Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2022 16:30

General

  • Target

    25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f.exe

  • Size

    292KB

  • MD5

    babcbe1b890df261b78a4c0aeee96f3e

  • SHA1

    751bae1e65f28df5f5d9e80aa118c0d85fadf745

  • SHA256

    25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f

  • SHA512

    139f8ca674e9e5a614e1593819b8c741b8101c64d62fcf025de4e62744fdfab69f0b977cc5de378e74bec3f414287f046cbf080249da751f23e8c2dff4548757

  • SSDEEP

    6144:GiOHTLUCOGZiy/lR/0E4vs7O4dswTf0K:GtHTLUJjWlKEV9cK

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f.exe
    "C:\Users\Admin\AppData\Local\Temp\25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1260
      • C:\Users\Admin\AppData\Local\Temp\1000177001\son.exe
        "C:\Users\Admin\AppData\Local\Temp\1000177001\son.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1268
          4⤵
          • Program crash
          PID:4964
      • C:\Users\Admin\AppData\Local\Temp\1000178001\HVNC.exe
        "C:\Users\Admin\AppData\Local\Temp\1000178001\HVNC.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\1000178001\HVNC.exe") & (start "" "C:\ProgramData\080df012.exe")
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4508
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            5⤵
            • Runs ping.exe
            PID:4196
          • C:\ProgramData\080df012.exe
            "C:\ProgramData\080df012.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1896
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:2332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 1276
      2⤵
      • Program crash
      PID:2004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1780 -ip 1780
    1⤵
      PID:4864
    • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      1⤵
      • Executes dropped EXE
      PID:2008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 316
        2⤵
        • Program crash
        PID:2904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2008 -ip 2008
      1⤵
        PID:4504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2516 -ip 2516
        1⤵
          PID:2428
        • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
          C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
          1⤵
          • Executes dropped EXE
          PID:3860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 320
            2⤵
            • Program crash
            PID:3224
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3860 -ip 3860
          1⤵
            PID:4328
          • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
            C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
            1⤵
            • Executes dropped EXE
            PID:4620
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 316
              2⤵
              • Program crash
              PID:256
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4620 -ip 4620
            1⤵
              PID:3704

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\080df012.exe

              Filesize

              92KB

              MD5

              6ecf287cf8d64e1efb5282166ca5c848

              SHA1

              44c04b9927d0ff82901205d53e274369a1dbcdc5

              SHA256

              91c9e06e0ff399a4eff06cbd2a5512a6144af70de685a26239b02194412faa28

              SHA512

              a591ce0eee936f947b06fbca22e145137ce7745c12a7f46dd380f2898bc9f7c8d9707a55a4562911f10336ebe0a5399cf9dbdc8addb0b32aa1c75e6bcdbf4418

            • C:\ProgramData\080df012.exe

              Filesize

              92KB

              MD5

              6ecf287cf8d64e1efb5282166ca5c848

              SHA1

              44c04b9927d0ff82901205d53e274369a1dbcdc5

              SHA256

              91c9e06e0ff399a4eff06cbd2a5512a6144af70de685a26239b02194412faa28

              SHA512

              a591ce0eee936f947b06fbca22e145137ce7745c12a7f46dd380f2898bc9f7c8d9707a55a4562911f10336ebe0a5399cf9dbdc8addb0b32aa1c75e6bcdbf4418

            • C:\Users\Admin\AppData\Local\Temp\1000177001\son.exe

              Filesize

              370KB

              MD5

              67a7f19cac4d3564e407e6a7a247b747

              SHA1

              2c9f9a5fdc7f422b49f73ca76d067462a4ed30b8

              SHA256

              1c0e791df8978b5e021f436c201a926d537824af0619f75aa188e57a9c84cdd0

              SHA512

              1d4b568bc05c1c295769256c55b64c63465d93f941f8af675283b6e42d42f0a0c0d8a30ba299e5c3906a20eb054b0eb60f3d264598a1da50ee96d25ed8445812

            • C:\Users\Admin\AppData\Local\Temp\1000177001\son.exe

              Filesize

              370KB

              MD5

              67a7f19cac4d3564e407e6a7a247b747

              SHA1

              2c9f9a5fdc7f422b49f73ca76d067462a4ed30b8

              SHA256

              1c0e791df8978b5e021f436c201a926d537824af0619f75aa188e57a9c84cdd0

              SHA512

              1d4b568bc05c1c295769256c55b64c63465d93f941f8af675283b6e42d42f0a0c0d8a30ba299e5c3906a20eb054b0eb60f3d264598a1da50ee96d25ed8445812

            • C:\Users\Admin\AppData\Local\Temp\1000178001\HVNC.exe

              Filesize

              92KB

              MD5

              6ecf287cf8d64e1efb5282166ca5c848

              SHA1

              44c04b9927d0ff82901205d53e274369a1dbcdc5

              SHA256

              91c9e06e0ff399a4eff06cbd2a5512a6144af70de685a26239b02194412faa28

              SHA512

              a591ce0eee936f947b06fbca22e145137ce7745c12a7f46dd380f2898bc9f7c8d9707a55a4562911f10336ebe0a5399cf9dbdc8addb0b32aa1c75e6bcdbf4418

            • C:\Users\Admin\AppData\Local\Temp\1000178001\HVNC.exe

              Filesize

              92KB

              MD5

              6ecf287cf8d64e1efb5282166ca5c848

              SHA1

              44c04b9927d0ff82901205d53e274369a1dbcdc5

              SHA256

              91c9e06e0ff399a4eff06cbd2a5512a6144af70de685a26239b02194412faa28

              SHA512

              a591ce0eee936f947b06fbca22e145137ce7745c12a7f46dd380f2898bc9f7c8d9707a55a4562911f10336ebe0a5399cf9dbdc8addb0b32aa1c75e6bcdbf4418

            • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

              Filesize

              292KB

              MD5

              babcbe1b890df261b78a4c0aeee96f3e

              SHA1

              751bae1e65f28df5f5d9e80aa118c0d85fadf745

              SHA256

              25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f

              SHA512

              139f8ca674e9e5a614e1593819b8c741b8101c64d62fcf025de4e62744fdfab69f0b977cc5de378e74bec3f414287f046cbf080249da751f23e8c2dff4548757

            • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

              Filesize

              292KB

              MD5

              babcbe1b890df261b78a4c0aeee96f3e

              SHA1

              751bae1e65f28df5f5d9e80aa118c0d85fadf745

              SHA256

              25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f

              SHA512

              139f8ca674e9e5a614e1593819b8c741b8101c64d62fcf025de4e62744fdfab69f0b977cc5de378e74bec3f414287f046cbf080249da751f23e8c2dff4548757

            • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

              Filesize

              292KB

              MD5

              babcbe1b890df261b78a4c0aeee96f3e

              SHA1

              751bae1e65f28df5f5d9e80aa118c0d85fadf745

              SHA256

              25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f

              SHA512

              139f8ca674e9e5a614e1593819b8c741b8101c64d62fcf025de4e62744fdfab69f0b977cc5de378e74bec3f414287f046cbf080249da751f23e8c2dff4548757

            • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

              Filesize

              292KB

              MD5

              babcbe1b890df261b78a4c0aeee96f3e

              SHA1

              751bae1e65f28df5f5d9e80aa118c0d85fadf745

              SHA256

              25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f

              SHA512

              139f8ca674e9e5a614e1593819b8c741b8101c64d62fcf025de4e62744fdfab69f0b977cc5de378e74bec3f414287f046cbf080249da751f23e8c2dff4548757

            • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

              Filesize

              292KB

              MD5

              babcbe1b890df261b78a4c0aeee96f3e

              SHA1

              751bae1e65f28df5f5d9e80aa118c0d85fadf745

              SHA256

              25b66c1e79774e362628fbdd7d2a1ef63fbcb738210ec34b66cfc96bc2fd020f

              SHA512

              139f8ca674e9e5a614e1593819b8c741b8101c64d62fcf025de4e62744fdfab69f0b977cc5de378e74bec3f414287f046cbf080249da751f23e8c2dff4548757

            • C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

              Filesize

              126KB

              MD5

              e92a6a3a013a87cf57f3753d77a1b9c9

              SHA1

              01366b392cb71fed71f5bc1cd09e0f8c76657519

              SHA256

              42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

              SHA512

              c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

            • C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

              Filesize

              126KB

              MD5

              e92a6a3a013a87cf57f3753d77a1b9c9

              SHA1

              01366b392cb71fed71f5bc1cd09e0f8c76657519

              SHA256

              42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

              SHA512

              c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

            • memory/816-146-0x0000000000000000-mapping.dmp

            • memory/1260-141-0x0000000000000000-mapping.dmp

            • memory/1780-138-0x0000000002C97000-0x0000000002CB5000-memory.dmp

              Filesize

              120KB

            • memory/1780-139-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/1780-132-0x0000000002C97000-0x0000000002CB5000-memory.dmp

              Filesize

              120KB

            • memory/1780-134-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/1780-133-0x0000000003090000-0x00000000030CA000-memory.dmp

              Filesize

              232KB

            • memory/1896-164-0x0000000000000000-mapping.dmp

            • memory/2008-174-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/2008-163-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/2008-162-0x0000000002D9A000-0x0000000002DB7000-memory.dmp

              Filesize

              116KB

            • memory/2332-176-0x0000000000000000-mapping.dmp

            • memory/2516-158-0x0000000007C00000-0x0000000007C3C000-memory.dmp

              Filesize

              240KB

            • memory/2516-172-0x0000000009120000-0x000000000964C000-memory.dmp

              Filesize

              5.2MB

            • memory/2516-143-0x0000000000000000-mapping.dmp

            • memory/2516-149-0x0000000002F67000-0x0000000002F98000-memory.dmp

              Filesize

              196KB

            • memory/2516-175-0x0000000000400000-0x0000000002C4A000-memory.dmp

              Filesize

              40.3MB

            • memory/2516-156-0x0000000007AB0000-0x0000000007BBA000-memory.dmp

              Filesize

              1.0MB

            • memory/2516-155-0x0000000007C90000-0x00000000082A8000-memory.dmp

              Filesize

              6.1MB

            • memory/2516-153-0x0000000007960000-0x00000000079F2000-memory.dmp

              Filesize

              584KB

            • memory/2516-152-0x0000000007330000-0x00000000078D4000-memory.dmp

              Filesize

              5.6MB

            • memory/2516-151-0x0000000000400000-0x0000000002C4A000-memory.dmp

              Filesize

              40.3MB

            • memory/2516-167-0x0000000002F67000-0x0000000002F98000-memory.dmp

              Filesize

              196KB

            • memory/2516-168-0x0000000008520000-0x0000000008586000-memory.dmp

              Filesize

              408KB

            • memory/2516-169-0x0000000008E50000-0x0000000008EC6000-memory.dmp

              Filesize

              472KB

            • memory/2516-170-0x0000000008EF0000-0x0000000008F40000-memory.dmp

              Filesize

              320KB

            • memory/2516-171-0x0000000008F40000-0x0000000009102000-memory.dmp

              Filesize

              1.8MB

            • memory/2516-157-0x0000000007BE0000-0x0000000007BF2000-memory.dmp

              Filesize

              72KB

            • memory/2516-173-0x0000000002F67000-0x0000000002F98000-memory.dmp

              Filesize

              196KB

            • memory/2516-150-0x0000000002EA0000-0x0000000002EDE000-memory.dmp

              Filesize

              248KB

            • memory/3860-181-0x0000000002C40000-0x0000000002D40000-memory.dmp

              Filesize

              1024KB

            • memory/3860-182-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/3860-183-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/4196-161-0x0000000000000000-mapping.dmp

            • memory/4508-160-0x0000000000000000-mapping.dmp

            • memory/4620-185-0x0000000002DEA000-0x0000000002E07000-memory.dmp

              Filesize

              116KB

            • memory/4620-186-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/5104-159-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/5104-142-0x0000000000400000-0x0000000002C36000-memory.dmp

              Filesize

              40.2MB

            • memory/5104-140-0x0000000002DB6000-0x0000000002DD3000-memory.dmp

              Filesize

              116KB

            • memory/5104-135-0x0000000000000000-mapping.dmp