Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe
Resource
win7-20240903-en
General
-
Target
cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe
-
Size
256KB
-
MD5
504b341a1a47cd0efe3138655c8652a4
-
SHA1
6b21d347050e103bdc89e3ac42be3b69cf5c8d2f
-
SHA256
cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb
-
SHA512
0d0109e990e253e0be381831988b2e73d1a031bc8aea38685c229de3ce893844a8f113c0e98e41c9e8dbb0bded4e9b8084216724b7d9e5964293f0dc6a0258a2
-
SSDEEP
3072:fdg2WfgUqxS+dWIMOfdMsdmAYTH/lrsI3tbpxFTY5n5hwYPDpJKJRf8E:1btUstdWROAOI9bpxZGQYPDWJt
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2884 oneetx.exe 1300 oneetx.exe 1428 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2884 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe 30 PID 2096 wrote to memory of 2884 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe 30 PID 2096 wrote to memory of 2884 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe 30 PID 2096 wrote to memory of 2884 2096 cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe 30 PID 2884 wrote to memory of 2624 2884 oneetx.exe 31 PID 2884 wrote to memory of 2624 2884 oneetx.exe 31 PID 2884 wrote to memory of 2624 2884 oneetx.exe 31 PID 2884 wrote to memory of 2624 2884 oneetx.exe 31 PID 2884 wrote to memory of 1804 2884 oneetx.exe 33 PID 2884 wrote to memory of 1804 2884 oneetx.exe 33 PID 2884 wrote to memory of 1804 2884 oneetx.exe 33 PID 2884 wrote to memory of 1804 2884 oneetx.exe 33 PID 1804 wrote to memory of 2768 1804 cmd.exe 35 PID 1804 wrote to memory of 2768 1804 cmd.exe 35 PID 1804 wrote to memory of 2768 1804 cmd.exe 35 PID 1804 wrote to memory of 2768 1804 cmd.exe 35 PID 1804 wrote to memory of 2712 1804 cmd.exe 36 PID 1804 wrote to memory of 2712 1804 cmd.exe 36 PID 1804 wrote to memory of 2712 1804 cmd.exe 36 PID 1804 wrote to memory of 2712 1804 cmd.exe 36 PID 1804 wrote to memory of 2596 1804 cmd.exe 37 PID 1804 wrote to memory of 2596 1804 cmd.exe 37 PID 1804 wrote to memory of 2596 1804 cmd.exe 37 PID 1804 wrote to memory of 2596 1804 cmd.exe 37 PID 1804 wrote to memory of 2608 1804 cmd.exe 38 PID 1804 wrote to memory of 2608 1804 cmd.exe 38 PID 1804 wrote to memory of 2608 1804 cmd.exe 38 PID 1804 wrote to memory of 2608 1804 cmd.exe 38 PID 1804 wrote to memory of 1836 1804 cmd.exe 39 PID 1804 wrote to memory of 1836 1804 cmd.exe 39 PID 1804 wrote to memory of 1836 1804 cmd.exe 39 PID 1804 wrote to memory of 1836 1804 cmd.exe 39 PID 1804 wrote to memory of 2664 1804 cmd.exe 40 PID 1804 wrote to memory of 2664 1804 cmd.exe 40 PID 1804 wrote to memory of 2664 1804 cmd.exe 40 PID 1804 wrote to memory of 2664 1804 cmd.exe 40 PID 2560 wrote to memory of 1300 2560 taskeng.exe 43 PID 2560 wrote to memory of 1300 2560 taskeng.exe 43 PID 2560 wrote to memory of 1300 2560 taskeng.exe 43 PID 2560 wrote to memory of 1300 2560 taskeng.exe 43 PID 2560 wrote to memory of 1428 2560 taskeng.exe 45 PID 2560 wrote to memory of 1428 2560 taskeng.exe 45 PID 2560 wrote to memory of 1428 2560 taskeng.exe 45 PID 2560 wrote to memory of 1428 2560 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe"C:\Users\Admin\AppData\Local\Temp\cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A2DAFEA1-4C05-48C9-9F7B-19A966E6CF78} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5504b341a1a47cd0efe3138655c8652a4
SHA16b21d347050e103bdc89e3ac42be3b69cf5c8d2f
SHA256cdbde33d9ba5022c7962289d279c308de0d7e94b746d6a40d6d5f89d21c010cb
SHA5120d0109e990e253e0be381831988b2e73d1a031bc8aea38685c229de3ce893844a8f113c0e98e41c9e8dbb0bded4e9b8084216724b7d9e5964293f0dc6a0258a2