Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-08-2022 10:13
Behavioral task
behavioral1
Sample
a81511e199a9aa34da15d12c2f294b2c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a81511e199a9aa34da15d12c2f294b2c.dll
Resource
win10v2004-20220812-en
General
-
Target
a81511e199a9aa34da15d12c2f294b2c.dll
-
Size
126KB
-
MD5
a81511e199a9aa34da15d12c2f294b2c
-
SHA1
0f9006d8f09e91bbd459b8254dd945e4fbae25d9
-
SHA256
b9fa703b80c7d124148f64ae3474f1f2b01a42cd1ed6871be2bb6c9d15ecf871
-
SHA512
98e56b9f4a09b423432cd9c03110109f872dedef7bb29d7bb0cc5cd8827c5f67b8385dc9ca5faa4c23ae28dd3b1c87d977bd3b4e09eeb363c6f1d245a5e59707
-
SSDEEP
3072:Yx7pOYzBek+3tiINwyP7XSSJds3zhrjPcnq4Lv469:Yx7ZNh+3vwyOztPcrL
Malware Config
Signatures
-
Detect Amadey credential stealer module 1 IoCs
resource yara_rule behavioral1/memory/956-56-0x0000000000160000-0x0000000000184000-memory.dmp amadey_cred_module -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1992 956 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 956 rundll32.exe 956 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 1916 wrote to memory of 956 1916 rundll32.exe 27 PID 956 wrote to memory of 1992 956 rundll32.exe 28 PID 956 wrote to memory of 1992 956 rundll32.exe 28 PID 956 wrote to memory of 1992 956 rundll32.exe 28 PID 956 wrote to memory of 1992 956 rundll32.exe 28 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a81511e199a9aa34da15d12c2f294b2c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a81511e199a9aa34da15d12c2f294b2c.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 4563⤵
- Program crash
PID:1992
-
-