Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe
Resource
win7-20240903-en
General
-
Target
b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe
-
Size
256KB
-
MD5
2f7debab43b9db74bbd60708f155ef40
-
SHA1
a75296eba09028bced052ebc6a3416c9b7679649
-
SHA256
b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6d
-
SHA512
1bc150cea98724e61c9e52f001225c9bb559b935b89d53176bccb5043646314595895c72cdbe756a605048ded2344b5f17e07f350ea4f5e6dee21c2a193b2050
-
SSDEEP
3072:w7BLpftyof4L1K8vg76p6iNNmtTnIirsuf2ESts5f0eltTuwYPDpJKJRfu/:6FOlIxSNYIkeltqdltTYPDWJk
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 1196 oneetx.exe 2792 oneetx.exe 2088 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
pid pid_target Process procid_target 1624 5032 WerFault.exe 82 3300 5032 WerFault.exe 82 1420 5032 WerFault.exe 82 1216 5032 WerFault.exe 82 4060 5032 WerFault.exe 82 2100 5032 WerFault.exe 82 4468 5032 WerFault.exe 82 4780 5032 WerFault.exe 82 4848 5032 WerFault.exe 82 2508 5032 WerFault.exe 82 3484 1196 WerFault.exe 111 1912 1196 WerFault.exe 111 4176 1196 WerFault.exe 111 3620 1196 WerFault.exe 111 2424 1196 WerFault.exe 111 2840 1196 WerFault.exe 111 5004 1196 WerFault.exe 111 2268 1196 WerFault.exe 111 444 1196 WerFault.exe 111 1184 1196 WerFault.exe 111 4112 1196 WerFault.exe 111 212 1196 WerFault.exe 111 3600 1196 WerFault.exe 111 4524 1196 WerFault.exe 111 5032 2792 WerFault.exe 158 2856 1196 WerFault.exe 111 4880 2088 WerFault.exe 167 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5032 b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5032 wrote to memory of 1196 5032 b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe 111 PID 5032 wrote to memory of 1196 5032 b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe 111 PID 5032 wrote to memory of 1196 5032 b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe 111 PID 1196 wrote to memory of 2088 1196 oneetx.exe 132 PID 1196 wrote to memory of 2088 1196 oneetx.exe 132 PID 1196 wrote to memory of 2088 1196 oneetx.exe 132 PID 1196 wrote to memory of 3680 1196 oneetx.exe 138 PID 1196 wrote to memory of 3680 1196 oneetx.exe 138 PID 1196 wrote to memory of 3680 1196 oneetx.exe 138 PID 3680 wrote to memory of 3504 3680 cmd.exe 142 PID 3680 wrote to memory of 3504 3680 cmd.exe 142 PID 3680 wrote to memory of 3504 3680 cmd.exe 142 PID 3680 wrote to memory of 2520 3680 cmd.exe 143 PID 3680 wrote to memory of 2520 3680 cmd.exe 143 PID 3680 wrote to memory of 2520 3680 cmd.exe 143 PID 3680 wrote to memory of 2560 3680 cmd.exe 144 PID 3680 wrote to memory of 2560 3680 cmd.exe 144 PID 3680 wrote to memory of 2560 3680 cmd.exe 144 PID 3680 wrote to memory of 5092 3680 cmd.exe 145 PID 3680 wrote to memory of 5092 3680 cmd.exe 145 PID 3680 wrote to memory of 5092 3680 cmd.exe 145 PID 3680 wrote to memory of 4144 3680 cmd.exe 146 PID 3680 wrote to memory of 4144 3680 cmd.exe 146 PID 3680 wrote to memory of 4144 3680 cmd.exe 146 PID 3680 wrote to memory of 1216 3680 cmd.exe 147 PID 3680 wrote to memory of 1216 3680 cmd.exe 147 PID 3680 wrote to memory of 1216 3680 cmd.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe"C:\Users\Admin\AppData\Local\Temp\b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6dN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 5762⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 6682⤵
- Program crash
PID:3300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 7202⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 7282⤵
- Program crash
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 8282⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 8282⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 11042⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 11122⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 12122⤵
- Program crash
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 5963⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 8243⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 8283⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 8243⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 9843⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 10163⤵
- Program crash
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 10123⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 10203⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 9043⤵
- Program crash
PID:444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 6483⤵
- Program crash
PID:1184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 12003⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 6563⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 12083⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 6363⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 10003⤵
- Program crash
PID:2856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 6202⤵
- Program crash
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5032 -ip 50321⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5032 -ip 50321⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5032 -ip 50321⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5032 -ip 50321⤵PID:880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5032 -ip 50321⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5032 -ip 50321⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5032 -ip 50321⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5032 -ip 50321⤵PID:1036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5032 -ip 50321⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5032 -ip 50321⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1196 -ip 11961⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1196 -ip 11961⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1196 -ip 11961⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1196 -ip 11961⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1196 -ip 11961⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1196 -ip 11961⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1196 -ip 11961⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1196 -ip 11961⤵PID:324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1196 -ip 11961⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1196 -ip 11961⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1196 -ip 11961⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1196 -ip 11961⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1196 -ip 11961⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1196 -ip 11961⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 4282⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2792 -ip 27921⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1196 -ip 11961⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 4202⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2088 -ip 20881⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD52f7debab43b9db74bbd60708f155ef40
SHA1a75296eba09028bced052ebc6a3416c9b7679649
SHA256b58e34b07e1fdce5e7143860bb0d52e5d9b865de5c4929f648c5bd8f5a62fe6d
SHA5121bc150cea98724e61c9e52f001225c9bb559b935b89d53176bccb5043646314595895c72cdbe756a605048ded2344b5f17e07f350ea4f5e6dee21c2a193b2050