Analysis
-
max time kernel
157s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 00:26
Static task
static1
Behavioral task
behavioral1
Sample
679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe
Resource
win10v2004-20220812-en
General
-
Target
679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe
-
Size
188KB
-
MD5
a1869e1eecba9d00d4de3c9f274374ad
-
SHA1
5dbefd0a2c7b3bd79a7664ff9ca517a4257b42f9
-
SHA256
679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611
-
SHA512
2a6bf01aa251d3b44642c8c6ed92bbdb6b6f9ac4cfb707b6b98982568ccfad985da7f22018da3bdc8a120836e6de3422569023aa16d28af3ebc80c921a77e891
-
SSDEEP
3072:CH9bzazHTZrY/TxLiUE41a9B2D5E5JLmr6CzHyTut8IQZB0YZ9Y2Ozh:o9idiLjE4sBfJeHybRZnZ9VO9
Malware Config
Extracted
amadey
3.50
77.73.134.65/o7VsjdSa2f/index.php
Signatures
-
Detect Amadey credential stealer module 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll amadey_cred_module behavioral1/memory/2920-211-0x0000000000570000-0x0000000000594000-memory.dmp amadey_cred_module -
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1232-133-0x0000000000710000-0x0000000000719000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 89 2920 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
9105.exe9BA5.exegntuud.exe7EC.exegntuud.exepid process 684 9105.exe 4168 9BA5.exe 1580 gntuud.exe 680 7EC.exe 1848 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9BA5.exegntuud.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 9BA5.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 2920 rundll32.exe 2920 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7EC.exedescription pid process target process PID 680 set thread context of 724 680 7EC.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1312 684 WerFault.exe 9105.exe 2492 680 WerFault.exe 7EC.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exepid process 1232 679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe 1232 679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3060 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exepid process 1232 679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
9BA5.exegntuud.exe7EC.exedescription pid process target process PID 3060 wrote to memory of 684 3060 9105.exe PID 3060 wrote to memory of 684 3060 9105.exe PID 3060 wrote to memory of 684 3060 9105.exe PID 3060 wrote to memory of 4168 3060 9BA5.exe PID 3060 wrote to memory of 4168 3060 9BA5.exe PID 3060 wrote to memory of 4168 3060 9BA5.exe PID 4168 wrote to memory of 1580 4168 9BA5.exe gntuud.exe PID 4168 wrote to memory of 1580 4168 9BA5.exe gntuud.exe PID 4168 wrote to memory of 1580 4168 9BA5.exe gntuud.exe PID 1580 wrote to memory of 924 1580 gntuud.exe schtasks.exe PID 1580 wrote to memory of 924 1580 gntuud.exe schtasks.exe PID 1580 wrote to memory of 924 1580 gntuud.exe schtasks.exe PID 3060 wrote to memory of 680 3060 7EC.exe PID 3060 wrote to memory of 680 3060 7EC.exe PID 3060 wrote to memory of 680 3060 7EC.exe PID 3060 wrote to memory of 1124 3060 explorer.exe PID 3060 wrote to memory of 1124 3060 explorer.exe PID 3060 wrote to memory of 1124 3060 explorer.exe PID 3060 wrote to memory of 1124 3060 explorer.exe PID 680 wrote to memory of 724 680 7EC.exe vbc.exe PID 680 wrote to memory of 724 680 7EC.exe vbc.exe PID 680 wrote to memory of 724 680 7EC.exe vbc.exe PID 680 wrote to memory of 724 680 7EC.exe vbc.exe PID 3060 wrote to memory of 4456 3060 explorer.exe PID 3060 wrote to memory of 4456 3060 explorer.exe PID 3060 wrote to memory of 4456 3060 explorer.exe PID 680 wrote to memory of 724 680 7EC.exe vbc.exe PID 3060 wrote to memory of 2808 3060 explorer.exe PID 3060 wrote to memory of 2808 3060 explorer.exe PID 3060 wrote to memory of 2808 3060 explorer.exe PID 3060 wrote to memory of 2808 3060 explorer.exe PID 3060 wrote to memory of 1012 3060 explorer.exe PID 3060 wrote to memory of 1012 3060 explorer.exe PID 3060 wrote to memory of 1012 3060 explorer.exe PID 3060 wrote to memory of 3956 3060 explorer.exe PID 3060 wrote to memory of 3956 3060 explorer.exe PID 3060 wrote to memory of 3956 3060 explorer.exe PID 3060 wrote to memory of 3956 3060 explorer.exe PID 3060 wrote to memory of 3236 3060 explorer.exe PID 3060 wrote to memory of 3236 3060 explorer.exe PID 3060 wrote to memory of 3236 3060 explorer.exe PID 3060 wrote to memory of 3236 3060 explorer.exe PID 3060 wrote to memory of 2608 3060 explorer.exe PID 3060 wrote to memory of 2608 3060 explorer.exe PID 3060 wrote to memory of 2608 3060 explorer.exe PID 3060 wrote to memory of 2608 3060 explorer.exe PID 3060 wrote to memory of 5036 3060 explorer.exe PID 3060 wrote to memory of 5036 3060 explorer.exe PID 3060 wrote to memory of 5036 3060 explorer.exe PID 3060 wrote to memory of 4484 3060 explorer.exe PID 3060 wrote to memory of 4484 3060 explorer.exe PID 3060 wrote to memory of 4484 3060 explorer.exe PID 3060 wrote to memory of 4484 3060 explorer.exe PID 1580 wrote to memory of 2920 1580 gntuud.exe rundll32.exe PID 1580 wrote to memory of 2920 1580 gntuud.exe rundll32.exe PID 1580 wrote to memory of 2920 1580 gntuud.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe"C:\Users\Admin\AppData\Local\Temp\679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1232
-
C:\Users\Admin\AppData\Local\Temp\9105.exeC:\Users\Admin\AppData\Local\Temp\9105.exe1⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 4362⤵
- Program crash
PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 684 -ip 6841⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\9BA5.exeC:\Users\Admin\AppData\Local\Temp\9BA5.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:924 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:2920
-
C:\Users\Admin\AppData\Local\Temp\7EC.exeC:\Users\Admin\AppData\Local\Temp\7EC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 2482⤵
- Program crash
PID:2492
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1124
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 680 -ip 6801⤵PID:3820
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1012
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3956
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3236
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2608
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5036
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exeC:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe1⤵
- Executes dropped EXE
PID:1848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD527b75158dcfeba6b3419bdbb15397584
SHA18a135c4fc3fa7e06bf29537f9cb0298cc2f1c1de
SHA256a6ffd97ca5d47f2251a53ccd3ab891a9fec5b7d0f316b4c11e7d88f19765b1b4
SHA512eb9acc530d9c20dc26a00489572fe5b21075181f5f25d6598ebd5292aef5bbce9c2dc89fac04201ea7ce5c5faec545e44c02e54356ae6dfda7d2f70255a930b3
-
Filesize
3.7MB
MD527b75158dcfeba6b3419bdbb15397584
SHA18a135c4fc3fa7e06bf29537f9cb0298cc2f1c1de
SHA256a6ffd97ca5d47f2251a53ccd3ab891a9fec5b7d0f316b4c11e7d88f19765b1b4
SHA512eb9acc530d9c20dc26a00489572fe5b21075181f5f25d6598ebd5292aef5bbce9c2dc89fac04201ea7ce5c5faec545e44c02e54356ae6dfda7d2f70255a930b3
-
Filesize
1.0MB
MD5fc78f5650188734808f725d0934650a1
SHA1e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000
SHA256319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a
SHA512d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0
-
Filesize
1.0MB
MD5fc78f5650188734808f725d0934650a1
SHA1e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000
SHA256319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a
SHA512d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0
-
Filesize
777KB
MD547f9d8570bbbfd172ee66015af682251
SHA12040636052aed433a453ef4c0a1a6a16186e7c90
SHA2562a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3
SHA512e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c
-
Filesize
777KB
MD547f9d8570bbbfd172ee66015af682251
SHA12040636052aed433a453ef4c0a1a6a16186e7c90
SHA2562a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3
SHA512e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c
-
Filesize
777KB
MD547f9d8570bbbfd172ee66015af682251
SHA12040636052aed433a453ef4c0a1a6a16186e7c90
SHA2562a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3
SHA512e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c
-
Filesize
777KB
MD547f9d8570bbbfd172ee66015af682251
SHA12040636052aed433a453ef4c0a1a6a16186e7c90
SHA2562a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3
SHA512e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c
-
Filesize
777KB
MD547f9d8570bbbfd172ee66015af682251
SHA12040636052aed433a453ef4c0a1a6a16186e7c90
SHA2562a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3
SHA512e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c
-
Filesize
126KB
MD5f6d14701e7c568254151e153f7763672
SHA14501ffb7284f29cca51b06deba0262b8d33f93f6
SHA256e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d
SHA51262c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2
-
Filesize
126KB
MD5f6d14701e7c568254151e153f7763672
SHA14501ffb7284f29cca51b06deba0262b8d33f93f6
SHA256e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d
SHA51262c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2
-
Filesize
126KB
MD5f6d14701e7c568254151e153f7763672
SHA14501ffb7284f29cca51b06deba0262b8d33f93f6
SHA256e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d
SHA51262c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2