Analysis

  • max time kernel
    113s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2022 23:18

General

  • Target

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe

  • Size

    293KB

  • MD5

    3a87456630da7362cc15e14b18047caf

  • SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

  • SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

  • SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • SSDEEP

    6144:0hKBmh9L7xLmywFKId798LL2oQyerjwb5a:hB+nxUd798LjQyeU5a

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe
    "C:\Users\Admin\AppData\Local\Temp\e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:456
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:1968
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {FDF4A571-95D1-4D79-BD98-4375D3A0AF57} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      2⤵
      • Executes dropped EXE
      PID:860
    • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe
      2⤵
      • Executes dropped EXE
      PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

    Filesize

    293KB

    MD5

    3a87456630da7362cc15e14b18047caf

    SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

    Filesize

    293KB

    MD5

    3a87456630da7362cc15e14b18047caf

    SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

    Filesize

    293KB

    MD5

    3a87456630da7362cc15e14b18047caf

    SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

    Filesize

    293KB

    MD5

    3a87456630da7362cc15e14b18047caf

    SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

    Filesize

    126KB

    MD5

    e92a6a3a013a87cf57f3753d77a1b9c9

    SHA1

    01366b392cb71fed71f5bc1cd09e0f8c76657519

    SHA256

    42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

    SHA512

    c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

  • \Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

    Filesize

    293KB

    MD5

    3a87456630da7362cc15e14b18047caf

    SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • \Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe

    Filesize

    293KB

    MD5

    3a87456630da7362cc15e14b18047caf

    SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • \Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

    Filesize

    126KB

    MD5

    e92a6a3a013a87cf57f3753d77a1b9c9

    SHA1

    01366b392cb71fed71f5bc1cd09e0f8c76657519

    SHA256

    42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

    SHA512

    c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

  • \Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

    Filesize

    126KB

    MD5

    e92a6a3a013a87cf57f3753d77a1b9c9

    SHA1

    01366b392cb71fed71f5bc1cd09e0f8c76657519

    SHA256

    42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

    SHA512

    c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

  • \Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

    Filesize

    126KB

    MD5

    e92a6a3a013a87cf57f3753d77a1b9c9

    SHA1

    01366b392cb71fed71f5bc1cd09e0f8c76657519

    SHA256

    42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

    SHA512

    c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

  • \Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll

    Filesize

    126KB

    MD5

    e92a6a3a013a87cf57f3753d77a1b9c9

    SHA1

    01366b392cb71fed71f5bc1cd09e0f8c76657519

    SHA256

    42a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5

    SHA512

    c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57

  • memory/860-74-0x0000000000400000-0x0000000002C37000-memory.dmp

    Filesize

    40.2MB

  • memory/860-73-0x0000000002D6A000-0x0000000002D87000-memory.dmp

    Filesize

    116KB

  • memory/944-69-0x0000000000400000-0x0000000002C37000-memory.dmp

    Filesize

    40.2MB

  • memory/944-68-0x0000000002D4A000-0x0000000002D67000-memory.dmp

    Filesize

    116KB

  • memory/944-66-0x0000000000400000-0x0000000002C37000-memory.dmp

    Filesize

    40.2MB

  • memory/944-63-0x0000000002D4A000-0x0000000002D67000-memory.dmp

    Filesize

    116KB

  • memory/1292-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB

  • memory/1292-67-0x0000000000400000-0x0000000002C37000-memory.dmp

    Filesize

    40.2MB

  • memory/1292-61-0x0000000000400000-0x0000000002C37000-memory.dmp

    Filesize

    40.2MB

  • memory/1292-59-0x0000000000220000-0x000000000025A000-memory.dmp

    Filesize

    232KB

  • memory/1292-58-0x0000000002DAA000-0x0000000002DC7000-memory.dmp

    Filesize

    116KB

  • memory/1640-86-0x0000000000400000-0x0000000002C37000-memory.dmp

    Filesize

    40.2MB