Analysis
-
max time kernel
135s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 23:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
205KB
-
MD5
5b5edfc24370bad200860929d26d87d0
-
SHA1
bd666906972f8321b5eb25b5541ea42875cc38be
-
SHA256
1466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
-
SHA512
1bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
SSDEEP
3072:hdhslJFGwEiOD5srHkWiRi5k/G8JAUJxX8VdJ2WBiCB4QFjEvn2n:XSYwEzJJGEAUJtIdEWBiCB
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 6 1812 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
rovwer.exerovwer.exerovwer.exepid process 576 rovwer.exe 1976 rovwer.exe 1616 rovwer.exe -
Loads dropped DLL 6 IoCs
Processes:
file.exerundll32.exepid process 360 file.exe 360 file.exe 1812 rundll32.exe 1812 rundll32.exe 1812 rundll32.exe 1812 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 1812 rundll32.exe 1812 rundll32.exe 1812 rundll32.exe 1812 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
file.exerovwer.exetaskeng.exedescription pid process target process PID 360 wrote to memory of 576 360 file.exe rovwer.exe PID 360 wrote to memory of 576 360 file.exe rovwer.exe PID 360 wrote to memory of 576 360 file.exe rovwer.exe PID 360 wrote to memory of 576 360 file.exe rovwer.exe PID 576 wrote to memory of 1160 576 rovwer.exe schtasks.exe PID 576 wrote to memory of 1160 576 rovwer.exe schtasks.exe PID 576 wrote to memory of 1160 576 rovwer.exe schtasks.exe PID 576 wrote to memory of 1160 576 rovwer.exe schtasks.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 576 wrote to memory of 1812 576 rovwer.exe rundll32.exe PID 604 wrote to memory of 1976 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1976 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1976 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1976 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1616 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1616 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1616 604 taskeng.exe rovwer.exe PID 604 wrote to memory of 1616 604 taskeng.exe rovwer.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1160 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1812
-
C:\Windows\system32\taskeng.exetaskeng.exe {D46A2EBE-D1D5-4A5E-BAD4-131A30BABF6C} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD55b5edfc24370bad200860929d26d87d0
SHA1bd666906972f8321b5eb25b5541ea42875cc38be
SHA2561466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
SHA5121bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
Filesize
205KB
MD55b5edfc24370bad200860929d26d87d0
SHA1bd666906972f8321b5eb25b5541ea42875cc38be
SHA2561466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
SHA5121bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
Filesize
205KB
MD55b5edfc24370bad200860929d26d87d0
SHA1bd666906972f8321b5eb25b5541ea42875cc38be
SHA2561466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
SHA5121bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
Filesize
205KB
MD55b5edfc24370bad200860929d26d87d0
SHA1bd666906972f8321b5eb25b5541ea42875cc38be
SHA2561466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
SHA5121bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
205KB
MD55b5edfc24370bad200860929d26d87d0
SHA1bd666906972f8321b5eb25b5541ea42875cc38be
SHA2561466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
SHA5121bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
Filesize
205KB
MD55b5edfc24370bad200860929d26d87d0
SHA1bd666906972f8321b5eb25b5541ea42875cc38be
SHA2561466289457fd8b94f468b6a93503a9a1a3b2cb7982b6596a9a6ef4106a05b4d3
SHA5121bde7e162550e4555a8aa56fc8187890fe1b7900828c1608da02d658a06d07836d6cd88887db8f4711d8a26f9e6268419d7316c951ee9f9a9da6b2ca2d81bb04
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029