Analysis

  • max time kernel
    157s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 00:26

General

  • Target

    679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe

  • Size

    188KB

  • MD5

    a1869e1eecba9d00d4de3c9f274374ad

  • SHA1

    5dbefd0a2c7b3bd79a7664ff9ca517a4257b42f9

  • SHA256

    679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611

  • SHA512

    2a6bf01aa251d3b44642c8c6ed92bbdb6b6f9ac4cfb707b6b98982568ccfad985da7f22018da3bdc8a120836e6de3422569023aa16d28af3ebc80c921a77e891

  • SSDEEP

    3072:CH9bzazHTZrY/TxLiUE41a9B2D5E5JLmr6CzHyTut8IQZB0YZ9Y2Ozh:o9idiLjE4sBfJeHybRZnZ9VO9

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.65/o7VsjdSa2f/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 4 IoCs
  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe
    "C:\Users\Admin\AppData\Local\Temp\679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1232
  • C:\Users\Admin\AppData\Local\Temp\9105.exe
    C:\Users\Admin\AppData\Local\Temp\9105.exe
    1⤵
    • Executes dropped EXE
    PID:684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 436
      2⤵
      • Program crash
      PID:1312
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 684 -ip 684
    1⤵
      PID:1044
    • C:\Users\Admin\AppData\Local\Temp\9BA5.exe
      C:\Users\Admin\AppData\Local\Temp\9BA5.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
        "C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:924
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • outlook_win_path
          PID:2920
    • C:\Users\Admin\AppData\Local\Temp\7EC.exe
      C:\Users\Admin\AppData\Local\Temp\7EC.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:680
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
          PID:724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 248
          2⤵
          • Program crash
          PID:2492
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:1124
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:4456
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 680 -ip 680
            1⤵
              PID:3820
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:2808
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:1012
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3956
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:3236
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:2608
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:5036
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:4484
                          • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
                            C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
                            1⤵
                            • Executes dropped EXE
                            PID:1848

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\7EC.exe

                            Filesize

                            3.7MB

                            MD5

                            27b75158dcfeba6b3419bdbb15397584

                            SHA1

                            8a135c4fc3fa7e06bf29537f9cb0298cc2f1c1de

                            SHA256

                            a6ffd97ca5d47f2251a53ccd3ab891a9fec5b7d0f316b4c11e7d88f19765b1b4

                            SHA512

                            eb9acc530d9c20dc26a00489572fe5b21075181f5f25d6598ebd5292aef5bbce9c2dc89fac04201ea7ce5c5faec545e44c02e54356ae6dfda7d2f70255a930b3

                          • C:\Users\Admin\AppData\Local\Temp\7EC.exe

                            Filesize

                            3.7MB

                            MD5

                            27b75158dcfeba6b3419bdbb15397584

                            SHA1

                            8a135c4fc3fa7e06bf29537f9cb0298cc2f1c1de

                            SHA256

                            a6ffd97ca5d47f2251a53ccd3ab891a9fec5b7d0f316b4c11e7d88f19765b1b4

                            SHA512

                            eb9acc530d9c20dc26a00489572fe5b21075181f5f25d6598ebd5292aef5bbce9c2dc89fac04201ea7ce5c5faec545e44c02e54356ae6dfda7d2f70255a930b3

                          • C:\Users\Admin\AppData\Local\Temp\9105.exe

                            Filesize

                            1.0MB

                            MD5

                            fc78f5650188734808f725d0934650a1

                            SHA1

                            e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000

                            SHA256

                            319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a

                            SHA512

                            d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0

                          • C:\Users\Admin\AppData\Local\Temp\9105.exe

                            Filesize

                            1.0MB

                            MD5

                            fc78f5650188734808f725d0934650a1

                            SHA1

                            e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000

                            SHA256

                            319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a

                            SHA512

                            d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0

                          • C:\Users\Admin\AppData\Local\Temp\9BA5.exe

                            Filesize

                            777KB

                            MD5

                            47f9d8570bbbfd172ee66015af682251

                            SHA1

                            2040636052aed433a453ef4c0a1a6a16186e7c90

                            SHA256

                            2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                            SHA512

                            e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                          • C:\Users\Admin\AppData\Local\Temp\9BA5.exe

                            Filesize

                            777KB

                            MD5

                            47f9d8570bbbfd172ee66015af682251

                            SHA1

                            2040636052aed433a453ef4c0a1a6a16186e7c90

                            SHA256

                            2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                            SHA512

                            e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                          • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                            Filesize

                            777KB

                            MD5

                            47f9d8570bbbfd172ee66015af682251

                            SHA1

                            2040636052aed433a453ef4c0a1a6a16186e7c90

                            SHA256

                            2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                            SHA512

                            e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                          • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                            Filesize

                            777KB

                            MD5

                            47f9d8570bbbfd172ee66015af682251

                            SHA1

                            2040636052aed433a453ef4c0a1a6a16186e7c90

                            SHA256

                            2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                            SHA512

                            e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                          • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                            Filesize

                            777KB

                            MD5

                            47f9d8570bbbfd172ee66015af682251

                            SHA1

                            2040636052aed433a453ef4c0a1a6a16186e7c90

                            SHA256

                            2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                            SHA512

                            e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                          • C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll

                            Filesize

                            126KB

                            MD5

                            f6d14701e7c568254151e153f7763672

                            SHA1

                            4501ffb7284f29cca51b06deba0262b8d33f93f6

                            SHA256

                            e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d

                            SHA512

                            62c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2

                          • C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll

                            Filesize

                            126KB

                            MD5

                            f6d14701e7c568254151e153f7763672

                            SHA1

                            4501ffb7284f29cca51b06deba0262b8d33f93f6

                            SHA256

                            e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d

                            SHA512

                            62c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2

                          • C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll

                            Filesize

                            126KB

                            MD5

                            f6d14701e7c568254151e153f7763672

                            SHA1

                            4501ffb7284f29cca51b06deba0262b8d33f93f6

                            SHA256

                            e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d

                            SHA512

                            62c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2

                          • memory/680-155-0x0000000000650000-0x00000000009FE000-memory.dmp

                            Filesize

                            3.7MB

                          • memory/680-151-0x0000000000000000-mapping.dmp

                          • memory/684-136-0x0000000000000000-mapping.dmp

                          • memory/724-170-0x0000000000400000-0x000000000066F000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/724-156-0x0000000000000000-mapping.dmp

                          • memory/724-157-0x0000000000400000-0x000000000066F000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/924-148-0x0000000000000000-mapping.dmp

                          • memory/1012-180-0x0000000001020000-0x000000000102C000-memory.dmp

                            Filesize

                            48KB

                          • memory/1012-179-0x0000000001030000-0x0000000001036000-memory.dmp

                            Filesize

                            24KB

                          • memory/1012-178-0x0000000000000000-mapping.dmp

                          • memory/1012-199-0x0000000001030000-0x0000000001036000-memory.dmp

                            Filesize

                            24KB

                          • memory/1124-171-0x0000000000180000-0x0000000000187000-memory.dmp

                            Filesize

                            28KB

                          • memory/1124-196-0x0000000000180000-0x0000000000187000-memory.dmp

                            Filesize

                            28KB

                          • memory/1124-154-0x0000000000000000-mapping.dmp

                          • memory/1124-172-0x0000000000170000-0x000000000017B000-memory.dmp

                            Filesize

                            44KB

                          • memory/1232-135-0x0000000000400000-0x000000000064D000-memory.dmp

                            Filesize

                            2.3MB

                          • memory/1232-133-0x0000000000710000-0x0000000000719000-memory.dmp

                            Filesize

                            36KB

                          • memory/1232-134-0x0000000000400000-0x000000000064D000-memory.dmp

                            Filesize

                            2.3MB

                          • memory/1232-132-0x0000000000789000-0x0000000000799000-memory.dmp

                            Filesize

                            64KB

                          • memory/1580-144-0x0000000000000000-mapping.dmp

                          • memory/1580-150-0x0000000000400000-0x00000000004C8000-memory.dmp

                            Filesize

                            800KB

                          • memory/1580-149-0x0000000000400000-0x00000000004C8000-memory.dmp

                            Filesize

                            800KB

                          • memory/1848-206-0x0000000000400000-0x00000000004C8000-memory.dmp

                            Filesize

                            800KB

                          • memory/2608-187-0x0000000000000000-mapping.dmp

                          • memory/2608-202-0x0000000000680000-0x0000000000686000-memory.dmp

                            Filesize

                            24KB

                          • memory/2608-189-0x0000000000670000-0x000000000067B000-memory.dmp

                            Filesize

                            44KB

                          • memory/2608-188-0x0000000000680000-0x0000000000686000-memory.dmp

                            Filesize

                            24KB

                          • memory/2808-176-0x0000000000170000-0x0000000000175000-memory.dmp

                            Filesize

                            20KB

                          • memory/2808-198-0x0000000000170000-0x0000000000175000-memory.dmp

                            Filesize

                            20KB

                          • memory/2808-177-0x0000000000160000-0x0000000000169000-memory.dmp

                            Filesize

                            36KB

                          • memory/2808-175-0x0000000000000000-mapping.dmp

                          • memory/2920-207-0x0000000000000000-mapping.dmp

                          • memory/2920-211-0x0000000000570000-0x0000000000594000-memory.dmp

                            Filesize

                            144KB

                          • memory/3236-184-0x0000000000000000-mapping.dmp

                          • memory/3236-185-0x0000000000540000-0x0000000000545000-memory.dmp

                            Filesize

                            20KB

                          • memory/3236-186-0x0000000000530000-0x0000000000539000-memory.dmp

                            Filesize

                            36KB

                          • memory/3236-201-0x0000000000540000-0x0000000000545000-memory.dmp

                            Filesize

                            20KB

                          • memory/3956-181-0x0000000000000000-mapping.dmp

                          • memory/3956-183-0x0000000001110000-0x0000000001137000-memory.dmp

                            Filesize

                            156KB

                          • memory/3956-200-0x0000000001140000-0x0000000001162000-memory.dmp

                            Filesize

                            136KB

                          • memory/3956-182-0x0000000001140000-0x0000000001162000-memory.dmp

                            Filesize

                            136KB

                          • memory/4168-143-0x0000000000400000-0x00000000004C8000-memory.dmp

                            Filesize

                            800KB

                          • memory/4168-142-0x00000000023C0000-0x000000000241C000-memory.dmp

                            Filesize

                            368KB

                          • memory/4168-147-0x0000000000400000-0x00000000004C8000-memory.dmp

                            Filesize

                            800KB

                          • memory/4168-139-0x0000000000000000-mapping.dmp

                          • memory/4456-197-0x0000000000110000-0x0000000000119000-memory.dmp

                            Filesize

                            36KB

                          • memory/4456-174-0x0000000000100000-0x000000000010F000-memory.dmp

                            Filesize

                            60KB

                          • memory/4456-173-0x0000000000110000-0x0000000000119000-memory.dmp

                            Filesize

                            36KB

                          • memory/4456-161-0x0000000000000000-mapping.dmp

                          • memory/4484-204-0x00000000007F0000-0x00000000007F8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4484-195-0x00000000007E0000-0x00000000007EB000-memory.dmp

                            Filesize

                            44KB

                          • memory/4484-194-0x00000000007F0000-0x00000000007F8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4484-193-0x0000000000000000-mapping.dmp

                          • memory/5036-203-0x0000000000170000-0x0000000000177000-memory.dmp

                            Filesize

                            28KB

                          • memory/5036-192-0x0000000000160000-0x000000000016D000-memory.dmp

                            Filesize

                            52KB

                          • memory/5036-191-0x0000000000170000-0x0000000000177000-memory.dmp

                            Filesize

                            28KB

                          • memory/5036-190-0x0000000000000000-mapping.dmp