Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-11-2022 10:40

General

  • Target

    4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc.exe

  • Size

    205KB

  • MD5

    275dce61f88d132be29f20d7a201145d

  • SHA1

    5b50f5e845cfbb05fdece2c6a9843e352dc0176c

  • SHA256

    4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc

  • SHA512

    3f5942927d7d4ccbbe291ce478c4b3bbc14b650bbb14a22187848ec0c6cc0274f0899a9831fe6530b8427741d9fbc383a06f380bd2d4545e2eb9e67b9c18e285

  • SSDEEP

    6144:izrbF0zgkEYhfheJBbwEOMZSUtrP77Zt:iB0zIYhZenZSU3

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc.exe
    "C:\Users\Admin\AppData\Local\Temp\4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3432
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:3168
  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    1⤵
    • Executes dropped EXE
    PID:4628
  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    1⤵
    • Executes dropped EXE
    PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    Filesize

    205KB

    MD5

    275dce61f88d132be29f20d7a201145d

    SHA1

    5b50f5e845cfbb05fdece2c6a9843e352dc0176c

    SHA256

    4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc

    SHA512

    3f5942927d7d4ccbbe291ce478c4b3bbc14b650bbb14a22187848ec0c6cc0274f0899a9831fe6530b8427741d9fbc383a06f380bd2d4545e2eb9e67b9c18e285

  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    Filesize

    205KB

    MD5

    275dce61f88d132be29f20d7a201145d

    SHA1

    5b50f5e845cfbb05fdece2c6a9843e352dc0176c

    SHA256

    4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc

    SHA512

    3f5942927d7d4ccbbe291ce478c4b3bbc14b650bbb14a22187848ec0c6cc0274f0899a9831fe6530b8427741d9fbc383a06f380bd2d4545e2eb9e67b9c18e285

  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    Filesize

    205KB

    MD5

    275dce61f88d132be29f20d7a201145d

    SHA1

    5b50f5e845cfbb05fdece2c6a9843e352dc0176c

    SHA256

    4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc

    SHA512

    3f5942927d7d4ccbbe291ce478c4b3bbc14b650bbb14a22187848ec0c6cc0274f0899a9831fe6530b8427741d9fbc383a06f380bd2d4545e2eb9e67b9c18e285

  • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
    Filesize

    205KB

    MD5

    275dce61f88d132be29f20d7a201145d

    SHA1

    5b50f5e845cfbb05fdece2c6a9843e352dc0176c

    SHA256

    4008ca16bc42b9ecb6d05bc158379db183eba01e30eab7ce5188c886545c16bc

    SHA512

    3f5942927d7d4ccbbe291ce478c4b3bbc14b650bbb14a22187848ec0c6cc0274f0899a9831fe6530b8427741d9fbc383a06f380bd2d4545e2eb9e67b9c18e285

  • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
    Filesize

    126KB

    MD5

    674cec24e36e0dfaec6290db96dda86e

    SHA1

    581e3a7a541cc04641e751fc850d92e07236681f

    SHA256

    de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

    SHA512

    6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

  • \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
    Filesize

    126KB

    MD5

    674cec24e36e0dfaec6290db96dda86e

    SHA1

    581e3a7a541cc04641e751fc850d92e07236681f

    SHA256

    de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

    SHA512

    6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

  • memory/3168-253-0x0000000000000000-mapping.dmp
  • memory/3432-222-0x0000000000000000-mapping.dmp
  • memory/4124-158-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-160-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-124-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-125-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-126-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-127-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-128-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-129-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-130-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-131-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-132-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-133-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-134-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-135-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-136-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-137-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-138-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-139-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-140-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-141-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-142-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-143-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-144-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-145-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-146-0x0000000000E5A000-0x0000000000E79000-memory.dmp
    Filesize

    124KB

  • memory/4124-147-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-149-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-148-0x0000000000D70000-0x0000000000DAE000-memory.dmp
    Filesize

    248KB

  • memory/4124-150-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-151-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-152-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-153-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-154-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-155-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-156-0x0000000000400000-0x0000000000AE5000-memory.dmp
    Filesize

    6.9MB

  • memory/4124-157-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-122-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-159-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-170-0x0000000000E5A000-0x0000000000E79000-memory.dmp
    Filesize

    124KB

  • memory/4124-116-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-123-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-163-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-164-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-165-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-162-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-174-0x0000000000400000-0x0000000000AE5000-memory.dmp
    Filesize

    6.9MB

  • memory/4124-172-0x0000000000D70000-0x0000000000DAE000-memory.dmp
    Filesize

    248KB

  • memory/4124-117-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-118-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-119-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-120-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-161-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-121-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4628-370-0x0000000000C3E000-0x0000000000C5D000-memory.dmp
    Filesize

    124KB

  • memory/4628-371-0x0000000000400000-0x0000000000AE5000-memory.dmp
    Filesize

    6.9MB

  • memory/4724-242-0x0000000000400000-0x0000000000AE5000-memory.dmp
    Filesize

    6.9MB

  • memory/4724-183-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-176-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-182-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-175-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-184-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-185-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-251-0x0000000000AF0000-0x0000000000C3A000-memory.dmp
    Filesize

    1.3MB

  • memory/4724-188-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-186-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-177-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-252-0x0000000000AF0000-0x0000000000B9E000-memory.dmp
    Filesize

    696KB

  • memory/4724-181-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-180-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-187-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-200-0x0000000000AF0000-0x0000000000B9E000-memory.dmp
    Filesize

    696KB

  • memory/4724-173-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-171-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-169-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-166-0x0000000000000000-mapping.dmp
  • memory/4724-168-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-179-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4724-198-0x0000000000AF0000-0x0000000000C3A000-memory.dmp
    Filesize

    1.3MB

  • memory/4956-406-0x0000000000E1E000-0x0000000000E3D000-memory.dmp
    Filesize

    124KB

  • memory/4956-407-0x0000000000400000-0x0000000000AE5000-memory.dmp
    Filesize

    6.9MB