Analysis
-
max time kernel
100s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-05-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe
Resource
win10v2004-20220414-en
General
-
Target
e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe
-
Size
218KB
-
MD5
2e5816315adcf88c8a527722a6590ed6
-
SHA1
e6756efbc30a0af6d55a64f0a3fefe3cea45293a
-
SHA256
e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f
-
SHA512
1d593ef730be2e5b094ba84f7ce5d86abeffa89a81f28c90d4740926018233d8e7cfc9e86046d60ae9594f8f61e28e6bf0f3712cfe33ac348289238ad5cd9756
Malware Config
Extracted
amadey
3.05
garts.at/forum/index.php
uknovodom.ru/forum/index.php
prospectsnorth.com/forum/index.php
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 55 4660 rundll32.exe 57 4660 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
ftewk.exeftewk.exeftewk.exepid process 832 ftewk.exe 2492 ftewk.exe 5116 ftewk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exeftewk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation ftewk.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4660 rundll32.exe 4692 rundll32.exe 4756 rundll32.exe 4756 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 4660 rundll32.exe 4660 rundll32.exe 4660 rundll32.exe 4660 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exeftewk.execmd.exedescription pid process target process PID 3164 wrote to memory of 832 3164 e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe ftewk.exe PID 3164 wrote to memory of 832 3164 e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe ftewk.exe PID 3164 wrote to memory of 832 3164 e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe ftewk.exe PID 832 wrote to memory of 2008 832 ftewk.exe cmd.exe PID 832 wrote to memory of 2008 832 ftewk.exe cmd.exe PID 832 wrote to memory of 2008 832 ftewk.exe cmd.exe PID 2008 wrote to memory of 3552 2008 cmd.exe reg.exe PID 2008 wrote to memory of 3552 2008 cmd.exe reg.exe PID 2008 wrote to memory of 3552 2008 cmd.exe reg.exe PID 832 wrote to memory of 4648 832 ftewk.exe schtasks.exe PID 832 wrote to memory of 4648 832 ftewk.exe schtasks.exe PID 832 wrote to memory of 4648 832 ftewk.exe schtasks.exe PID 832 wrote to memory of 4660 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4660 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4660 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4692 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4692 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4692 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4756 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4756 832 ftewk.exe rundll32.exe PID 832 wrote to memory of 4756 832 ftewk.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe"C:\Users\Admin\AppData\Local\Temp\e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exe"C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\958dc2ebed\3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dll, Main3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dll, Main3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\958dc2ebed\1⤵
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exeC:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exeC:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exeFilesize
218KB
MD52e5816315adcf88c8a527722a6590ed6
SHA1e6756efbc30a0af6d55a64f0a3fefe3cea45293a
SHA256e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f
SHA5121d593ef730be2e5b094ba84f7ce5d86abeffa89a81f28c90d4740926018233d8e7cfc9e86046d60ae9594f8f61e28e6bf0f3712cfe33ac348289238ad5cd9756
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exeFilesize
218KB
MD52e5816315adcf88c8a527722a6590ed6
SHA1e6756efbc30a0af6d55a64f0a3fefe3cea45293a
SHA256e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f
SHA5121d593ef730be2e5b094ba84f7ce5d86abeffa89a81f28c90d4740926018233d8e7cfc9e86046d60ae9594f8f61e28e6bf0f3712cfe33ac348289238ad5cd9756
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exeFilesize
218KB
MD52e5816315adcf88c8a527722a6590ed6
SHA1e6756efbc30a0af6d55a64f0a3fefe3cea45293a
SHA256e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f
SHA5121d593ef730be2e5b094ba84f7ce5d86abeffa89a81f28c90d4740926018233d8e7cfc9e86046d60ae9594f8f61e28e6bf0f3712cfe33ac348289238ad5cd9756
-
C:\Users\Admin\AppData\Local\Temp\958dc2ebed\ftewk.exeFilesize
218KB
MD52e5816315adcf88c8a527722a6590ed6
SHA1e6756efbc30a0af6d55a64f0a3fefe3cea45293a
SHA256e17ae6dc6b124cbcb453e0e5bd5319d8cb9dc4df70972b50d91e49cccc7d2f7f
SHA5121d593ef730be2e5b094ba84f7ce5d86abeffa89a81f28c90d4740926018233d8e7cfc9e86046d60ae9594f8f61e28e6bf0f3712cfe33ac348289238ad5cd9756
-
C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dllFilesize
126KB
MD5c96f4b79502c4a88af0ed0935a0d5f13
SHA10976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
SHA2561b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
SHA5128b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
-
C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dllFilesize
126KB
MD5c96f4b79502c4a88af0ed0935a0d5f13
SHA10976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
SHA2561b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
SHA5128b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
-
C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dllFilesize
126KB
MD5c96f4b79502c4a88af0ed0935a0d5f13
SHA10976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
SHA2561b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
SHA5128b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
-
C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dllFilesize
126KB
MD5c96f4b79502c4a88af0ed0935a0d5f13
SHA10976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
SHA2561b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
SHA5128b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
-
C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred.dllFilesize
126KB
MD5c96f4b79502c4a88af0ed0935a0d5f13
SHA10976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
SHA2561b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
SHA5128b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
-
memory/832-130-0x0000000000000000-mapping.dmp
-
memory/2008-133-0x0000000000000000-mapping.dmp
-
memory/3552-134-0x0000000000000000-mapping.dmp
-
memory/4648-135-0x0000000000000000-mapping.dmp
-
memory/4660-137-0x0000000000000000-mapping.dmp
-
memory/4692-138-0x0000000000000000-mapping.dmp
-
memory/4756-145-0x0000000000650000-0x0000000000674000-memory.dmpFilesize
144KB
-
memory/4756-142-0x0000000000000000-mapping.dmp