Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 18:02
Behavioral task
behavioral1
Sample
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
Resource
win10v2004-20241007-en
General
-
Target
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe
-
Size
211KB
-
MD5
d28da912c2e492b4a8039303ef2fcaa9
-
SHA1
33b838f202881152505b9f6800e27b87e5d5c298
-
SHA256
1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8
-
SHA512
141bc8e83abebb8b4818f21959ada6dfa3f0f3bc0063d3353b74e1e6b8108688a4226e2635e8344c124ff7c868b94d215b797877af53b194f0a7873d076c0270
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmhd:5Cswq+AXYu7HGOSuZAlAILjqd
Malware Config
Extracted
amadey
3.81
f9a925
http://77.91.124.20
-
install_dir
c3912af058
-
install_file
oneetx.exe
-
strings_key
0504ce46646b0dc397a3c30d6692ec75
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2376 oneetx.exe 2864 oneetx.exe 1800 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2376 2544 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 31 PID 2544 wrote to memory of 2376 2544 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 31 PID 2544 wrote to memory of 2376 2544 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 31 PID 2544 wrote to memory of 2376 2544 1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe 31 PID 2376 wrote to memory of 2508 2376 oneetx.exe 32 PID 2376 wrote to memory of 2508 2376 oneetx.exe 32 PID 2376 wrote to memory of 2508 2376 oneetx.exe 32 PID 2376 wrote to memory of 2508 2376 oneetx.exe 32 PID 2376 wrote to memory of 2664 2376 oneetx.exe 34 PID 2376 wrote to memory of 2664 2376 oneetx.exe 34 PID 2376 wrote to memory of 2664 2376 oneetx.exe 34 PID 2376 wrote to memory of 2664 2376 oneetx.exe 34 PID 2664 wrote to memory of 2136 2664 cmd.exe 36 PID 2664 wrote to memory of 2136 2664 cmd.exe 36 PID 2664 wrote to memory of 2136 2664 cmd.exe 36 PID 2664 wrote to memory of 2136 2664 cmd.exe 36 PID 2664 wrote to memory of 2120 2664 cmd.exe 37 PID 2664 wrote to memory of 2120 2664 cmd.exe 37 PID 2664 wrote to memory of 2120 2664 cmd.exe 37 PID 2664 wrote to memory of 2120 2664 cmd.exe 37 PID 2664 wrote to memory of 2836 2664 cmd.exe 38 PID 2664 wrote to memory of 2836 2664 cmd.exe 38 PID 2664 wrote to memory of 2836 2664 cmd.exe 38 PID 2664 wrote to memory of 2836 2664 cmd.exe 38 PID 2664 wrote to memory of 2824 2664 cmd.exe 39 PID 2664 wrote to memory of 2824 2664 cmd.exe 39 PID 2664 wrote to memory of 2824 2664 cmd.exe 39 PID 2664 wrote to memory of 2824 2664 cmd.exe 39 PID 2664 wrote to memory of 2840 2664 cmd.exe 40 PID 2664 wrote to memory of 2840 2664 cmd.exe 40 PID 2664 wrote to memory of 2840 2664 cmd.exe 40 PID 2664 wrote to memory of 2840 2664 cmd.exe 40 PID 2664 wrote to memory of 2884 2664 cmd.exe 41 PID 2664 wrote to memory of 2884 2664 cmd.exe 41 PID 2664 wrote to memory of 2884 2664 cmd.exe 41 PID 2664 wrote to memory of 2884 2664 cmd.exe 41 PID 2556 wrote to memory of 2864 2556 taskeng.exe 44 PID 2556 wrote to memory of 2864 2556 taskeng.exe 44 PID 2556 wrote to memory of 2864 2556 taskeng.exe 44 PID 2556 wrote to memory of 2864 2556 taskeng.exe 44 PID 2556 wrote to memory of 1800 2556 taskeng.exe 46 PID 2556 wrote to memory of 1800 2556 taskeng.exe 46 PID 2556 wrote to memory of 1800 2556 taskeng.exe 46 PID 2556 wrote to memory of 1800 2556 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe"C:\Users\Admin\AppData\Local\Temp\1bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {176E70C7-1649-4D22-A0B4-1447CF011E9C} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5d28da912c2e492b4a8039303ef2fcaa9
SHA133b838f202881152505b9f6800e27b87e5d5c298
SHA2561bf89374d7f2e75321c5cad6c542ef741831fabfa9777c7bafe0850882298bd8
SHA512141bc8e83abebb8b4818f21959ada6dfa3f0f3bc0063d3353b74e1e6b8108688a4226e2635e8344c124ff7c868b94d215b797877af53b194f0a7873d076c0270