ip 26721⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2672 -ip 26721⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2672 -ip 26721⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4180 -ip 41801⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4180 -ip 41801⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4180 -ip 41801⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4180 -ip 41801⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4180 -ip 41801⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4180 -ip 41801⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4180 -ip 41801⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4180 -ip 41801⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4180 -ip 41801⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4180 -ip 41801⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4180 -ip 41801⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4180 -ip 41801⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4180 -ip 41801⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4180 -ip 41801⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 3162⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2160 -ip 21601⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 3162⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4500 -ip 45001⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5fadce53b46151704d5689113280b2813
SHA1e20f02fdc0b7829ebc5942672e1b1442e65a056d
SHA256fec7590de20dc03464f8357e5a97b89b4a624570eb2327f6ca4623ca925fcb3a
SHA512fa0213d681dbbcb3e475844c6d77fd68fb3f0212673c8bcda2b266578973a8b87168eead019f6501715e2117bdf8f592137f5c050bab1e75d27e5e8e64a984e2