Analysis

  • max time kernel
    99s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/11/2022, 01:55

General

  • Target

    e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe

  • Size

    244KB

  • MD5

    e75c8ed92711e3858ac326764aeef26d

  • SHA1

    c5c560db9d4b9c6af39aa8fdb7128d815df26b5b

  • SHA256

    e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88

  • SHA512

    ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34

  • SSDEEP

    6144:f9zFmjx9DENbR6T1iPIxkWBREJRNb2rRSIz:f90jx9D2PIxkAsNbKSI

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe
    "C:\Users\Admin\AppData\Local\Temp\e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:736
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:4100
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:4828
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:4420
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:5012
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:4924
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:4964
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • outlook_win_path
                    PID:4716
              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                1⤵
                • Executes dropped EXE
                PID:4912
              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                1⤵
                • Executes dropped EXE
                PID:2152

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                      Filesize

                      244KB

                      MD5

                      e75c8ed92711e3858ac326764aeef26d

                      SHA1

                      c5c560db9d4b9c6af39aa8fdb7128d815df26b5b

                      SHA256

                      e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88

                      SHA512

                      ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                      Filesize

                      244KB

                      MD5

                      e75c8ed92711e3858ac326764aeef26d

                      SHA1

                      c5c560db9d4b9c6af39aa8fdb7128d815df26b5b

                      SHA256

                      e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88

                      SHA512

                      ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                      Filesize

                      244KB

                      MD5

                      e75c8ed92711e3858ac326764aeef26d

                      SHA1

                      c5c560db9d4b9c6af39aa8fdb7128d815df26b5b

                      SHA256

                      e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88

                      SHA512

                      ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                      Filesize

                      244KB

                      MD5

                      e75c8ed92711e3858ac326764aeef26d

                      SHA1

                      c5c560db9d4b9c6af39aa8fdb7128d815df26b5b

                      SHA256

                      e16e26958a5dae649eb08a688b94905a50582b39e6bbf9b2c9c58dd17e667a88

                      SHA512

                      ec070fa41d8352ade16d27bb775702a0cc38026e7a9bc76434f2d9dc86a916470e33a1025cbb013fd1b46bc3c0619b0fc2d2c63d4bf7df645ec3a71cb68d2d34

                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                      Filesize

                      126KB

                      MD5

                      507e9dc7b9c42f535b6df96d79179835

                      SHA1

                      acf41fb549750023115f060071aa5ca8c33f249e

                      SHA256

                      3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                      SHA512

                      70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                    • memory/1140-186-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-257-0x0000000000400000-0x00000000027F7000-memory.dmp

                      Filesize

                      36.0MB

                    • memory/1140-329-0x0000000002980000-0x00000000029BE000-memory.dmp

                      Filesize

                      248KB

                    • memory/1140-196-0x0000000002980000-0x00000000029BE000-memory.dmp

                      Filesize

                      248KB

                    • memory/1140-194-0x0000000002800000-0x00000000028AE000-memory.dmp

                      Filesize

                      696KB

                    • memory/1140-191-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-190-0x0000000002896000-0x00000000028B5000-memory.dmp

                      Filesize

                      124KB

                    • memory/1140-344-0x0000000000400000-0x00000000027F7000-memory.dmp

                      Filesize

                      36.0MB

                    • memory/1140-173-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-185-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-188-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-187-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-328-0x0000000002800000-0x00000000028AE000-memory.dmp

                      Filesize

                      696KB

                    • memory/1140-184-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-183-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-182-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-181-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-179-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-178-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-177-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-176-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-175-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1140-174-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2152-487-0x0000000000400000-0x00000000027F7000-memory.dmp

                      Filesize

                      36.0MB

                    • memory/2848-144-0x0000000002870000-0x00000000029BA000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/2848-140-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-156-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-157-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-158-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-159-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-160-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-161-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-162-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-163-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-164-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-165-0x0000000000400000-0x00000000027F7000-memory.dmp

                      Filesize

                      36.0MB

                    • memory/2848-166-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-167-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-168-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-169-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-170-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-154-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-153-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-152-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-151-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-150-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-149-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-148-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-147-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-146-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-145-0x0000000002870000-0x000000000291E000-memory.dmp

                      Filesize

                      696KB

                    • memory/2848-120-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-143-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-142-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-141-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-155-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-139-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-138-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-137-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-189-0x0000000000400000-0x00000000027F7000-memory.dmp

                      Filesize

                      36.0MB

                    • memory/2848-136-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-134-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-133-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-132-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-131-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-121-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-122-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-123-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-130-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-124-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-125-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-126-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-127-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-129-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2848-128-0x0000000077320000-0x00000000774AE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4912-365-0x0000000002ABC000-0x0000000002ADB000-memory.dmp

                      Filesize

                      124KB

                    • memory/4912-366-0x0000000000400000-0x00000000027F7000-memory.dmp

                      Filesize

                      36.0MB