Analysis
-
max time kernel
116s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe
Resource
win7-20240729-en
General
-
Target
19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe
-
Size
256KB
-
MD5
9ddadde03c8bd513386e0421dec03490
-
SHA1
8a351f091ba708c69a5fc29d06e1c9860c449fa9
-
SHA256
19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022
-
SHA512
8298547423b443877a68e089cbab1924ac4938127b8894c042ac7f85c8d17c2c181167884b38c20e18a6d599722d5f6f5db017df9d3eb27c1e3a3cd5c311bf0e
-
SSDEEP
3072:uX5YwxA0Dxx5TscWERNMtiAncRWhJX2NGx93PQUT2964GKsR5bEXhlBjk4/owe:upYJCx5g8MtiWYN89W8UcEXhfg4/ve
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 3 IoCs
pid Process 1888 oneetx.exe 3956 oneetx.exe 2760 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
pid pid_target Process procid_target 4620 2952 WerFault.exe 82 1548 2952 WerFault.exe 82 1136 2952 WerFault.exe 82 4380 2952 WerFault.exe 82 1244 2952 WerFault.exe 82 2596 2952 WerFault.exe 82 1536 2952 WerFault.exe 82 2068 2952 WerFault.exe 82 1564 2952 WerFault.exe 82 540 2952 WerFault.exe 82 4932 1888 WerFault.exe 110 1168 1888 WerFault.exe 110 3736 1888 WerFault.exe 110 4300 1888 WerFault.exe 110 3380 1888 WerFault.exe 110 4308 1888 WerFault.exe 110 232 1888 WerFault.exe 110 1556 1888 WerFault.exe 110 1332 1888 WerFault.exe 110 740 1888 WerFault.exe 110 4292 1888 WerFault.exe 110 1964 1888 WerFault.exe 110 4508 1888 WerFault.exe 110 1564 1888 WerFault.exe 110 3456 3956 WerFault.exe 156 1660 1888 WerFault.exe 110 3680 2760 WerFault.exe 161 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3516 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1888 2952 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 110 PID 2952 wrote to memory of 1888 2952 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 110 PID 2952 wrote to memory of 1888 2952 19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe 110 PID 1888 wrote to memory of 3516 1888 oneetx.exe 130 PID 1888 wrote to memory of 3516 1888 oneetx.exe 130 PID 1888 wrote to memory of 3516 1888 oneetx.exe 130 PID 1888 wrote to memory of 4064 1888 oneetx.exe 136 PID 1888 wrote to memory of 4064 1888 oneetx.exe 136 PID 1888 wrote to memory of 4064 1888 oneetx.exe 136 PID 4064 wrote to memory of 1488 4064 cmd.exe 140 PID 4064 wrote to memory of 1488 4064 cmd.exe 140 PID 4064 wrote to memory of 1488 4064 cmd.exe 140 PID 4064 wrote to memory of 1032 4064 cmd.exe 141 PID 4064 wrote to memory of 1032 4064 cmd.exe 141 PID 4064 wrote to memory of 1032 4064 cmd.exe 141 PID 4064 wrote to memory of 2480 4064 cmd.exe 142 PID 4064 wrote to memory of 2480 4064 cmd.exe 142 PID 4064 wrote to memory of 2480 4064 cmd.exe 142 PID 4064 wrote to memory of 1220 4064 cmd.exe 143 PID 4064 wrote to memory of 1220 4064 cmd.exe 143 PID 4064 wrote to memory of 1220 4064 cmd.exe 143 PID 4064 wrote to memory of 2656 4064 cmd.exe 144 PID 4064 wrote to memory of 2656 4064 cmd.exe 144 PID 4064 wrote to memory of 2656 4064 cmd.exe 144 PID 4064 wrote to memory of 4920 4064 cmd.exe 145 PID 4064 wrote to memory of 4920 4064 cmd.exe 145 PID 4064 wrote to memory of 4920 4064 cmd.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe"C:\Users\Admin\AppData\Local\Temp\19d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 5642⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 6642⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 6242⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 6282⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 8402⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 8402⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 11042⤵
- Program crash
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 11042⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 12162⤵
- Program crash
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 5843⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 7283⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 7323⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 9443⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 9643⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 9643⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 10003⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 8963⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 7603⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:4920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 11883⤵
- Program crash
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 11843⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 12203⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 12323⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 13603⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 9763⤵
- Program crash
PID:1660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 12442⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2952 -ip 29521⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2952 -ip 29521⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2952 -ip 29521⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2952 -ip 29521⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2952 -ip 29521⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2952 -ip 29521⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2952 -ip 29521⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2952 -ip 29521⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 2952 -ip 29521⤵PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2952 -ip 29521⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1888 -ip 18881⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1888 -ip 18881⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1888 -ip 18881⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1888 -ip 18881⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1888 -ip 18881⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1888 -ip 18881⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1888 -ip 18881⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1888 -ip 18881⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1888 -ip 18881⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1888 -ip 18881⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1888 -ip 18881⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1888 -ip 18881⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 1888 -ip 18881⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1888 -ip 18881⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 3202⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3956 -ip 39561⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1888 -ip 18881⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 3322⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2760 -ip 27601⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD59ddadde03c8bd513386e0421dec03490
SHA18a351f091ba708c69a5fc29d06e1c9860c449fa9
SHA25619d3bf22d7f894a250edc38ddbaf35aa8dac2547408657609bbd85ea6e0d6022
SHA5128298547423b443877a68e089cbab1924ac4938127b8894c042ac7f85c8d17c2c181167884b38c20e18a6d599722d5f6f5db017df9d3eb27c1e3a3cd5c311bf0e