Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe
Resource
win7-20241010-en
General
-
Target
d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe
-
Size
255KB
-
MD5
57e33ea7348be5d6b1b26b0e286e7da0
-
SHA1
af47dea28e058145a9bc8e80225e843fe2ae8c27
-
SHA256
d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793
-
SHA512
27e9fb03e6cdbdc6e30573571f7c874660c3590b150125d1ec8b27f823c48f122651d4cb4a19a9c87c33cde80379c1594167471f33dab8ae6108ca69eeae6fb3
-
SSDEEP
3072:xoq86TzW4pT3MVD1OtqQjJouL7ukm5rvuFwYPDpJKJRf:eq7+qTIDwtq0JozLvuSYPDWJ
Malware Config
Extracted
amadey
3.80
8c4642
http://193.201.9.240
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
c7c0f24aa6d8f611f5533809029a4795
-
url_paths
/live/games/index.php
Signatures
-
Amadey family
-
Executes dropped EXE 3 IoCs
pid Process 2608 oneetx.exe 2828 oneetx.exe 2396 oneetx.exe -
Loads dropped DLL 2 IoCs
pid Process 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2896 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2608 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe 31 PID 2708 wrote to memory of 2608 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe 31 PID 2708 wrote to memory of 2608 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe 31 PID 2708 wrote to memory of 2608 2708 d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe 31 PID 2608 wrote to memory of 2896 2608 oneetx.exe 32 PID 2608 wrote to memory of 2896 2608 oneetx.exe 32 PID 2608 wrote to memory of 2896 2608 oneetx.exe 32 PID 2608 wrote to memory of 2896 2608 oneetx.exe 32 PID 2608 wrote to memory of 2656 2608 oneetx.exe 34 PID 2608 wrote to memory of 2656 2608 oneetx.exe 34 PID 2608 wrote to memory of 2656 2608 oneetx.exe 34 PID 2608 wrote to memory of 2656 2608 oneetx.exe 34 PID 2656 wrote to memory of 2620 2656 cmd.exe 36 PID 2656 wrote to memory of 2620 2656 cmd.exe 36 PID 2656 wrote to memory of 2620 2656 cmd.exe 36 PID 2656 wrote to memory of 2620 2656 cmd.exe 36 PID 2656 wrote to memory of 2664 2656 cmd.exe 37 PID 2656 wrote to memory of 2664 2656 cmd.exe 37 PID 2656 wrote to memory of 2664 2656 cmd.exe 37 PID 2656 wrote to memory of 2664 2656 cmd.exe 37 PID 2656 wrote to memory of 2644 2656 cmd.exe 38 PID 2656 wrote to memory of 2644 2656 cmd.exe 38 PID 2656 wrote to memory of 2644 2656 cmd.exe 38 PID 2656 wrote to memory of 2644 2656 cmd.exe 38 PID 2656 wrote to memory of 832 2656 cmd.exe 39 PID 2656 wrote to memory of 832 2656 cmd.exe 39 PID 2656 wrote to memory of 832 2656 cmd.exe 39 PID 2656 wrote to memory of 832 2656 cmd.exe 39 PID 2656 wrote to memory of 748 2656 cmd.exe 40 PID 2656 wrote to memory of 748 2656 cmd.exe 40 PID 2656 wrote to memory of 748 2656 cmd.exe 40 PID 2656 wrote to memory of 748 2656 cmd.exe 40 PID 2656 wrote to memory of 1488 2656 cmd.exe 41 PID 2656 wrote to memory of 1488 2656 cmd.exe 41 PID 2656 wrote to memory of 1488 2656 cmd.exe 41 PID 2656 wrote to memory of 1488 2656 cmd.exe 41 PID 2848 wrote to memory of 2828 2848 taskeng.exe 44 PID 2848 wrote to memory of 2828 2848 taskeng.exe 44 PID 2848 wrote to memory of 2828 2848 taskeng.exe 44 PID 2848 wrote to memory of 2828 2848 taskeng.exe 44 PID 2848 wrote to memory of 2396 2848 taskeng.exe 46 PID 2848 wrote to memory of 2396 2848 taskeng.exe 46 PID 2848 wrote to memory of 2396 2848 taskeng.exe 46 PID 2848 wrote to memory of 2396 2848 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe"C:\Users\Admin\AppData\Local\Temp\d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
- System Location Discovery: System Language Discovery
PID:832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {17A85FF4-6EF6-432A-9CE0-10FF2F00C322} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD557e33ea7348be5d6b1b26b0e286e7da0
SHA1af47dea28e058145a9bc8e80225e843fe2ae8c27
SHA256d720e490e7c2a7f3949cec7c19691a6faa83661f8e7b563518a6ca1f66154793
SHA51227e9fb03e6cdbdc6e30573571f7c874660c3590b150125d1ec8b27f823c48f122651d4cb4a19a9c87c33cde80379c1594167471f33dab8ae6108ca69eeae6fb3