Analysis
-
max time kernel
111s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe
Resource
win7-20240903-en
General
-
Target
70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe
-
Size
376KB
-
MD5
d0b636406ad2a70bc4fac633d8a022d0
-
SHA1
f9ec412a5bcaec6e22c8c102c7eebf867cc6b045
-
SHA256
70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119
-
SHA512
b471452ed6b244ae2907f585f91f54f68e0564032a07c14851872fe58d241e7340b825ec4eba085ecff95ca9c11241971fe4d8f24a1d1f4ee00216d11abbab33
-
SSDEEP
6144:JhHsaHFCRV7cNBhQU1A4QukID8DiR7aQFu:JhHxHFCRtU2QA4QpID3JF
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 1796 oneetx.exe 552 oneetx.exe 2876 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1796 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 28 PID 2404 wrote to memory of 1796 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 28 PID 2404 wrote to memory of 1796 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 28 PID 2404 wrote to memory of 1796 2404 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 28 PID 1796 wrote to memory of 1380 1796 oneetx.exe 29 PID 1796 wrote to memory of 1380 1796 oneetx.exe 29 PID 1796 wrote to memory of 1380 1796 oneetx.exe 29 PID 1796 wrote to memory of 1380 1796 oneetx.exe 29 PID 1796 wrote to memory of 1452 1796 oneetx.exe 31 PID 1796 wrote to memory of 1452 1796 oneetx.exe 31 PID 1796 wrote to memory of 1452 1796 oneetx.exe 31 PID 1796 wrote to memory of 1452 1796 oneetx.exe 31 PID 1452 wrote to memory of 2220 1452 cmd.exe 33 PID 1452 wrote to memory of 2220 1452 cmd.exe 33 PID 1452 wrote to memory of 2220 1452 cmd.exe 33 PID 1452 wrote to memory of 2220 1452 cmd.exe 33 PID 1452 wrote to memory of 2216 1452 cmd.exe 34 PID 1452 wrote to memory of 2216 1452 cmd.exe 34 PID 1452 wrote to memory of 2216 1452 cmd.exe 34 PID 1452 wrote to memory of 2216 1452 cmd.exe 34 PID 1452 wrote to memory of 1896 1452 cmd.exe 35 PID 1452 wrote to memory of 1896 1452 cmd.exe 35 PID 1452 wrote to memory of 1896 1452 cmd.exe 35 PID 1452 wrote to memory of 1896 1452 cmd.exe 35 PID 1452 wrote to memory of 2148 1452 cmd.exe 36 PID 1452 wrote to memory of 2148 1452 cmd.exe 36 PID 1452 wrote to memory of 2148 1452 cmd.exe 36 PID 1452 wrote to memory of 2148 1452 cmd.exe 36 PID 1452 wrote to memory of 2008 1452 cmd.exe 37 PID 1452 wrote to memory of 2008 1452 cmd.exe 37 PID 1452 wrote to memory of 2008 1452 cmd.exe 37 PID 1452 wrote to memory of 2008 1452 cmd.exe 37 PID 1452 wrote to memory of 1040 1452 cmd.exe 38 PID 1452 wrote to memory of 1040 1452 cmd.exe 38 PID 1452 wrote to memory of 1040 1452 cmd.exe 38 PID 1452 wrote to memory of 1040 1452 cmd.exe 38 PID 3044 wrote to memory of 552 3044 taskeng.exe 43 PID 3044 wrote to memory of 552 3044 taskeng.exe 43 PID 3044 wrote to memory of 552 3044 taskeng.exe 43 PID 3044 wrote to memory of 552 3044 taskeng.exe 43 PID 3044 wrote to memory of 2876 3044 taskeng.exe 44 PID 3044 wrote to memory of 2876 3044 taskeng.exe 44 PID 3044 wrote to memory of 2876 3044 taskeng.exe 44 PID 3044 wrote to memory of 2876 3044 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe"C:\Users\Admin\AppData\Local\Temp\70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AA02D9A2-3297-48D8-A703-FC026B05101E} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD5d0b636406ad2a70bc4fac633d8a022d0
SHA1f9ec412a5bcaec6e22c8c102c7eebf867cc6b045
SHA25670251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119
SHA512b471452ed6b244ae2907f585f91f54f68e0564032a07c14851872fe58d241e7340b825ec4eba085ecff95ca9c11241971fe4d8f24a1d1f4ee00216d11abbab33