Analysis
-
max time kernel
110s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2022 01:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
332KB
-
MD5
e3dae8326bbf13e56a9c4664b5af6f1e
-
SHA1
0d47847829b7f7f3eb2cc0cd7b60b74c14c90225
-
SHA256
8249669b3c1bc3ad2e8d2884d72af15bc1a1fa850d45cd70a34a61031748dfe3
-
SHA512
e7823a82f7b5c2e5cf9633664043aa02677d6b07de86b0f88fa6764f86b3810177a59d4b0a77d2b7903aadf39b1f53bfa88e68cc43bd588ad4eb3f1ff6d75869
-
SSDEEP
3072:TSXCBPSmLj8FVtuk57b9dijkb8CzDnoskVwmIE7UmOaeVPQGj7urAB5IxPE/:2XCBHLIWmCE8CzDoskymUnaeVP5jBCc
Malware Config
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000600000001da0d-149.dat amadey_cred_module behavioral2/files/0x000600000001da0d-150.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 40 4184 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 1424 rovwer.exe 428 rovwer.exe 3744 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation rovwer.exe -
Loads dropped DLL 1 IoCs
pid Process 4184 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4392 3560 WerFault.exe 81 2216 428 WerFault.exe 89 396 3744 WerFault.exe 99 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3560 wrote to memory of 1424 3560 file.exe 82 PID 3560 wrote to memory of 1424 3560 file.exe 82 PID 3560 wrote to memory of 1424 3560 file.exe 82 PID 1424 wrote to memory of 5004 1424 rovwer.exe 86 PID 1424 wrote to memory of 5004 1424 rovwer.exe 86 PID 1424 wrote to memory of 5004 1424 rovwer.exe 86 PID 1424 wrote to memory of 4184 1424 rovwer.exe 98 PID 1424 wrote to memory of 4184 1424 rovwer.exe 98 PID 1424 wrote to memory of 4184 1424 rovwer.exe 98 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:5004
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 8962⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3560 -ip 35601⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeC:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe1⤵
- Executes dropped EXE
PID:428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 4242⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 428 -ip 4281⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeC:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe1⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 4162⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3744 -ip 37441⤵PID:1684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5e3dae8326bbf13e56a9c4664b5af6f1e
SHA10d47847829b7f7f3eb2cc0cd7b60b74c14c90225
SHA2568249669b3c1bc3ad2e8d2884d72af15bc1a1fa850d45cd70a34a61031748dfe3
SHA512e7823a82f7b5c2e5cf9633664043aa02677d6b07de86b0f88fa6764f86b3810177a59d4b0a77d2b7903aadf39b1f53bfa88e68cc43bd588ad4eb3f1ff6d75869
-
Filesize
332KB
MD5e3dae8326bbf13e56a9c4664b5af6f1e
SHA10d47847829b7f7f3eb2cc0cd7b60b74c14c90225
SHA2568249669b3c1bc3ad2e8d2884d72af15bc1a1fa850d45cd70a34a61031748dfe3
SHA512e7823a82f7b5c2e5cf9633664043aa02677d6b07de86b0f88fa6764f86b3810177a59d4b0a77d2b7903aadf39b1f53bfa88e68cc43bd588ad4eb3f1ff6d75869
-
Filesize
332KB
MD5e3dae8326bbf13e56a9c4664b5af6f1e
SHA10d47847829b7f7f3eb2cc0cd7b60b74c14c90225
SHA2568249669b3c1bc3ad2e8d2884d72af15bc1a1fa850d45cd70a34a61031748dfe3
SHA512e7823a82f7b5c2e5cf9633664043aa02677d6b07de86b0f88fa6764f86b3810177a59d4b0a77d2b7903aadf39b1f53bfa88e68cc43bd588ad4eb3f1ff6d75869
-
Filesize
332KB
MD5e3dae8326bbf13e56a9c4664b5af6f1e
SHA10d47847829b7f7f3eb2cc0cd7b60b74c14c90225
SHA2568249669b3c1bc3ad2e8d2884d72af15bc1a1fa850d45cd70a34a61031748dfe3
SHA512e7823a82f7b5c2e5cf9633664043aa02677d6b07de86b0f88fa6764f86b3810177a59d4b0a77d2b7903aadf39b1f53bfa88e68cc43bd588ad4eb3f1ff6d75869
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7