Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe
Resource
win7-20240903-en
General
-
Target
78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe
-
Size
256KB
-
MD5
8f0e0ac73cd7f1b8058372d714cd68da
-
SHA1
ec79e3da7f0c263437f18001343d6a1043914fb7
-
SHA256
78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8
-
SHA512
39c22ddb7462a2c0a114c6e8ffbe5fbfaf8a77699a82574bd0cebf01f417b3bb5c6c96e889f94e641d7976905f7fd9e54bd7138c56225313751c2834ca233442
-
SSDEEP
3072:Z/MnwnqSiQunb5x8BAG8nweqXnzIL6qvUsbqC6N25/jAtwYPDpJKJRfyIL:NaJSvMjwjwDw8MqYPDWJF
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 4284 oneetx.exe 4516 oneetx.exe 3864 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 1988 4164 WerFault.exe 82 3152 4164 WerFault.exe 82 4948 4164 WerFault.exe 82 2064 4164 WerFault.exe 82 1172 4164 WerFault.exe 82 2976 4164 WerFault.exe 82 2836 4164 WerFault.exe 82 2696 4164 WerFault.exe 82 676 4164 WerFault.exe 82 2504 4164 WerFault.exe 82 916 4284 WerFault.exe 109 4516 4284 WerFault.exe 109 1368 4284 WerFault.exe 109 1448 4284 WerFault.exe 109 3268 4284 WerFault.exe 109 4448 4284 WerFault.exe 109 4640 4284 WerFault.exe 109 2060 4284 WerFault.exe 109 2720 4284 WerFault.exe 109 4340 4284 WerFault.exe 109 3088 4284 WerFault.exe 109 5020 4284 WerFault.exe 109 4928 4284 WerFault.exe 109 2164 4516 WerFault.exe 159 3900 4284 WerFault.exe 109 4060 3864 WerFault.exe 165 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4164 78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4284 4164 78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe 109 PID 4164 wrote to memory of 4284 4164 78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe 109 PID 4164 wrote to memory of 4284 4164 78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe 109 PID 4284 wrote to memory of 2016 4284 oneetx.exe 131 PID 4284 wrote to memory of 2016 4284 oneetx.exe 131 PID 4284 wrote to memory of 2016 4284 oneetx.exe 131 PID 4284 wrote to memory of 4948 4284 oneetx.exe 137 PID 4284 wrote to memory of 4948 4284 oneetx.exe 137 PID 4284 wrote to memory of 4948 4284 oneetx.exe 137 PID 4948 wrote to memory of 2324 4948 cmd.exe 141 PID 4948 wrote to memory of 2324 4948 cmd.exe 141 PID 4948 wrote to memory of 2324 4948 cmd.exe 141 PID 4948 wrote to memory of 4776 4948 cmd.exe 142 PID 4948 wrote to memory of 4776 4948 cmd.exe 142 PID 4948 wrote to memory of 4776 4948 cmd.exe 142 PID 4948 wrote to memory of 2760 4948 cmd.exe 143 PID 4948 wrote to memory of 2760 4948 cmd.exe 143 PID 4948 wrote to memory of 2760 4948 cmd.exe 143 PID 4948 wrote to memory of 2472 4948 cmd.exe 144 PID 4948 wrote to memory of 2472 4948 cmd.exe 144 PID 4948 wrote to memory of 2472 4948 cmd.exe 144 PID 4948 wrote to memory of 1476 4948 cmd.exe 145 PID 4948 wrote to memory of 1476 4948 cmd.exe 145 PID 4948 wrote to memory of 1476 4948 cmd.exe 145 PID 4948 wrote to memory of 2308 4948 cmd.exe 146 PID 4948 wrote to memory of 2308 4948 cmd.exe 146 PID 4948 wrote to memory of 2308 4948 cmd.exe 146
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe"C:\Users\Admin\AppData\Local\Temp\78c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 5602⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 6442⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 7362⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 8442⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 8522⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 8722⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 11122⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 11522⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 11922⤵
- Program crash
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6003⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 7323⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 9123⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 9963⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 9043⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 9043⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 9723⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 8883⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6483⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 11843⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 8083⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 11763⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6763⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 9843⤵
- Program crash
PID:3900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 12562⤵
- Program crash
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4164 -ip 41641⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4164 -ip 41641⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 41641⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4164 -ip 41641⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4164 -ip 41641⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4164 -ip 41641⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4164 -ip 41641⤵PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4164 -ip 41641⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4164 -ip 41641⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4164 -ip 41641⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4284 -ip 42841⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4284 -ip 42841⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4284 -ip 42841⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4284 -ip 42841⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4284 -ip 42841⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4284 -ip 42841⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4284 -ip 42841⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4284 -ip 42841⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4284 -ip 42841⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4284 -ip 42841⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4284 -ip 42841⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4284 -ip 42841⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4284 -ip 42841⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 4282⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4516 -ip 45161⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4284 -ip 42841⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 4242⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3864 -ip 38641⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD58f0e0ac73cd7f1b8058372d714cd68da
SHA1ec79e3da7f0c263437f18001343d6a1043914fb7
SHA25678c7d1ebb14166ecbfda80c426f6a814628ecf9c9dbf7f599dc4fb5efa187ea8
SHA51239c22ddb7462a2c0a114c6e8ffbe5fbfaf8a77699a82574bd0cebf01f417b3bb5c6c96e889f94e641d7976905f7fd9e54bd7138c56225313751c2834ca233442