Analysis
-
max time kernel
25s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 11:32
Static task
static1
Behavioral task
behavioral1
Sample
9083ea498dae79a1c3124d7eb231c415.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9083ea498dae79a1c3124d7eb231c415.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
9083ea498dae79a1c3124d7eb231c415.dll
-
Size
126KB
-
MD5
9083ea498dae79a1c3124d7eb231c415
-
SHA1
416506992b86749bebdc03e76faf65a82d20c6ff
-
SHA256
5342a90e6dd43fb471d9674de99d8cdc048381efff246af9de32f9257cacdcc3
-
SHA512
8e3846ac667c85ce138bb5898e8a5b046f2cfb7d2d946e697e806e9ec6ab27559723e8f6b8fa97f221476814e2921e4b165f777554e512732f4801863715378a
Score
10/10
Malware Config
Signatures
-
Detect Amadey credential stealer module 1 IoCs
resource yara_rule behavioral1/memory/936-56-0x00000000001C0000-0x00000000001E4000-memory.dmp amadey_cred_module -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 936 rundll32.exe 936 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 936 1740 rundll32.exe 28 PID 1740 wrote to memory of 936 1740 rundll32.exe 28 PID 1740 wrote to memory of 936 1740 rundll32.exe 28 PID 1740 wrote to memory of 936 1740 rundll32.exe 28 PID 1740 wrote to memory of 936 1740 rundll32.exe 28 PID 1740 wrote to memory of 936 1740 rundll32.exe 28 PID 1740 wrote to memory of 936 1740 rundll32.exe 28 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9083ea498dae79a1c3124d7eb231c415.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9083ea498dae79a1c3124d7eb231c415.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:936
-