Analysis
-
max time kernel
137s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe
Resource
win10v2004-20220812-en
General
-
Target
9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe
-
Size
390KB
-
MD5
339aaf5da09bf00d3ead836d98be1e32
-
SHA1
b501fd44f4e5ecb769c292ac3f31b079defb4890
-
SHA256
9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba
-
SHA512
87090a8bf34b28e2dad14936de0421f226dcc37ae8baec23635307a397f7f7463e217f7cede480f3e71dde384522bae22596f7749ba85ea9306a9386c291b805
-
SSDEEP
6144:g05zgPbAreZ0xRq4mudXX1vgr5m3dgnMW2RqnL7Y:g05z6Ar60xRq3a1vgdogMW3L7Y
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000c000000022e66-146.dat amadey_cred_module behavioral2/files/0x000c000000022e66-147.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 28 1072 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2268 gntuud.exe 2364 gntuud.exe 3672 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe -
Loads dropped DLL 1 IoCs
pid Process 1072 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1932 4928 WerFault.exe 78 460 2364 WerFault.exe 86 4996 3672 WerFault.exe 96 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1072 rundll32.exe 1072 rundll32.exe 1072 rundll32.exe 1072 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4928 wrote to memory of 2268 4928 9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe 79 PID 4928 wrote to memory of 2268 4928 9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe 79 PID 4928 wrote to memory of 2268 4928 9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe 79 PID 2268 wrote to memory of 4820 2268 gntuud.exe 83 PID 2268 wrote to memory of 4820 2268 gntuud.exe 83 PID 2268 wrote to memory of 4820 2268 gntuud.exe 83 PID 2268 wrote to memory of 1072 2268 gntuud.exe 89 PID 2268 wrote to memory of 1072 2268 gntuud.exe 89 PID 2268 wrote to memory of 1072 2268 gntuud.exe 89 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe"C:\Users\Admin\AppData\Local\Temp\9bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:4820
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7242⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4928 -ip 49281⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 4242⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2364 -ip 23641⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 4162⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3672 -ip 36721⤵PID:4052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD5339aaf5da09bf00d3ead836d98be1e32
SHA1b501fd44f4e5ecb769c292ac3f31b079defb4890
SHA2569bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba
SHA51287090a8bf34b28e2dad14936de0421f226dcc37ae8baec23635307a397f7f7463e217f7cede480f3e71dde384522bae22596f7749ba85ea9306a9386c291b805
-
Filesize
390KB
MD5339aaf5da09bf00d3ead836d98be1e32
SHA1b501fd44f4e5ecb769c292ac3f31b079defb4890
SHA2569bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba
SHA51287090a8bf34b28e2dad14936de0421f226dcc37ae8baec23635307a397f7f7463e217f7cede480f3e71dde384522bae22596f7749ba85ea9306a9386c291b805
-
Filesize
390KB
MD5339aaf5da09bf00d3ead836d98be1e32
SHA1b501fd44f4e5ecb769c292ac3f31b079defb4890
SHA2569bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba
SHA51287090a8bf34b28e2dad14936de0421f226dcc37ae8baec23635307a397f7f7463e217f7cede480f3e71dde384522bae22596f7749ba85ea9306a9386c291b805
-
Filesize
390KB
MD5339aaf5da09bf00d3ead836d98be1e32
SHA1b501fd44f4e5ecb769c292ac3f31b079defb4890
SHA2569bfc109195c0748916ef828420c3650e2c9644c4d39fd18c2d69bd36fa42ebba
SHA51287090a8bf34b28e2dad14936de0421f226dcc37ae8baec23635307a397f7f7463e217f7cede480f3e71dde384522bae22596f7749ba85ea9306a9386c291b805
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981