Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe
Resource
win7-20241023-en
General
-
Target
9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe
-
Size
370KB
-
MD5
f8fd5f898e93865d05b9a1f1fa4ebd80
-
SHA1
98612f75f363ef5eeaa44bbc626f6d3f13c2ded0
-
SHA256
9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95f
-
SHA512
4e15d148ed932b430b3d9ae61d80dc9a19988bdccc4038c86ebc829a9297493659d917ccae6a8f875f0d88e6bd99c9b4c0ad64702af82f448a3a24d6459850ba
-
SSDEEP
6144:Cl/wSz9XIMjyTze/Wb5I0HtzvvdIKcsuR4ptBmRmcPMGaKHP7:CltR4M8zsiHhtInVR4pJc5P7
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4596 oneetx.exe 64 oneetx.exe 4352 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
pid pid_target Process procid_target 4684 3400 WerFault.exe 82 3564 3400 WerFault.exe 82 3112 3400 WerFault.exe 82 3832 3400 WerFault.exe 82 4432 3400 WerFault.exe 82 4056 3400 WerFault.exe 82 4956 3400 WerFault.exe 82 2412 3400 WerFault.exe 82 1724 3400 WerFault.exe 82 2676 3400 WerFault.exe 82 4588 4596 WerFault.exe 109 896 4596 WerFault.exe 109 3472 4596 WerFault.exe 109 1400 4596 WerFault.exe 109 220 4596 WerFault.exe 109 2424 4596 WerFault.exe 109 4516 4596 WerFault.exe 109 4004 4596 WerFault.exe 109 4852 4596 WerFault.exe 109 1872 4596 WerFault.exe 109 4624 4596 WerFault.exe 109 4432 4596 WerFault.exe 109 716 4596 WerFault.exe 109 4956 4596 WerFault.exe 109 4312 4596 WerFault.exe 109 2344 64 WerFault.exe 157 2184 4352 WerFault.exe 160 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3356 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3400 9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4596 3400 9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe 109 PID 3400 wrote to memory of 4596 3400 9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe 109 PID 3400 wrote to memory of 4596 3400 9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe 109 PID 4596 wrote to memory of 3356 4596 oneetx.exe 127 PID 4596 wrote to memory of 3356 4596 oneetx.exe 127 PID 4596 wrote to memory of 3356 4596 oneetx.exe 127 PID 4596 wrote to memory of 2228 4596 oneetx.exe 133 PID 4596 wrote to memory of 2228 4596 oneetx.exe 133 PID 4596 wrote to memory of 2228 4596 oneetx.exe 133 PID 2228 wrote to memory of 3708 2228 cmd.exe 137 PID 2228 wrote to memory of 3708 2228 cmd.exe 137 PID 2228 wrote to memory of 3708 2228 cmd.exe 137 PID 2228 wrote to memory of 2996 2228 cmd.exe 138 PID 2228 wrote to memory of 2996 2228 cmd.exe 138 PID 2228 wrote to memory of 2996 2228 cmd.exe 138 PID 2228 wrote to memory of 4468 2228 cmd.exe 139 PID 2228 wrote to memory of 4468 2228 cmd.exe 139 PID 2228 wrote to memory of 4468 2228 cmd.exe 139 PID 2228 wrote to memory of 3456 2228 cmd.exe 140 PID 2228 wrote to memory of 3456 2228 cmd.exe 140 PID 2228 wrote to memory of 3456 2228 cmd.exe 140 PID 2228 wrote to memory of 1960 2228 cmd.exe 141 PID 2228 wrote to memory of 1960 2228 cmd.exe 141 PID 2228 wrote to memory of 1960 2228 cmd.exe 141 PID 2228 wrote to memory of 4928 2228 cmd.exe 142 PID 2228 wrote to memory of 4928 2228 cmd.exe 142 PID 2228 wrote to memory of 4928 2228 cmd.exe 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe"C:\Users\Admin\AppData\Local\Temp\9bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95fN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 5602⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 6442⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 7002⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 6722⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 7682⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 8322⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 11002⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 11322⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 11842⤵
- Program crash
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 5843⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 7083⤵
- Program crash
PID:896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 8043⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9443⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9843⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9843⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 10163⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 8883⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 6683⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 6563⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 10963⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 6523⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 6483⤵
- Program crash
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 13563⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9803⤵
- Program crash
PID:4312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 13202⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3400 -ip 34001⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3400 -ip 34001⤵PID:2624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3400 -ip 34001⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3400 -ip 34001⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3400 -ip 34001⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3400 -ip 34001⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3400 -ip 34001⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3400 -ip 34001⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3400 -ip 34001⤵PID:704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3400 -ip 34001⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4596 -ip 45961⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4596 -ip 45961⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4596 -ip 45961⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4596 -ip 45961⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4596 -ip 45961⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4596 -ip 45961⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4596 -ip 45961⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4596 -ip 45961⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4596 -ip 45961⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4596 -ip 45961⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4596 -ip 45961⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4596 -ip 45961⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4596 -ip 45961⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4596 -ip 45961⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4596 -ip 45961⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 3122⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 64 -ip 641⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 3122⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4352 -ip 43521⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5f8fd5f898e93865d05b9a1f1fa4ebd80
SHA198612f75f363ef5eeaa44bbc626f6d3f13c2ded0
SHA2569bed971fdfce1955f44350eb68cf89e2bc406a4a48cb0eda66606fba70b3c95f
SHA5124e15d148ed932b430b3d9ae61d80dc9a19988bdccc4038c86ebc829a9297493659d917ccae6a8f875f0d88e6bd99c9b4c0ad64702af82f448a3a24d6459850ba