Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe
Resource
win7-20240903-en
General
-
Target
00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe
-
Size
256KB
-
MD5
75c9ae7cc4ad65c61efe893e15e09bd3
-
SHA1
36edd04b582482093c55bb7fab6cc214ca846891
-
SHA256
00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f
-
SHA512
041f5648d062e0d0682b1a310059ee9772d83c34987d15c78c2769980a586014566c3655c5ad0e7da9b21ec7f15852ecd806331d217c82870e86fe56a2fbd817
-
SSDEEP
6144:YZkFRbXfb7wzY1FJRRBx5oUsWW5W8g4/ve7l:YZcpXGY1FJRTtsWWjm
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 2 IoCs
pid Process 2316 oneetx.exe 1404 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2316 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe 31 PID 2084 wrote to memory of 2316 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe 31 PID 2084 wrote to memory of 2316 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe 31 PID 2084 wrote to memory of 2316 2084 00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe 31 PID 2316 wrote to memory of 2776 2316 oneetx.exe 32 PID 2316 wrote to memory of 2776 2316 oneetx.exe 32 PID 2316 wrote to memory of 2776 2316 oneetx.exe 32 PID 2316 wrote to memory of 2776 2316 oneetx.exe 32 PID 2316 wrote to memory of 2760 2316 oneetx.exe 34 PID 2316 wrote to memory of 2760 2316 oneetx.exe 34 PID 2316 wrote to memory of 2760 2316 oneetx.exe 34 PID 2316 wrote to memory of 2760 2316 oneetx.exe 34 PID 2760 wrote to memory of 2268 2760 cmd.exe 36 PID 2760 wrote to memory of 2268 2760 cmd.exe 36 PID 2760 wrote to memory of 2268 2760 cmd.exe 36 PID 2760 wrote to memory of 2268 2760 cmd.exe 36 PID 2760 wrote to memory of 2684 2760 cmd.exe 37 PID 2760 wrote to memory of 2684 2760 cmd.exe 37 PID 2760 wrote to memory of 2684 2760 cmd.exe 37 PID 2760 wrote to memory of 2684 2760 cmd.exe 37 PID 2760 wrote to memory of 2884 2760 cmd.exe 38 PID 2760 wrote to memory of 2884 2760 cmd.exe 38 PID 2760 wrote to memory of 2884 2760 cmd.exe 38 PID 2760 wrote to memory of 2884 2760 cmd.exe 38 PID 2760 wrote to memory of 2720 2760 cmd.exe 39 PID 2760 wrote to memory of 2720 2760 cmd.exe 39 PID 2760 wrote to memory of 2720 2760 cmd.exe 39 PID 2760 wrote to memory of 2720 2760 cmd.exe 39 PID 2760 wrote to memory of 2596 2760 cmd.exe 40 PID 2760 wrote to memory of 2596 2760 cmd.exe 40 PID 2760 wrote to memory of 2596 2760 cmd.exe 40 PID 2760 wrote to memory of 2596 2760 cmd.exe 40 PID 2760 wrote to memory of 2588 2760 cmd.exe 41 PID 2760 wrote to memory of 2588 2760 cmd.exe 41 PID 2760 wrote to memory of 2588 2760 cmd.exe 41 PID 2760 wrote to memory of 2588 2760 cmd.exe 41 PID 1968 wrote to memory of 1404 1968 taskeng.exe 44 PID 1968 wrote to memory of 1404 1968 taskeng.exe 44 PID 1968 wrote to memory of 1404 1968 taskeng.exe 44 PID 1968 wrote to memory of 1404 1968 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe"C:\Users\Admin\AppData\Local\Temp\00e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0647CA10-7F78-48D1-97F6-A3AE778429B3} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD575c9ae7cc4ad65c61efe893e15e09bd3
SHA136edd04b582482093c55bb7fab6cc214ca846891
SHA25600e53a0babdd981ade99e6d924be1bffe115c6bfd7ecb7d91f75adc5ea218b7f
SHA512041f5648d062e0d0682b1a310059ee9772d83c34987d15c78c2769980a586014566c3655c5ad0e7da9b21ec7f15852ecd806331d217c82870e86fe56a2fbd817