Analysis

  • max time kernel
    177s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 05:18

General

  • Target

    f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16.exe

  • Size

    359KB

  • MD5

    6b9df39ff3bc394a9aa4ca61ed44c281

  • SHA1

    0493642d0e978c91463716a6e2a0ac2efe4f4bef

  • SHA256

    f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16

  • SHA512

    a5ec256c0d56825487643e14c83aec5912047c2f3c69087fcbbc8ba9e7728d3a45e6c3ffac40c070f515cbbf572ddb60ffaa2cc4f8605d6432862407dde2e327

  • SSDEEP

    6144:G9X5jyr2LSFHl90ezQ5louvgclYgHq50TScoCF:G9XVyyeFHl901TnHq52FxF

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.6/p9cWxH/index.php

Extracted

Family

redline

Botnet

wosh

C2

31.41.244.14:4683

Attributes
  • auth_value

    f0ec85e2aaa9e62929e2fb9e09d843f4

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16.exe
    "C:\Users\Admin\AppData\Local\Temp\f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4644
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:4896
      • C:\Users\Admin\AppData\Local\Temp\1000028001\wish.exe
        "C:\Users\Admin\AppData\Local\Temp\1000028001\wish.exe"
        3⤵
        • Executes dropped EXE
        PID:4856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 1136
      2⤵
      • Program crash
      PID:3120
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2524 -ip 2524
    1⤵
      PID:872
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      1⤵
      • Executes dropped EXE
      PID:4832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 416
        2⤵
        • Program crash
        PID:3996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4832 -ip 4832
      1⤵
        PID:3476

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1000028001\wish.exe
        Filesize

        175KB

        MD5

        3b6246132b7fb972ed877b79d700e32e

        SHA1

        af68ac119ccce9c7be5aeefa1e86102ee4019ebb

        SHA256

        4743bad8f6939aa7645a043208010c2a9e75fbbcbbc8ca597a0c2a74ce7b6cc0

        SHA512

        03573c63e3d03d89d2a2971d761d33e8d89895680ae8b7e5ceb3a78c8582666f8a300aad4c6c4a7c1cd118ac774ffce03053c96a57df9e66a02773111dbcfcca

      • C:\Users\Admin\AppData\Local\Temp\1000028001\wish.exe
        Filesize

        175KB

        MD5

        3b6246132b7fb972ed877b79d700e32e

        SHA1

        af68ac119ccce9c7be5aeefa1e86102ee4019ebb

        SHA256

        4743bad8f6939aa7645a043208010c2a9e75fbbcbbc8ca597a0c2a74ce7b6cc0

        SHA512

        03573c63e3d03d89d2a2971d761d33e8d89895680ae8b7e5ceb3a78c8582666f8a300aad4c6c4a7c1cd118ac774ffce03053c96a57df9e66a02773111dbcfcca

      • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
        Filesize

        359KB

        MD5

        6b9df39ff3bc394a9aa4ca61ed44c281

        SHA1

        0493642d0e978c91463716a6e2a0ac2efe4f4bef

        SHA256

        f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16

        SHA512

        a5ec256c0d56825487643e14c83aec5912047c2f3c69087fcbbc8ba9e7728d3a45e6c3ffac40c070f515cbbf572ddb60ffaa2cc4f8605d6432862407dde2e327

      • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
        Filesize

        359KB

        MD5

        6b9df39ff3bc394a9aa4ca61ed44c281

        SHA1

        0493642d0e978c91463716a6e2a0ac2efe4f4bef

        SHA256

        f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16

        SHA512

        a5ec256c0d56825487643e14c83aec5912047c2f3c69087fcbbc8ba9e7728d3a45e6c3ffac40c070f515cbbf572ddb60ffaa2cc4f8605d6432862407dde2e327

      • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
        Filesize

        359KB

        MD5

        6b9df39ff3bc394a9aa4ca61ed44c281

        SHA1

        0493642d0e978c91463716a6e2a0ac2efe4f4bef

        SHA256

        f05c005e82478b0723820d5b21d23dd97a47513758323a7e1df581a5f0112c16

        SHA512

        a5ec256c0d56825487643e14c83aec5912047c2f3c69087fcbbc8ba9e7728d3a45e6c3ffac40c070f515cbbf572ddb60ffaa2cc4f8605d6432862407dde2e327

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
        Filesize

        126KB

        MD5

        98cc0f811ad5ff43fedc262961002498

        SHA1

        37e48635fcef35c0b3db3c1f0c35833899eb53d8

        SHA256

        62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

        SHA512

        d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
        Filesize

        126KB

        MD5

        98cc0f811ad5ff43fedc262961002498

        SHA1

        37e48635fcef35c0b3db3c1f0c35833899eb53d8

        SHA256

        62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

        SHA512

        d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

      • memory/1484-143-0x0000000000400000-0x000000000045E000-memory.dmp
        Filesize

        376KB

      • memory/1484-138-0x0000000000723000-0x0000000000742000-memory.dmp
        Filesize

        124KB

      • memory/1484-139-0x0000000000400000-0x000000000045E000-memory.dmp
        Filesize

        376KB

      • memory/1484-135-0x0000000000000000-mapping.dmp
      • memory/2524-141-0x0000000000400000-0x000000000045E000-memory.dmp
        Filesize

        376KB

      • memory/2524-140-0x00000000005F2000-0x0000000000611000-memory.dmp
        Filesize

        124KB

      • memory/2524-132-0x00000000005F2000-0x0000000000611000-memory.dmp
        Filesize

        124KB

      • memory/2524-134-0x0000000000400000-0x000000000045E000-memory.dmp
        Filesize

        376KB

      • memory/2524-133-0x00000000001C0000-0x00000000001FE000-memory.dmp
        Filesize

        248KB

      • memory/4644-142-0x0000000000000000-mapping.dmp
      • memory/4832-150-0x0000000000714000-0x0000000000733000-memory.dmp
        Filesize

        124KB

      • memory/4832-151-0x0000000000400000-0x000000000045E000-memory.dmp
        Filesize

        376KB

      • memory/4856-148-0x0000000000000000-mapping.dmp
      • memory/4856-153-0x0000000000FD0000-0x0000000001002000-memory.dmp
        Filesize

        200KB

      • memory/4896-144-0x0000000000000000-mapping.dmp