Analysis
-
max time kernel
116s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe
Resource
win7-20240903-en
General
-
Target
70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe
-
Size
376KB
-
MD5
d0b636406ad2a70bc4fac633d8a022d0
-
SHA1
f9ec412a5bcaec6e22c8c102c7eebf867cc6b045
-
SHA256
70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119
-
SHA512
b471452ed6b244ae2907f585f91f54f68e0564032a07c14851872fe58d241e7340b825ec4eba085ecff95ca9c11241971fe4d8f24a1d1f4ee00216d11abbab33
-
SSDEEP
6144:JhHsaHFCRV7cNBhQU1A4QukID8DiR7aQFu:JhHxHFCRtU2QA4QpID3JF
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4304 oneetx.exe 4344 oneetx.exe 3252 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
pid pid_target Process procid_target 4968 448 WerFault.exe 82 4840 448 WerFault.exe 82 2072 448 WerFault.exe 82 4556 448 WerFault.exe 82 3764 448 WerFault.exe 82 2440 448 WerFault.exe 82 4828 448 WerFault.exe 82 2480 448 WerFault.exe 82 5028 448 WerFault.exe 82 1752 448 WerFault.exe 82 2244 4304 WerFault.exe 109 4676 4304 WerFault.exe 109 4992 4304 WerFault.exe 109 3564 4304 WerFault.exe 109 656 4304 WerFault.exe 109 2288 4304 WerFault.exe 109 4332 4304 WerFault.exe 109 4548 4304 WerFault.exe 109 3440 4304 WerFault.exe 109 4840 4304 WerFault.exe 109 3848 4304 WerFault.exe 109 2176 4304 WerFault.exe 109 4472 4304 WerFault.exe 109 5020 4304 WerFault.exe 109 656 4304 WerFault.exe 109 3748 4344 WerFault.exe 161 4200 3252 WerFault.exe 165 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2504 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 448 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 448 wrote to memory of 4304 448 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 109 PID 448 wrote to memory of 4304 448 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 109 PID 448 wrote to memory of 4304 448 70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe 109 PID 4304 wrote to memory of 2504 4304 oneetx.exe 128 PID 4304 wrote to memory of 2504 4304 oneetx.exe 128 PID 4304 wrote to memory of 2504 4304 oneetx.exe 128 PID 4304 wrote to memory of 1180 4304 oneetx.exe 134 PID 4304 wrote to memory of 1180 4304 oneetx.exe 134 PID 4304 wrote to memory of 1180 4304 oneetx.exe 134 PID 1180 wrote to memory of 3472 1180 cmd.exe 138 PID 1180 wrote to memory of 3472 1180 cmd.exe 138 PID 1180 wrote to memory of 3472 1180 cmd.exe 138 PID 1180 wrote to memory of 384 1180 cmd.exe 139 PID 1180 wrote to memory of 384 1180 cmd.exe 139 PID 1180 wrote to memory of 384 1180 cmd.exe 139 PID 1180 wrote to memory of 1020 1180 cmd.exe 140 PID 1180 wrote to memory of 1020 1180 cmd.exe 140 PID 1180 wrote to memory of 1020 1180 cmd.exe 140 PID 1180 wrote to memory of 3064 1180 cmd.exe 141 PID 1180 wrote to memory of 3064 1180 cmd.exe 141 PID 1180 wrote to memory of 3064 1180 cmd.exe 141 PID 1180 wrote to memory of 1008 1180 cmd.exe 142 PID 1180 wrote to memory of 1008 1180 cmd.exe 142 PID 1180 wrote to memory of 1008 1180 cmd.exe 142 PID 1180 wrote to memory of 4556 1180 cmd.exe 143 PID 1180 wrote to memory of 4556 1180 cmd.exe 143 PID 1180 wrote to memory of 4556 1180 cmd.exe 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe"C:\Users\Admin\AppData\Local\Temp\70251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 5642⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 6442⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 7242⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 8162⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 8442⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 7322⤵
- Program crash
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 11122⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 11402⤵
- Program crash
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 12122⤵
- Program crash
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 5843⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 7763⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 8523⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 9803⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 8483⤵
- Program crash
PID:656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 8483⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 9723⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 9163⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 5843⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6483⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6723⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6203⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 12003⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 13243⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 10043⤵
- Program crash
PID:656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 13202⤵
- Program crash
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 448 -ip 4481⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 448 -ip 4481⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 448 -ip 4481⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 448 -ip 4481⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 448 -ip 4481⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 448 -ip 4481⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 448 -ip 4481⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 448 -ip 4481⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 448 -ip 4481⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 448 -ip 4481⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4304 -ip 43041⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4304 -ip 43041⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4304 -ip 43041⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4304 -ip 43041⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4304 -ip 43041⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4304 -ip 43041⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4304 -ip 43041⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4304 -ip 43041⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4304 -ip 43041⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4304 -ip 43041⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4304 -ip 43041⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4304 -ip 43041⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4304 -ip 43041⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4304 -ip 43041⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4304 -ip 43041⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 3162⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4344 -ip 43441⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 3122⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3252 -ip 32521⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD5d0b636406ad2a70bc4fac633d8a022d0
SHA1f9ec412a5bcaec6e22c8c102c7eebf867cc6b045
SHA25670251da0e5bd76498c67c25ee8c7bb0cb538080ccd3acf74acb7f6eae1af1119
SHA512b471452ed6b244ae2907f585f91f54f68e0564032a07c14851872fe58d241e7340b825ec4eba085ecff95ca9c11241971fe4d8f24a1d1f4ee00216d11abbab33