Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/11/2024, 18:32
Behavioral task
behavioral1
Sample
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe
Resource
win10v2004-20241007-en
General
-
Target
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe
-
Size
213KB
-
MD5
32e6b3672eab46ff84ef46c7f69de519
-
SHA1
e64c15e987d9f46540cc79567e26d6572623a068
-
SHA256
fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9
-
SHA512
ed4da348f9690c31db424c2ebc689a9c4d6784276a2bd7c314e937aee9ce91b48394dcaa7c0b3c277aa7533c31f709099732ad99e9a038a23b07435514584033
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmhf:5Cswq+AXYu7HGOSuZAlAILjqf
Malware Config
Extracted
amadey
3.81
f9a925
http://77.91.124.20
-
install_dir
c3912af058
-
install_file
oneetx.exe
-
strings_key
0504ce46646b0dc397a3c30d6692ec75
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 1512 oneetx.exe 2976 oneetx.exe 1704 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2292 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1512 2292 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 31 PID 2292 wrote to memory of 1512 2292 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 31 PID 2292 wrote to memory of 1512 2292 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 31 PID 2292 wrote to memory of 1512 2292 fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe 31 PID 1512 wrote to memory of 2932 1512 oneetx.exe 32 PID 1512 wrote to memory of 2932 1512 oneetx.exe 32 PID 1512 wrote to memory of 2932 1512 oneetx.exe 32 PID 1512 wrote to memory of 2932 1512 oneetx.exe 32 PID 1512 wrote to memory of 2388 1512 oneetx.exe 34 PID 1512 wrote to memory of 2388 1512 oneetx.exe 34 PID 1512 wrote to memory of 2388 1512 oneetx.exe 34 PID 1512 wrote to memory of 2388 1512 oneetx.exe 34 PID 2388 wrote to memory of 2772 2388 cmd.exe 36 PID 2388 wrote to memory of 2772 2388 cmd.exe 36 PID 2388 wrote to memory of 2772 2388 cmd.exe 36 PID 2388 wrote to memory of 2772 2388 cmd.exe 36 PID 2388 wrote to memory of 2800 2388 cmd.exe 37 PID 2388 wrote to memory of 2800 2388 cmd.exe 37 PID 2388 wrote to memory of 2800 2388 cmd.exe 37 PID 2388 wrote to memory of 2800 2388 cmd.exe 37 PID 2388 wrote to memory of 2844 2388 cmd.exe 38 PID 2388 wrote to memory of 2844 2388 cmd.exe 38 PID 2388 wrote to memory of 2844 2388 cmd.exe 38 PID 2388 wrote to memory of 2844 2388 cmd.exe 38 PID 2388 wrote to memory of 2868 2388 cmd.exe 39 PID 2388 wrote to memory of 2868 2388 cmd.exe 39 PID 2388 wrote to memory of 2868 2388 cmd.exe 39 PID 2388 wrote to memory of 2868 2388 cmd.exe 39 PID 2388 wrote to memory of 2864 2388 cmd.exe 40 PID 2388 wrote to memory of 2864 2388 cmd.exe 40 PID 2388 wrote to memory of 2864 2388 cmd.exe 40 PID 2388 wrote to memory of 2864 2388 cmd.exe 40 PID 2388 wrote to memory of 2796 2388 cmd.exe 41 PID 2388 wrote to memory of 2796 2388 cmd.exe 41 PID 2388 wrote to memory of 2796 2388 cmd.exe 41 PID 2388 wrote to memory of 2796 2388 cmd.exe 41 PID 2036 wrote to memory of 2976 2036 taskeng.exe 44 PID 2036 wrote to memory of 2976 2036 taskeng.exe 44 PID 2036 wrote to memory of 2976 2036 taskeng.exe 44 PID 2036 wrote to memory of 2976 2036 taskeng.exe 44 PID 2036 wrote to memory of 1704 2036 taskeng.exe 46 PID 2036 wrote to memory of 1704 2036 taskeng.exe 46 PID 2036 wrote to memory of 1704 2036 taskeng.exe 46 PID 2036 wrote to memory of 1704 2036 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe"C:\Users\Admin\AppData\Local\Temp\fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A9D464A3-3561-4C75-9FA4-A80918A8DEF8} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD532e6b3672eab46ff84ef46c7f69de519
SHA1e64c15e987d9f46540cc79567e26d6572623a068
SHA256fc332898ea9d95f664ec13270fbceefb8ad4900a3ac4a98a9dbf948722235db9
SHA512ed4da348f9690c31db424c2ebc689a9c4d6784276a2bd7c314e937aee9ce91b48394dcaa7c0b3c277aa7533c31f709099732ad99e9a038a23b07435514584033