Analysis
-
max time kernel
120s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 11:33
Behavioral task
behavioral1
Sample
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe
Resource
win10v2004-20241007-en
General
-
Target
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe
-
Size
204KB
-
MD5
52e2b4b73b6aae15dda11b813dcb42b0
-
SHA1
d65bae062cda551497861d7c3df365b5a50135d6
-
SHA256
ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23
-
SHA512
0486c9c8313b3f3c4095a4f6af06fdf6e696d755a5de59241bf27c4b1984a58771f09086f58f8e467e71f05f51f70405f250e760af71d2588e2ad5a141ff4994
-
SSDEEP
3072:c/frTDzurT1S3CzpdmnATE55zjExkKGruONMvhu5QTXzeJX2vkMfSDPwU:Wfrnzurs3Czpexj2kGOIu5QTyJMKk
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2076 oneetx.exe 2192 oneetx.exe 1636 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2076 2188 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 30 PID 2188 wrote to memory of 2076 2188 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 30 PID 2188 wrote to memory of 2076 2188 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 30 PID 2188 wrote to memory of 2076 2188 ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe 30 PID 2076 wrote to memory of 2108 2076 oneetx.exe 31 PID 2076 wrote to memory of 2108 2076 oneetx.exe 31 PID 2076 wrote to memory of 2108 2076 oneetx.exe 31 PID 2076 wrote to memory of 2108 2076 oneetx.exe 31 PID 2076 wrote to memory of 368 2076 oneetx.exe 33 PID 2076 wrote to memory of 368 2076 oneetx.exe 33 PID 2076 wrote to memory of 368 2076 oneetx.exe 33 PID 2076 wrote to memory of 368 2076 oneetx.exe 33 PID 368 wrote to memory of 2768 368 cmd.exe 35 PID 368 wrote to memory of 2768 368 cmd.exe 35 PID 368 wrote to memory of 2768 368 cmd.exe 35 PID 368 wrote to memory of 2768 368 cmd.exe 35 PID 368 wrote to memory of 2532 368 cmd.exe 36 PID 368 wrote to memory of 2532 368 cmd.exe 36 PID 368 wrote to memory of 2532 368 cmd.exe 36 PID 368 wrote to memory of 2532 368 cmd.exe 36 PID 368 wrote to memory of 1692 368 cmd.exe 37 PID 368 wrote to memory of 1692 368 cmd.exe 37 PID 368 wrote to memory of 1692 368 cmd.exe 37 PID 368 wrote to memory of 1692 368 cmd.exe 37 PID 368 wrote to memory of 2808 368 cmd.exe 38 PID 368 wrote to memory of 2808 368 cmd.exe 38 PID 368 wrote to memory of 2808 368 cmd.exe 38 PID 368 wrote to memory of 2808 368 cmd.exe 38 PID 368 wrote to memory of 2872 368 cmd.exe 39 PID 368 wrote to memory of 2872 368 cmd.exe 39 PID 368 wrote to memory of 2872 368 cmd.exe 39 PID 368 wrote to memory of 2872 368 cmd.exe 39 PID 368 wrote to memory of 2892 368 cmd.exe 40 PID 368 wrote to memory of 2892 368 cmd.exe 40 PID 368 wrote to memory of 2892 368 cmd.exe 40 PID 368 wrote to memory of 2892 368 cmd.exe 40 PID 2724 wrote to memory of 2192 2724 taskeng.exe 44 PID 2724 wrote to memory of 2192 2724 taskeng.exe 44 PID 2724 wrote to memory of 2192 2724 taskeng.exe 44 PID 2724 wrote to memory of 2192 2724 taskeng.exe 44 PID 2724 wrote to memory of 1636 2724 taskeng.exe 45 PID 2724 wrote to memory of 1636 2724 taskeng.exe 45 PID 2724 wrote to memory of 1636 2724 taskeng.exe 45 PID 2724 wrote to memory of 1636 2724 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe"C:\Users\Admin\AppData\Local\Temp\ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2980CF3F-3EBA-4964-9549-FB031DC3B32E} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD552e2b4b73b6aae15dda11b813dcb42b0
SHA1d65bae062cda551497861d7c3df365b5a50135d6
SHA256ee3d7893f18fddee62ed4f2ddcfce045ac49f277e04702ece3bed63f42068f23
SHA5120486c9c8313b3f3c4095a4f6af06fdf6e696d755a5de59241bf27c4b1984a58771f09086f58f8e467e71f05f51f70405f250e760af71d2588e2ad5a141ff4994