Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe
Resource
win7-20240729-en
General
-
Target
19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe
-
Size
256KB
-
MD5
9ddadde03c8bd513386e0421dec03490
-
SHA1
8a351f091ba708c69a5fc29d06e1c9860c449fa9
-
SHA256
19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022
-
SHA512
8298547423b443877a68e089cbab1924ac4938127b8894c042ac7f85c8d17c2c181167884b38c20e18a6d599722d5f6f5db017df9d3eb27c1e3a3cd5c311bf0e
-
SSDEEP
3072:uX5YwxA0Dxx5TscWERNMtiAncRWhJX2NGx93PQUT2964GKsR5bEXhlBjk4/owe:upYJCx5g8MtiWYN89W8UcEXhfg4/ve
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2304 oneetx.exe 2584 oneetx.exe 604 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2304 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 29 PID 1456 wrote to memory of 2304 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 29 PID 1456 wrote to memory of 2304 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 29 PID 1456 wrote to memory of 2304 1456 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 29 PID 2304 wrote to memory of 2912 2304 oneetx.exe 30 PID 2304 wrote to memory of 2912 2304 oneetx.exe 30 PID 2304 wrote to memory of 2912 2304 oneetx.exe 30 PID 2304 wrote to memory of 2912 2304 oneetx.exe 30 PID 2304 wrote to memory of 2776 2304 oneetx.exe 32 PID 2304 wrote to memory of 2776 2304 oneetx.exe 32 PID 2304 wrote to memory of 2776 2304 oneetx.exe 32 PID 2304 wrote to memory of 2776 2304 oneetx.exe 32 PID 2776 wrote to memory of 2744 2776 cmd.exe 34 PID 2776 wrote to memory of 2744 2776 cmd.exe 34 PID 2776 wrote to memory of 2744 2776 cmd.exe 34 PID 2776 wrote to memory of 2744 2776 cmd.exe 34 PID 2776 wrote to memory of 2284 2776 cmd.exe 35 PID 2776 wrote to memory of 2284 2776 cmd.exe 35 PID 2776 wrote to memory of 2284 2776 cmd.exe 35 PID 2776 wrote to memory of 2284 2776 cmd.exe 35 PID 2776 wrote to memory of 2788 2776 cmd.exe 36 PID 2776 wrote to memory of 2788 2776 cmd.exe 36 PID 2776 wrote to memory of 2788 2776 cmd.exe 36 PID 2776 wrote to memory of 2788 2776 cmd.exe 36 PID 2776 wrote to memory of 2312 2776 cmd.exe 37 PID 2776 wrote to memory of 2312 2776 cmd.exe 37 PID 2776 wrote to memory of 2312 2776 cmd.exe 37 PID 2776 wrote to memory of 2312 2776 cmd.exe 37 PID 2776 wrote to memory of 2756 2776 cmd.exe 38 PID 2776 wrote to memory of 2756 2776 cmd.exe 38 PID 2776 wrote to memory of 2756 2776 cmd.exe 38 PID 2776 wrote to memory of 2756 2776 cmd.exe 38 PID 2776 wrote to memory of 2664 2776 cmd.exe 39 PID 2776 wrote to memory of 2664 2776 cmd.exe 39 PID 2776 wrote to memory of 2664 2776 cmd.exe 39 PID 2776 wrote to memory of 2664 2776 cmd.exe 39 PID 2156 wrote to memory of 2584 2156 taskeng.exe 42 PID 2156 wrote to memory of 2584 2156 taskeng.exe 42 PID 2156 wrote to memory of 2584 2156 taskeng.exe 42 PID 2156 wrote to memory of 2584 2156 taskeng.exe 42 PID 2156 wrote to memory of 604 2156 taskeng.exe 43 PID 2156 wrote to memory of 604 2156 taskeng.exe 43 PID 2156 wrote to memory of 604 2156 taskeng.exe 43 PID 2156 wrote to memory of 604 2156 taskeng.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe"C:\Users\Admin\AppData\Local\Temp\19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C588D6EB-E368-46B8-A909-95991EAB5948} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD59ddadde03c8bd513386e0421dec03490
SHA18a351f091ba708c69a5fc29d06e1c9860c449fa9
SHA25619d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022
SHA5128298547423b443877a68e089cbab1924ac4938127b8894c042ac7f85c8d17c2c181167884b38c20e18a6d599722d5f6f5db017df9d3eb27c1e3a3cd5c311bf0e