Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
cc45008bf7a9084c41e01160bdbce48f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc45008bf7a9084c41e01160bdbce48f.exe
Resource
win10v2004-20220812-en
General
-
Target
cc45008bf7a9084c41e01160bdbce48f.exe
-
Size
359KB
-
MD5
cc45008bf7a9084c41e01160bdbce48f
-
SHA1
56e0748a4dbe096a8485b6927a5f334a400aa63f
-
SHA256
5435aa5c4bdfd1c62ed1375874247095df1c880dccb090f5f8820bcf6872e538
-
SHA512
4450f7f390fcfe3219865d2ddde4d6ee0d74d4257fb98d518fed9aba2f731ea1b82651e7f6741d3308d766e13454ea1be99cf7f6ebfa75a17f6bff81fe1db4e2
-
SSDEEP
6144:zw3SO29W5VRPmulFd/as4Xwre+9sUP658I6srz7ITsq:zw3Q9W5VRP5HBywrT9sUa8Iz7
Malware Config
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022f73-145.dat amadey_cred_module behavioral2/files/0x0006000000022f73-146.dat amadey_cred_module behavioral2/files/0x0006000000022f73-147.dat amadey_cred_module behavioral2/memory/336-148-0x00000000006E0000-0x0000000000704000-memory.dmp amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 36 336 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cc45008bf7a9084c41e01160bdbce48f.exe -
Loads dropped DLL 2 IoCs
pid Process 336 rundll32.exe 336 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2292 4584 WerFault.exe 75 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 336 rundll32.exe 336 rundll32.exe 336 rundll32.exe 336 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4584 wrote to memory of 1216 4584 cc45008bf7a9084c41e01160bdbce48f.exe 77 PID 4584 wrote to memory of 1216 4584 cc45008bf7a9084c41e01160bdbce48f.exe 77 PID 4584 wrote to memory of 1216 4584 cc45008bf7a9084c41e01160bdbce48f.exe 77 PID 1216 wrote to memory of 2416 1216 rovwer.exe 81 PID 1216 wrote to memory of 2416 1216 rovwer.exe 81 PID 1216 wrote to memory of 2416 1216 rovwer.exe 81 PID 1216 wrote to memory of 336 1216 rovwer.exe 92 PID 1216 wrote to memory of 336 1216 rovwer.exe 92 PID 1216 wrote to memory of 336 1216 rovwer.exe 92 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc45008bf7a9084c41e01160bdbce48f.exe"C:\Users\Admin\AppData\Local\Temp\cc45008bf7a9084c41e01160bdbce48f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:2416
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 11402⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4584 -ip 45841⤵PID:1684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5cc45008bf7a9084c41e01160bdbce48f
SHA156e0748a4dbe096a8485b6927a5f334a400aa63f
SHA2565435aa5c4bdfd1c62ed1375874247095df1c880dccb090f5f8820bcf6872e538
SHA5124450f7f390fcfe3219865d2ddde4d6ee0d74d4257fb98d518fed9aba2f731ea1b82651e7f6741d3308d766e13454ea1be99cf7f6ebfa75a17f6bff81fe1db4e2
-
Filesize
359KB
MD5cc45008bf7a9084c41e01160bdbce48f
SHA156e0748a4dbe096a8485b6927a5f334a400aa63f
SHA2565435aa5c4bdfd1c62ed1375874247095df1c880dccb090f5f8820bcf6872e538
SHA5124450f7f390fcfe3219865d2ddde4d6ee0d74d4257fb98d518fed9aba2f731ea1b82651e7f6741d3308d766e13454ea1be99cf7f6ebfa75a17f6bff81fe1db4e2
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7