Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe
Resource
win7-20240903-en
General
-
Target
1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe
-
Size
384KB
-
MD5
9137f9d8ce642705e5dc6959c9055cc0
-
SHA1
afce9d7a696a15f176386af2f5a3c2b638c01b9e
-
SHA256
1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3
-
SHA512
e5f753a91ddb40ae77df8bed01a19a2ff1bbd5e3339c5b83eeff302b46b94947c1ceebe2472c7fc4aaab83d8e1233027da43532f16bbfc9921794919d714919b
-
SSDEEP
6144:oDQ3brLY+ukCbXUl946oNyFhegHXYK5fQ2T+:8Q3/k+nCbXUH4dyFhegHI4T+
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4596 oneetx.exe 2072 oneetx.exe 4328 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 324 1876 WerFault.exe 82 1704 1876 WerFault.exe 82 2228 1876 WerFault.exe 82 4124 1876 WerFault.exe 82 4876 1876 WerFault.exe 82 420 1876 WerFault.exe 82 212 1876 WerFault.exe 82 4836 1876 WerFault.exe 82 3376 1876 WerFault.exe 82 3288 1876 WerFault.exe 82 3428 4596 WerFault.exe 109 4484 4596 WerFault.exe 109 2968 4596 WerFault.exe 109 4568 4596 WerFault.exe 109 2280 4596 WerFault.exe 109 4740 4596 WerFault.exe 109 4964 4596 WerFault.exe 109 1568 4596 WerFault.exe 109 3820 4596 WerFault.exe 109 224 4596 WerFault.exe 109 4428 4596 WerFault.exe 109 3592 4596 WerFault.exe 109 3504 4596 WerFault.exe 109 1904 4596 WerFault.exe 109 3468 2072 WerFault.exe 163 2532 4328 WerFault.exe 167 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1492 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1876 wrote to memory of 4596 1876 1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe 109 PID 1876 wrote to memory of 4596 1876 1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe 109 PID 1876 wrote to memory of 4596 1876 1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe 109 PID 4596 wrote to memory of 1492 4596 oneetx.exe 130 PID 4596 wrote to memory of 1492 4596 oneetx.exe 130 PID 4596 wrote to memory of 1492 4596 oneetx.exe 130 PID 4596 wrote to memory of 2560 4596 oneetx.exe 136 PID 4596 wrote to memory of 2560 4596 oneetx.exe 136 PID 4596 wrote to memory of 2560 4596 oneetx.exe 136 PID 2560 wrote to memory of 2336 2560 cmd.exe 139 PID 2560 wrote to memory of 2336 2560 cmd.exe 139 PID 2560 wrote to memory of 2336 2560 cmd.exe 139 PID 2560 wrote to memory of 1420 2560 cmd.exe 141 PID 2560 wrote to memory of 1420 2560 cmd.exe 141 PID 2560 wrote to memory of 1420 2560 cmd.exe 141 PID 2560 wrote to memory of 3272 2560 cmd.exe 142 PID 2560 wrote to memory of 3272 2560 cmd.exe 142 PID 2560 wrote to memory of 3272 2560 cmd.exe 142 PID 2560 wrote to memory of 1628 2560 cmd.exe 143 PID 2560 wrote to memory of 1628 2560 cmd.exe 143 PID 2560 wrote to memory of 1628 2560 cmd.exe 143 PID 2560 wrote to memory of 2464 2560 cmd.exe 144 PID 2560 wrote to memory of 2464 2560 cmd.exe 144 PID 2560 wrote to memory of 2464 2560 cmd.exe 144 PID 2560 wrote to memory of 2284 2560 cmd.exe 145 PID 2560 wrote to memory of 2284 2560 cmd.exe 145 PID 2560 wrote to memory of 2284 2560 cmd.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe"C:\Users\Admin\AppData\Local\Temp\1ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 5602⤵
- Program crash
PID:324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 6442⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 7402⤵
- Program crash
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8202⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8362⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8522⤵
- Program crash
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 11082⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 11322⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 12122⤵
- Program crash
PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 5843⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 7563⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 7563⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9443⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9643⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9843⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 10003⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 8883⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 6163⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 12083⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 11963⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 12163⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 12563⤵
- Program crash
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9923⤵
- Program crash
PID:1904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 7482⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1876 -ip 18761⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1876 -ip 18761⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1876 -ip 18761⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1876 -ip 18761⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1876 -ip 18761⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1876 -ip 18761⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1876 -ip 18761⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1876 -ip 18761⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1876 -ip 18761⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1876 -ip 18761⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4596 -ip 45961⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4596 -ip 45961⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4596 -ip 45961⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4596 -ip 45961⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4596 -ip 45961⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4596 -ip 45961⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4596 -ip 45961⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4596 -ip 45961⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4596 -ip 45961⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4596 -ip 45961⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4596 -ip 45961⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4596 -ip 45961⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4596 -ip 45961⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4596 -ip 45961⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 3122⤵
- Program crash
PID:3468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2072 -ip 20721⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 3202⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4328 -ip 43281⤵PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD59137f9d8ce642705e5dc6959c9055cc0
SHA1afce9d7a696a15f176386af2f5a3c2b638c01b9e
SHA2561ce506ce58584a33966bf28c71c18e2acd7d5d5e2fc7e980456c753c7ac0e5f3
SHA512e5f753a91ddb40ae77df8bed01a19a2ff1bbd5e3339c5b83eeff302b46b94947c1ceebe2472c7fc4aaab83d8e1233027da43532f16bbfc9921794919d714919b