Analysis
-
max time kernel
12s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 18:08
Behavioral task
behavioral1
Sample
522adad0782501491314a78c7f32006b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
522adad0782501491314a78c7f32006b.dll
Resource
win10v2004-20220812-en
General
-
Target
522adad0782501491314a78c7f32006b.dll
-
Size
126KB
-
MD5
522adad0782501491314a78c7f32006b
-
SHA1
e487edceeef3a41e2a8eea1e684bcbc3b39adb97
-
SHA256
351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
-
SHA512
5f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
SSDEEP
3072:ox7pOYzBekEmWDWCMq6As523HeS9FAiZ87vO2rlL3Rnu9:ox7ZNhE/dMq6AO0a7vVlT
Malware Config
Signatures
-
Detect Amadey credential stealer module 1 IoCs
resource yara_rule behavioral1/memory/1704-56-0x0000000000180000-0x00000000001A4000-memory.dmp amadey_cred_module -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1248 1704 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 rundll32.exe 1704 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1376 wrote to memory of 1704 1376 rundll32.exe 28 PID 1704 wrote to memory of 1248 1704 rundll32.exe 29 PID 1704 wrote to memory of 1248 1704 rundll32.exe 29 PID 1704 wrote to memory of 1248 1704 rundll32.exe 29 PID 1704 wrote to memory of 1248 1704 rundll32.exe 29 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\522adad0782501491314a78c7f32006b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\522adad0782501491314a78c7f32006b.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 4563⤵
- Program crash
PID:1248
-
-