Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe
Resource
win7-20240708-en
General
-
Target
42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe
-
Size
256KB
-
MD5
ce7792161d0e2e89a58dc419f516da32
-
SHA1
06fb8ef3403dda50bb95f78204660300bb5e187e
-
SHA256
42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb
-
SHA512
b4aaecd5020d01b32ea86ea6a2e0ccf1db2b1b1c0a46d68ba499fe932c15a81acb3d8290be516d6041167533b5e411ed58714ea898059b520bfad632648843e2
-
SSDEEP
3072:3dg2WfgUqxS+dWIMOfdMsdmAYTH/lrsI3tbpxFTY5n5hwYPDpJKJRf8:NbtUstdWROAOI9bpxZGQYPDWJ
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 4 IoCs
pid Process 2896 oneetx.exe 2088 oneetx.exe 2324 oneetx.exe 752 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2568 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2896 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe 30 PID 3044 wrote to memory of 2896 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe 30 PID 3044 wrote to memory of 2896 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe 30 PID 3044 wrote to memory of 2896 3044 42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe 30 PID 2896 wrote to memory of 2568 2896 oneetx.exe 31 PID 2896 wrote to memory of 2568 2896 oneetx.exe 31 PID 2896 wrote to memory of 2568 2896 oneetx.exe 31 PID 2896 wrote to memory of 2568 2896 oneetx.exe 31 PID 2896 wrote to memory of 2756 2896 oneetx.exe 33 PID 2896 wrote to memory of 2756 2896 oneetx.exe 33 PID 2896 wrote to memory of 2756 2896 oneetx.exe 33 PID 2896 wrote to memory of 2756 2896 oneetx.exe 33 PID 2756 wrote to memory of 2604 2756 cmd.exe 35 PID 2756 wrote to memory of 2604 2756 cmd.exe 35 PID 2756 wrote to memory of 2604 2756 cmd.exe 35 PID 2756 wrote to memory of 2604 2756 cmd.exe 35 PID 2756 wrote to memory of 2652 2756 cmd.exe 36 PID 2756 wrote to memory of 2652 2756 cmd.exe 36 PID 2756 wrote to memory of 2652 2756 cmd.exe 36 PID 2756 wrote to memory of 2652 2756 cmd.exe 36 PID 2756 wrote to memory of 236 2756 cmd.exe 37 PID 2756 wrote to memory of 236 2756 cmd.exe 37 PID 2756 wrote to memory of 236 2756 cmd.exe 37 PID 2756 wrote to memory of 236 2756 cmd.exe 37 PID 2756 wrote to memory of 2720 2756 cmd.exe 38 PID 2756 wrote to memory of 2720 2756 cmd.exe 38 PID 2756 wrote to memory of 2720 2756 cmd.exe 38 PID 2756 wrote to memory of 2720 2756 cmd.exe 38 PID 2756 wrote to memory of 2224 2756 cmd.exe 39 PID 2756 wrote to memory of 2224 2756 cmd.exe 39 PID 2756 wrote to memory of 2224 2756 cmd.exe 39 PID 2756 wrote to memory of 2224 2756 cmd.exe 39 PID 2756 wrote to memory of 2956 2756 cmd.exe 40 PID 2756 wrote to memory of 2956 2756 cmd.exe 40 PID 2756 wrote to memory of 2956 2756 cmd.exe 40 PID 2756 wrote to memory of 2956 2756 cmd.exe 40 PID 1300 wrote to memory of 2088 1300 taskeng.exe 43 PID 1300 wrote to memory of 2088 1300 taskeng.exe 43 PID 1300 wrote to memory of 2088 1300 taskeng.exe 43 PID 1300 wrote to memory of 2088 1300 taskeng.exe 43 PID 1300 wrote to memory of 2324 1300 taskeng.exe 44 PID 1300 wrote to memory of 2324 1300 taskeng.exe 44 PID 1300 wrote to memory of 2324 1300 taskeng.exe 44 PID 1300 wrote to memory of 2324 1300 taskeng.exe 44 PID 1300 wrote to memory of 752 1300 taskeng.exe 45 PID 1300 wrote to memory of 752 1300 taskeng.exe 45 PID 1300 wrote to memory of 752 1300 taskeng.exe 45 PID 1300 wrote to memory of 752 1300 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe"C:\Users\Admin\AppData\Local\Temp\42c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C887DBC2-BB31-44E6-88E8-2EACDD57C7C8} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5ce7792161d0e2e89a58dc419f516da32
SHA106fb8ef3403dda50bb95f78204660300bb5e187e
SHA25642c3fe49323ed9d8bc580346ffe9e933aa914aa68e3aafb0381c23318b4ec9cb
SHA512b4aaecd5020d01b32ea86ea6a2e0ccf1db2b1b1c0a46d68ba499fe932c15a81acb3d8290be516d6041167533b5e411ed58714ea898059b520bfad632648843e2