Analysis
-
max time kernel
266s -
max time network
320s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe
Resource
win10-20220812-en
General
-
Target
2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe
-
Size
251KB
-
MD5
b3fce7a7717e48dd356cb0f54bf6ad21
-
SHA1
36cd54ad0a9c1b8974b1b77c2017f264b6fd4144
-
SHA256
2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
-
SHA512
5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
SSDEEP
6144:OyVU8ijRI/yscaenFrkvfXzx5hD9EablcQ:OeU8WREgawAfD/PEQcQ
Malware Config
Extracted
amadey
3.50
77.73.134.66/o7Vsjd3a2f/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x0006000000015c70-69.dat amadey_cred_module behavioral1/files/0x0006000000015c70-70.dat amadey_cred_module behavioral1/files/0x0006000000015c70-71.dat amadey_cred_module behavioral1/files/0x0006000000015c70-72.dat amadey_cred_module behavioral1/files/0x0006000000015c70-73.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 1404 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1148 gntuud.exe 1464 gntuud.exe 1732 gntuud.exe 1836 gntuud.exe 1620 gntuud.exe -
Loads dropped DLL 6 IoCs
pid Process 1776 2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe 1776 2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1148 1776 2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe 27 PID 1776 wrote to memory of 1148 1776 2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe 27 PID 1776 wrote to memory of 1148 1776 2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe 27 PID 1776 wrote to memory of 1148 1776 2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe 27 PID 1148 wrote to memory of 1192 1148 gntuud.exe 28 PID 1148 wrote to memory of 1192 1148 gntuud.exe 28 PID 1148 wrote to memory of 1192 1148 gntuud.exe 28 PID 1148 wrote to memory of 1192 1148 gntuud.exe 28 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1148 wrote to memory of 1404 1148 gntuud.exe 32 PID 1964 wrote to memory of 1464 1964 taskeng.exe 34 PID 1964 wrote to memory of 1464 1964 taskeng.exe 34 PID 1964 wrote to memory of 1464 1964 taskeng.exe 34 PID 1964 wrote to memory of 1464 1964 taskeng.exe 34 PID 1964 wrote to memory of 1732 1964 taskeng.exe 35 PID 1964 wrote to memory of 1732 1964 taskeng.exe 35 PID 1964 wrote to memory of 1732 1964 taskeng.exe 35 PID 1964 wrote to memory of 1732 1964 taskeng.exe 35 PID 1964 wrote to memory of 1836 1964 taskeng.exe 36 PID 1964 wrote to memory of 1836 1964 taskeng.exe 36 PID 1964 wrote to memory of 1836 1964 taskeng.exe 36 PID 1964 wrote to memory of 1836 1964 taskeng.exe 36 PID 1964 wrote to memory of 1620 1964 taskeng.exe 37 PID 1964 wrote to memory of 1620 1964 taskeng.exe 37 PID 1964 wrote to memory of 1620 1964 taskeng.exe 37 PID 1964 wrote to memory of 1620 1964 taskeng.exe 37 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe"C:\Users\Admin\AppData\Local\Temp\2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1192
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1404
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1B668499-2A34-4B90-96BB-98284289C198} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe2⤵
- Executes dropped EXE
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe2⤵
- Executes dropped EXE
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exeC:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe2⤵
- Executes dropped EXE
PID:1620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
251KB
MD5b3fce7a7717e48dd356cb0f54bf6ad21
SHA136cd54ad0a9c1b8974b1b77c2017f264b6fd4144
SHA2562f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f
SHA5125ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a
-
Filesize
126KB
MD5a41414b91894680bb64eca81a3a54f9e
SHA1f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7
SHA2565980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1
SHA512f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a