Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:06
Behavioral task
behavioral1
Sample
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe
Resource
win10v2004-20241007-en
General
-
Target
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe
-
Size
205KB
-
MD5
53abd18470691dd086debd4e57af2ca7
-
SHA1
7436658257572f42c7401d84c4a37b1075b88d70
-
SHA256
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53
-
SHA512
58491d03512b7555f8c5fdedc7880fe8fddc18e4a7a96fbbf28a192b6f91042910b74356073bc46db51cbf51d5f3bd66a57cc92badecd4dea39d8f1bdff99fe4
-
SSDEEP
3072:c/frTDzurT1S3CzpdmnATE55zjExkKGruONMvhu5QTXzeJX2vkMfSDPwU:Wfrnzurs3Czpexj2kGOIu5QTyJMKk
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
Processes:
oneetx.exeoneetx.exeoneetx.exepid Process 1396 oneetx.exe 2144 oneetx.exe 1244 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exepid Process 1628 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execacls.exeoneetx.execmd.execacls.execacls.execacls.execmd.exed6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exepid Process 1628 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exeoneetx.execmd.exetaskeng.exedescription pid Process procid_target PID 1628 wrote to memory of 1396 1628 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 31 PID 1628 wrote to memory of 1396 1628 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 31 PID 1628 wrote to memory of 1396 1628 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 31 PID 1628 wrote to memory of 1396 1628 d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe 31 PID 1396 wrote to memory of 2012 1396 oneetx.exe 32 PID 1396 wrote to memory of 2012 1396 oneetx.exe 32 PID 1396 wrote to memory of 2012 1396 oneetx.exe 32 PID 1396 wrote to memory of 2012 1396 oneetx.exe 32 PID 1396 wrote to memory of 2636 1396 oneetx.exe 34 PID 1396 wrote to memory of 2636 1396 oneetx.exe 34 PID 1396 wrote to memory of 2636 1396 oneetx.exe 34 PID 1396 wrote to memory of 2636 1396 oneetx.exe 34 PID 2636 wrote to memory of 1984 2636 cmd.exe 36 PID 2636 wrote to memory of 1984 2636 cmd.exe 36 PID 2636 wrote to memory of 1984 2636 cmd.exe 36 PID 2636 wrote to memory of 1984 2636 cmd.exe 36 PID 2636 wrote to memory of 1968 2636 cmd.exe 37 PID 2636 wrote to memory of 1968 2636 cmd.exe 37 PID 2636 wrote to memory of 1968 2636 cmd.exe 37 PID 2636 wrote to memory of 1968 2636 cmd.exe 37 PID 2636 wrote to memory of 2836 2636 cmd.exe 38 PID 2636 wrote to memory of 2836 2636 cmd.exe 38 PID 2636 wrote to memory of 2836 2636 cmd.exe 38 PID 2636 wrote to memory of 2836 2636 cmd.exe 38 PID 2636 wrote to memory of 2852 2636 cmd.exe 39 PID 2636 wrote to memory of 2852 2636 cmd.exe 39 PID 2636 wrote to memory of 2852 2636 cmd.exe 39 PID 2636 wrote to memory of 2852 2636 cmd.exe 39 PID 2636 wrote to memory of 2896 2636 cmd.exe 40 PID 2636 wrote to memory of 2896 2636 cmd.exe 40 PID 2636 wrote to memory of 2896 2636 cmd.exe 40 PID 2636 wrote to memory of 2896 2636 cmd.exe 40 PID 2636 wrote to memory of 2908 2636 cmd.exe 41 PID 2636 wrote to memory of 2908 2636 cmd.exe 41 PID 2636 wrote to memory of 2908 2636 cmd.exe 41 PID 2636 wrote to memory of 2908 2636 cmd.exe 41 PID 2588 wrote to memory of 2144 2588 taskeng.exe 44 PID 2588 wrote to memory of 2144 2588 taskeng.exe 44 PID 2588 wrote to memory of 2144 2588 taskeng.exe 44 PID 2588 wrote to memory of 2144 2588 taskeng.exe 44 PID 2588 wrote to memory of 1244 2588 taskeng.exe 46 PID 2588 wrote to memory of 1244 2588 taskeng.exe 46 PID 2588 wrote to memory of 1244 2588 taskeng.exe 46 PID 2588 wrote to memory of 1244 2588 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe"C:\Users\Admin\AppData\Local\Temp\d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F27C539B-B3AC-4E63-94D2-BE3AF90822FC} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD553abd18470691dd086debd4e57af2ca7
SHA17436658257572f42c7401d84c4a37b1075b88d70
SHA256d6e4603de9838d087ff76be5e73c512cdc87e5ca5c6edab3377865fe015bdd53
SHA51258491d03512b7555f8c5fdedc7880fe8fddc18e4a7a96fbbf28a192b6f91042910b74356073bc46db51cbf51d5f3bd66a57cc92badecd4dea39d8f1bdff99fe4