Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-09-2022 18:21
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20220901-en
General
-
Target
a.exe
-
Size
217KB
-
MD5
6e60a3b3f0129a17a42ac486043705a6
-
SHA1
8afb7453c38fda8ab75b9ddb1ad8af2023feb788
-
SHA256
fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
-
SHA512
07f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
SSDEEP
6144:lc1fY938g3CQ+56G9f1v6Sz7/zhZ5uCQckWZTOMw:l2e+km1v6G/zluCQcdw
Malware Config
Signatures
-
Detect Amadey credential stealer module 6 IoCs
resource yara_rule behavioral1/files/0x0006000000014142-63.dat amadey_cred_module behavioral1/files/0x0006000000014142-64.dat amadey_cred_module behavioral1/files/0x0006000000014142-65.dat amadey_cred_module behavioral1/files/0x0006000000014142-66.dat amadey_cred_module behavioral1/files/0x0006000000014142-67.dat amadey_cred_module behavioral1/memory/1708-68-0x00000000001A0000-0x00000000001C4000-memory.dmp amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 1708 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1220 wfyoot.exe 588 wfyoot.exe 1292 wfyoot.exe -
Loads dropped DLL 5 IoCs
pid Process 1956 a.exe 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1220 1956 a.exe 27 PID 1956 wrote to memory of 1220 1956 a.exe 27 PID 1956 wrote to memory of 1220 1956 a.exe 27 PID 1956 wrote to memory of 1220 1956 a.exe 27 PID 1220 wrote to memory of 1568 1220 wfyoot.exe 28 PID 1220 wrote to memory of 1568 1220 wfyoot.exe 28 PID 1220 wrote to memory of 1568 1220 wfyoot.exe 28 PID 1220 wrote to memory of 1568 1220 wfyoot.exe 28 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 1220 wrote to memory of 1708 1220 wfyoot.exe 32 PID 664 wrote to memory of 588 664 taskeng.exe 34 PID 664 wrote to memory of 588 664 taskeng.exe 34 PID 664 wrote to memory of 588 664 taskeng.exe 34 PID 664 wrote to memory of 588 664 taskeng.exe 34 PID 664 wrote to memory of 1292 664 taskeng.exe 35 PID 664 wrote to memory of 1292 664 taskeng.exe 35 PID 664 wrote to memory of 1292 664 taskeng.exe 35 PID 664 wrote to memory of 1292 664 taskeng.exe 35 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe"C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN wfyoot.exe /TR "C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe" /F3⤵
- Creates scheduled task(s)
PID:1568
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\be8403bbaff04d\cred.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1708
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6D46F0D1-2167-400F-8668-D3949AFADA8B} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exeC:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe2⤵
- Executes dropped EXE
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exeC:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe2⤵
- Executes dropped EXE
PID:1292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0