Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 13:00

General

  • Target

    4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a.exe

  • Size

    323KB

  • MD5

    ca267d8e4179ecfa2bcb5e938aa08ae8

  • SHA1

    abd245807adca9204a019938d48b20e0c9aa5c81

  • SHA256

    4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a

  • SHA512

    e6245b2ad0e35fb58efdb8974929afbd6b1ab2216a7047ba7701cee5aea334b9b691122d4e2e3b0d5c8c644454714a5b77519822c3c1a0065305fd234f64ee78

  • SSDEEP

    3072:c+pIiXmfdgA5LcY+uL+ji72c+894khYxHyYTuE90BnlZbm+b0fF:iieGaffCc+3xSZEGBlpbO

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a.exe
    "C:\Users\Admin\AppData\Local\Temp\4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:480
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:1292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 912
      2⤵
      • Program crash
      PID:4872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4528 -ip 4528
    1⤵
      PID:4972
    • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      1⤵
      • Executes dropped EXE
      PID:3176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 420
        2⤵
        • Program crash
        PID:3476
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3176 -ip 3176
      1⤵
        PID:2484
      • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
        C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
        1⤵
        • Executes dropped EXE
        PID:3000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 432
          2⤵
          • Program crash
          PID:2820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3000 -ip 3000
        1⤵
          PID:4400
        • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
          C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
          1⤵
          • Executes dropped EXE
          PID:4772
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 424
            2⤵
            • Program crash
            PID:2588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4772 -ip 4772
          1⤵
            PID:2796

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                  Filesize

                  323KB

                  MD5

                  ca267d8e4179ecfa2bcb5e938aa08ae8

                  SHA1

                  abd245807adca9204a019938d48b20e0c9aa5c81

                  SHA256

                  4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a

                  SHA512

                  e6245b2ad0e35fb58efdb8974929afbd6b1ab2216a7047ba7701cee5aea334b9b691122d4e2e3b0d5c8c644454714a5b77519822c3c1a0065305fd234f64ee78

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                  Filesize

                  323KB

                  MD5

                  ca267d8e4179ecfa2bcb5e938aa08ae8

                  SHA1

                  abd245807adca9204a019938d48b20e0c9aa5c81

                  SHA256

                  4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a

                  SHA512

                  e6245b2ad0e35fb58efdb8974929afbd6b1ab2216a7047ba7701cee5aea334b9b691122d4e2e3b0d5c8c644454714a5b77519822c3c1a0065305fd234f64ee78

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                  Filesize

                  323KB

                  MD5

                  ca267d8e4179ecfa2bcb5e938aa08ae8

                  SHA1

                  abd245807adca9204a019938d48b20e0c9aa5c81

                  SHA256

                  4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a

                  SHA512

                  e6245b2ad0e35fb58efdb8974929afbd6b1ab2216a7047ba7701cee5aea334b9b691122d4e2e3b0d5c8c644454714a5b77519822c3c1a0065305fd234f64ee78

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                  Filesize

                  323KB

                  MD5

                  ca267d8e4179ecfa2bcb5e938aa08ae8

                  SHA1

                  abd245807adca9204a019938d48b20e0c9aa5c81

                  SHA256

                  4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a

                  SHA512

                  e6245b2ad0e35fb58efdb8974929afbd6b1ab2216a7047ba7701cee5aea334b9b691122d4e2e3b0d5c8c644454714a5b77519822c3c1a0065305fd234f64ee78

                • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                  Filesize

                  323KB

                  MD5

                  ca267d8e4179ecfa2bcb5e938aa08ae8

                  SHA1

                  abd245807adca9204a019938d48b20e0c9aa5c81

                  SHA256

                  4c9a6c5a4c9e911551211faac550d05cc1dd30bd61da68fdf21537dda8c1c91a

                  SHA512

                  e6245b2ad0e35fb58efdb8974929afbd6b1ab2216a7047ba7701cee5aea334b9b691122d4e2e3b0d5c8c644454714a5b77519822c3c1a0065305fd234f64ee78

                • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll

                  Filesize

                  126KB

                  MD5

                  b8d80046e28849a320a3dcd868b73d7c

                  SHA1

                  f15bc4a4c5189e7aa845213469c6def5afd68186

                  SHA256

                  d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a

                  SHA512

                  b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e

                • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll

                  Filesize

                  126KB

                  MD5

                  b8d80046e28849a320a3dcd868b73d7c

                  SHA1

                  f15bc4a4c5189e7aa845213469c6def5afd68186

                  SHA256

                  d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a

                  SHA512

                  b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e

                • memory/3000-153-0x0000000000400000-0x0000000000855000-memory.dmp

                  Filesize

                  4.3MB

                • memory/3000-152-0x0000000000B5E000-0x0000000000B7D000-memory.dmp

                  Filesize

                  124KB

                • memory/3176-146-0x0000000000B6E000-0x0000000000B8D000-memory.dmp

                  Filesize

                  124KB

                • memory/3176-147-0x0000000000400000-0x0000000000855000-memory.dmp

                  Filesize

                  4.3MB

                • memory/4528-139-0x0000000000400000-0x0000000000855000-memory.dmp

                  Filesize

                  4.3MB

                • memory/4528-133-0x00000000009B0000-0x00000000009EE000-memory.dmp

                  Filesize

                  248KB

                • memory/4528-134-0x0000000000400000-0x0000000000855000-memory.dmp

                  Filesize

                  4.3MB

                • memory/4528-138-0x0000000000A4B000-0x0000000000A6A000-memory.dmp

                  Filesize

                  124KB

                • memory/4528-132-0x0000000000A4B000-0x0000000000A6A000-memory.dmp

                  Filesize

                  124KB

                • memory/4928-144-0x0000000000400000-0x0000000000855000-memory.dmp

                  Filesize

                  4.3MB

                • memory/4928-143-0x000000000091A000-0x0000000000939000-memory.dmp

                  Filesize

                  124KB

                • memory/4928-141-0x0000000000400000-0x0000000000855000-memory.dmp

                  Filesize

                  4.3MB

                • memory/4928-140-0x000000000091A000-0x0000000000939000-memory.dmp

                  Filesize

                  124KB