Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
416KB
-
MD5
20a6b393d5c098d4e95c49ebd4350a76
-
SHA1
8038616ee029c9a51a7c95cac57033a10f091c8e
-
SHA256
3ba533f3f515c41fd7a24e3ff94ff72e5e68c1b78d0ddfd316e780f6b8fe5732
-
SHA512
e0486c2ddfdccbe7a350a3c4a2942b9e100c0a32c75763f339aa248445c3676eb323af014e644b4eac4f784fd2ce7b232ff5ebb416290b1acbfbdb96db00d52c
-
SSDEEP
6144:WEAJsLHf/7wloTOxDS/pn+aXUjLu+jBr5yigSBWs6B8PPMk:WEAm737gM2oYaXUjS+x5yzS76B8
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000b000000022de4-148.dat amadey_cred_module behavioral2/files/0x000b000000022de4-149.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 35 4956 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 1796 gntuud.exe 1996 gntuud.exe 1248 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 1 IoCs
pid Process 4956 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4580 4756 WerFault.exe 78 4652 1996 WerFault.exe 86 1764 1248 WerFault.exe 96 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1796 4756 file.exe 79 PID 4756 wrote to memory of 1796 4756 file.exe 79 PID 4756 wrote to memory of 1796 4756 file.exe 79 PID 1796 wrote to memory of 4800 1796 gntuud.exe 83 PID 1796 wrote to memory of 4800 1796 gntuud.exe 83 PID 1796 wrote to memory of 4800 1796 gntuud.exe 83 PID 1796 wrote to memory of 4956 1796 gntuud.exe 89 PID 1796 wrote to memory of 4956 1796 gntuud.exe 89 PID 1796 wrote to memory of 4956 1796 gntuud.exe 89 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 12842⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4756 -ip 47561⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 4242⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1996 -ip 19961⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 4162⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1248 -ip 12481⤵PID:4524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD520a6b393d5c098d4e95c49ebd4350a76
SHA18038616ee029c9a51a7c95cac57033a10f091c8e
SHA2563ba533f3f515c41fd7a24e3ff94ff72e5e68c1b78d0ddfd316e780f6b8fe5732
SHA512e0486c2ddfdccbe7a350a3c4a2942b9e100c0a32c75763f339aa248445c3676eb323af014e644b4eac4f784fd2ce7b232ff5ebb416290b1acbfbdb96db00d52c
-
Filesize
416KB
MD520a6b393d5c098d4e95c49ebd4350a76
SHA18038616ee029c9a51a7c95cac57033a10f091c8e
SHA2563ba533f3f515c41fd7a24e3ff94ff72e5e68c1b78d0ddfd316e780f6b8fe5732
SHA512e0486c2ddfdccbe7a350a3c4a2942b9e100c0a32c75763f339aa248445c3676eb323af014e644b4eac4f784fd2ce7b232ff5ebb416290b1acbfbdb96db00d52c
-
Filesize
416KB
MD520a6b393d5c098d4e95c49ebd4350a76
SHA18038616ee029c9a51a7c95cac57033a10f091c8e
SHA2563ba533f3f515c41fd7a24e3ff94ff72e5e68c1b78d0ddfd316e780f6b8fe5732
SHA512e0486c2ddfdccbe7a350a3c4a2942b9e100c0a32c75763f339aa248445c3676eb323af014e644b4eac4f784fd2ce7b232ff5ebb416290b1acbfbdb96db00d52c
-
Filesize
416KB
MD520a6b393d5c098d4e95c49ebd4350a76
SHA18038616ee029c9a51a7c95cac57033a10f091c8e
SHA2563ba533f3f515c41fd7a24e3ff94ff72e5e68c1b78d0ddfd316e780f6b8fe5732
SHA512e0486c2ddfdccbe7a350a3c4a2942b9e100c0a32c75763f339aa248445c3676eb323af014e644b4eac4f784fd2ce7b232ff5ebb416290b1acbfbdb96db00d52c
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981