Analysis

  • max time kernel
    133s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-05-2022 11:32

General

  • Target

    9083ea498dae79a1c3124d7eb231c415.dll

  • Size

    126KB

  • MD5

    9083ea498dae79a1c3124d7eb231c415

  • SHA1

    416506992b86749bebdc03e76faf65a82d20c6ff

  • SHA256

    5342a90e6dd43fb471d9674de99d8cdc048381efff246af9de32f9257cacdcc3

  • SHA512

    8e3846ac667c85ce138bb5898e8a5b046f2cfb7d2d946e697e806e9ec6ab27559723e8f6b8fa97f221476814e2921e4b165f777554e512732f4801863715378a

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9083ea498dae79a1c3124d7eb231c415.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9083ea498dae79a1c3124d7eb231c415.dll,#1
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • outlook_win_path
      PID:3968

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3968-130-0x0000000000000000-mapping.dmp
  • memory/3968-131-0x0000000000720000-0x0000000000744000-memory.dmp
    Filesize

    144KB