Analysis
-
max time kernel
115s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2022 18:21
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20220901-en
General
-
Target
a.exe
-
Size
217KB
-
MD5
6e60a3b3f0129a17a42ac486043705a6
-
SHA1
8afb7453c38fda8ab75b9ddb1ad8af2023feb788
-
SHA256
fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
-
SHA512
07f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
SSDEEP
6144:lc1fY938g3CQ+56G9f1v6Sz7/zhZ5uCQckWZTOMw:l2e+km1v6G/zluCQcdw
Malware Config
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x0003000000022dd1-137.dat amadey_cred_module behavioral2/files/0x0003000000022dd1-138.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 53 2552 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3256 wfyoot.exe 1296 wfyoot.exe 4508 wfyoot.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wfyoot.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 544 wrote to memory of 3256 544 a.exe 85 PID 544 wrote to memory of 3256 544 a.exe 85 PID 544 wrote to memory of 3256 544 a.exe 85 PID 3256 wrote to memory of 1412 3256 wfyoot.exe 86 PID 3256 wrote to memory of 1412 3256 wfyoot.exe 86 PID 3256 wrote to memory of 1412 3256 wfyoot.exe 86 PID 3256 wrote to memory of 2552 3256 wfyoot.exe 101 PID 3256 wrote to memory of 2552 3256 wfyoot.exe 101 PID 3256 wrote to memory of 2552 3256 wfyoot.exe 101 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe"C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN wfyoot.exe /TR "C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe" /F3⤵
- Creates scheduled task(s)
PID:1412
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\be8403bbaff04d\cred.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exeC:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe1⤵
- Executes dropped EXE
PID:1296
-
C:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exeC:\Users\Admin\AppData\Local\Temp\5ab67e9dae\wfyoot.exe1⤵
- Executes dropped EXE
PID:4508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
217KB
MD56e60a3b3f0129a17a42ac486043705a6
SHA18afb7453c38fda8ab75b9ddb1ad8af2023feb788
SHA256fbbac58730ce0b0785ed036b9512c2329599b3c5bbf4b30a597660364f2cd560
SHA51207f0d99c31b67ce99b8ffae6b6c2c010d416ae8740a8e8ad06b9755032e9c37314d0f4b4a14605599f6e4622992da1f74d933bedadc629846805467182acf187
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0
-
Filesize
126KB
MD59dc6cd88d90494886eed61e71399f886
SHA1025bf374d9374a0ba4441a067afb36b49eb0aad6
SHA256f63560ea9a9704044f2f944e98bc88c45078725413d0e5cd6082a6e61555298b
SHA5124cbd86aa92897c45805d64a9195f4d37e8ecec2864d8c9af47be86bfce58c5c52db805c2240861f292be57936a425eb7d8cf44778403444d8c802d30c017cfe0