Analysis
-
max time kernel
99s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
22/11/2022, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe
Resource
win10-20220901-en
General
-
Target
e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe
-
Size
244KB
-
MD5
e75c8ed92711e3858ac326764aeef26d
-
SHA1
c5c560db9d4b9c6af39aa8fdb7128d815df26b5b
-
SHA256
e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88
-
SHA512
ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34
-
SSDEEP
6144:f9zFmjx9DENbR6T1iPIxkWBREJRNb2rRSIz:f90jx9D2PIxkAsNbKSI
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Detect Amadey credential stealer module 3 IoCs
resource yara_rule behavioral1/files/0x000200000001557a-407.dat amadey_cred_module behavioral1/files/0x000200000001557a-409.dat amadey_cred_module behavioral1/files/0x000200000001557a-408.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 4716 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1140 rovwer.exe 4912 rovwer.exe 2152 rovwer.exe -
Loads dropped DLL 2 IoCs
pid Process 4716 rundll32.exe 4716 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4716 rundll32.exe 4716 rundll32.exe 4716 rundll32.exe 4716 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1140 2848 e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe 66 PID 2848 wrote to memory of 1140 2848 e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe 66 PID 2848 wrote to memory of 1140 2848 e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe 66 PID 1140 wrote to memory of 736 1140 rovwer.exe 67 PID 1140 wrote to memory of 736 1140 rovwer.exe 67 PID 1140 wrote to memory of 736 1140 rovwer.exe 67 PID 1140 wrote to memory of 3692 1140 rovwer.exe 68 PID 1140 wrote to memory of 3692 1140 rovwer.exe 68 PID 1140 wrote to memory of 3692 1140 rovwer.exe 68 PID 3692 wrote to memory of 4100 3692 cmd.exe 71 PID 3692 wrote to memory of 4100 3692 cmd.exe 71 PID 3692 wrote to memory of 4100 3692 cmd.exe 71 PID 3692 wrote to memory of 4828 3692 cmd.exe 72 PID 3692 wrote to memory of 4828 3692 cmd.exe 72 PID 3692 wrote to memory of 4828 3692 cmd.exe 72 PID 3692 wrote to memory of 4420 3692 cmd.exe 73 PID 3692 wrote to memory of 4420 3692 cmd.exe 73 PID 3692 wrote to memory of 4420 3692 cmd.exe 73 PID 3692 wrote to memory of 5012 3692 cmd.exe 74 PID 3692 wrote to memory of 5012 3692 cmd.exe 74 PID 3692 wrote to memory of 5012 3692 cmd.exe 74 PID 3692 wrote to memory of 4924 3692 cmd.exe 75 PID 3692 wrote to memory of 4924 3692 cmd.exe 75 PID 3692 wrote to memory of 4924 3692 cmd.exe 75 PID 3692 wrote to memory of 4964 3692 cmd.exe 76 PID 3692 wrote to memory of 4964 3692 cmd.exe 76 PID 3692 wrote to memory of 4964 3692 cmd.exe 76 PID 1140 wrote to memory of 4716 1140 rovwer.exe 78 PID 1140 wrote to memory of 4716 1140 rovwer.exe 78 PID 1140 wrote to memory of 4716 1140 rovwer.exe 78 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe"C:\Users\Admin\AppData\Local\Temp\e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:4828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:4924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:4964
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:4912
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5e75c8ed92711e3858ac326764aeef26d
SHA1c5c560db9d4b9c6af39aa8fdb7128d815df26b5b
SHA256e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88
SHA512ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34
-
Filesize
244KB
MD5e75c8ed92711e3858ac326764aeef26d
SHA1c5c560db9d4b9c6af39aa8fdb7128d815df26b5b
SHA256e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88
SHA512ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34
-
Filesize
244KB
MD5e75c8ed92711e3858ac326764aeef26d
SHA1c5c560db9d4b9c6af39aa8fdb7128d815df26b5b
SHA256e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88
SHA512ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34
-
Filesize
244KB
MD5e75c8ed92711e3858ac326764aeef26d
SHA1c5c560db9d4b9c6af39aa8fdb7128d815df26b5b
SHA256e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88
SHA512ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34
-
Filesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302
-
Filesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302
-
Filesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302