Analysis

  • max time kernel
    266s
  • max time network
    320s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 22:15

General

  • Target

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe

  • Size

    251KB

  • MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

  • SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

  • SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

  • SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • SSDEEP

    6144:OyVU8ijRI/yscaenFrkvfXzx5hD9EablcQ:OeU8WREgawAfD/PEQcQ

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.66/o7Vsjd3a2f/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe
    "C:\Users\Admin\AppData\Local\Temp\2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1192
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:1404
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {1B668499-2A34-4B90-96BB-98284289C198} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1464
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1732
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1836
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • C:\Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll

    Filesize

    126KB

    MD5

    a41414b91894680bb64eca81a3a54f9e

    SHA1

    f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7

    SHA256

    5980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1

    SHA512

    f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a

  • \Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • \Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    251KB

    MD5

    b3fce7a7717e48dd356cb0f54bf6ad21

    SHA1

    36cd54ad0a9c1b8974b1b77c2017f264b6fd4144

    SHA256

    2f7f019a4723476e6924d428b32dec917e1627eb8316fb436890dd241969e26f

    SHA512

    5ff4769b8bf6fe7266a1b3d4cbfeef2b1b697dd77cb0d1bdd74e508fc67149fc4d0d621a400ce1f2167c544de98a62e2e285b2c647fc478971e7224ba0325e25

  • \Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll

    Filesize

    126KB

    MD5

    a41414b91894680bb64eca81a3a54f9e

    SHA1

    f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7

    SHA256

    5980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1

    SHA512

    f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a

  • \Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll

    Filesize

    126KB

    MD5

    a41414b91894680bb64eca81a3a54f9e

    SHA1

    f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7

    SHA256

    5980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1

    SHA512

    f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a

  • \Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll

    Filesize

    126KB

    MD5

    a41414b91894680bb64eca81a3a54f9e

    SHA1

    f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7

    SHA256

    5980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1

    SHA512

    f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a

  • \Users\Admin\AppData\Roaming\a96bf39c2ed186\cred64.dll

    Filesize

    126KB

    MD5

    a41414b91894680bb64eca81a3a54f9e

    SHA1

    f0ce8614cc2c3ae1fcba93bc4a8b82196e7139f7

    SHA256

    5980b313371ff25867c38c2c2a4d60f77d79d106fd267c9084b370805bfb63d1

    SHA512

    f5b3154a6b18d2a3d4fed9f367d4273a63cd5dc5f919f1b4727fdb90e865a32585932734f4e4f9306cfb8d89dd6b8e4e28fa1ca808fbfc0363684d82cfc16c0a

  • memory/1148-65-0x00000000005EB000-0x000000000060A000-memory.dmp

    Filesize

    124KB

  • memory/1148-66-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1464-77-0x000000000028B000-0x00000000002AA000-memory.dmp

    Filesize

    124KB

  • memory/1464-78-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1620-93-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1620-92-0x00000000005DB000-0x00000000005FA000-memory.dmp

    Filesize

    124KB

  • memory/1732-83-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1732-82-0x000000000056B000-0x000000000058A000-memory.dmp

    Filesize

    124KB

  • memory/1776-61-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1776-59-0x000000000051B000-0x000000000053A000-memory.dmp

    Filesize

    124KB

  • memory/1776-60-0x00000000002B0000-0x00000000002EE000-memory.dmp

    Filesize

    248KB

  • memory/1776-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

    Filesize

    8KB

  • memory/1836-88-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1836-87-0x00000000005FB000-0x000000000061A000-memory.dmp

    Filesize

    124KB