Analysis
-
max time kernel
254s -
max time network
267s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-11-2022 04:00
Static task
static1
Behavioral task
behavioral1
Sample
3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe
Resource
win10-20220812-en
General
-
Target
3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe
-
Size
205KB
-
MD5
afc1e36cf8e306408f429b3edb71ca49
-
SHA1
05c4742eedd305de7ad96de3278810583a09f808
-
SHA256
3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
-
SHA512
633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
SSDEEP
3072:LEahjH1YPuUGB5CU9iPNaBSRAoygIxWVqrua5+fkTkYaB0uve5cQtijJw2RRF:PlmmUSoFaB3VXrN5+sAYaB0uvej5W
Malware Config
Extracted
amadey
3.50
77.73.134.66/o7Vsjd3a2f/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x0002000000015527-336.dat amadey_cred_module behavioral2/files/0x0002000000015527-337.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 9 4724 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4372 gntuud.exe 3440 gntuud.exe 4460 gntuud.exe 4560 gntuud.exe 4552 gntuud.exe -
Loads dropped DLL 1 IoCs
pid Process 4724 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4724 rundll32.exe 4724 rundll32.exe 4724 rundll32.exe 4724 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4372 2344 3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe 66 PID 2344 wrote to memory of 4372 2344 3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe 66 PID 2344 wrote to memory of 4372 2344 3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe 66 PID 4372 wrote to memory of 2300 4372 gntuud.exe 67 PID 4372 wrote to memory of 2300 4372 gntuud.exe 67 PID 4372 wrote to memory of 2300 4372 gntuud.exe 67 PID 4372 wrote to memory of 4724 4372 gntuud.exe 70 PID 4372 wrote to memory of 4724 4372 gntuud.exe 70 PID 4372 wrote to memory of 4724 4372 gntuud.exe 70 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe"C:\Users\Admin\AppData\Local\Temp\3fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2300
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe1⤵
- Executes dropped EXE
PID:3440
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe1⤵
- Executes dropped EXE
PID:4460
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe1⤵
- Executes dropped EXE
PID:4560
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe1⤵
- Executes dropped EXE
PID:4552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5afc1e36cf8e306408f429b3edb71ca49
SHA105c4742eedd305de7ad96de3278810583a09f808
SHA2563fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
SHA512633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
Filesize
205KB
MD5afc1e36cf8e306408f429b3edb71ca49
SHA105c4742eedd305de7ad96de3278810583a09f808
SHA2563fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
SHA512633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
Filesize
205KB
MD5afc1e36cf8e306408f429b3edb71ca49
SHA105c4742eedd305de7ad96de3278810583a09f808
SHA2563fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
SHA512633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
Filesize
205KB
MD5afc1e36cf8e306408f429b3edb71ca49
SHA105c4742eedd305de7ad96de3278810583a09f808
SHA2563fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
SHA512633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
Filesize
205KB
MD5afc1e36cf8e306408f429b3edb71ca49
SHA105c4742eedd305de7ad96de3278810583a09f808
SHA2563fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
SHA512633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
Filesize
205KB
MD5afc1e36cf8e306408f429b3edb71ca49
SHA105c4742eedd305de7ad96de3278810583a09f808
SHA2563fe7e66af22b7bada7da868d3cdf09420b6fde4ad5674fe9c3e0f0437a598ec6
SHA512633ef5702f561497d95f084c93fca6d555d36f8ae2ab3d599a1fda17ede32d9955879aa337db9f1237f20de845573fc03a55488a110dbe7326f9d9b5dc64927b
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a