Analysis
-
max time kernel
180s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 17:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
415KB
-
MD5
559c9d12ae8756355fee60cb2c780355
-
SHA1
79eecc0272cde8be02c78fc4f335e83e4c5d0c1c
-
SHA256
31e900bd0c0d359e102fa9b498382ddf04641c5c8468703ed6fd8bdcf2bc1d5e
-
SHA512
aa6e2a2a5b33e8d12755a665ee0fc56b9ba6aea733884a0417183e88c7104b0c9a8d4787247f863097f9d330d29ed1fbb7026b3561732850a3dd872e5351b297
-
SSDEEP
6144:nYI3ZLsLtb8kWWk2wuWcnHpDFU0av0Uu/vN6mWqLXZ6B2WcoBlCJZaV:nYYZIZb8V/uvnHpDFUnNMNbWqycWCT
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000700000001e64b-150.dat amadey_cred_module behavioral2/files/0x000700000001e64b-151.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 29 3428 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4896 gntuud.exe 320 gntuud.exe 3672 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 1 IoCs
pid Process 3428 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2244 2816 WerFault.exe 80 4360 320 WerFault.exe 87 3920 3672 WerFault.exe 91 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4204 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3428 rundll32.exe 3428 rundll32.exe 3428 rundll32.exe 3428 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4896 2816 file.exe 81 PID 2816 wrote to memory of 4896 2816 file.exe 81 PID 2816 wrote to memory of 4896 2816 file.exe 81 PID 4896 wrote to memory of 4204 4896 gntuud.exe 85 PID 4896 wrote to memory of 4204 4896 gntuud.exe 85 PID 4896 wrote to memory of 4204 4896 gntuud.exe 85 PID 4896 wrote to memory of 3428 4896 gntuud.exe 90 PID 4896 wrote to memory of 3428 4896 gntuud.exe 90 PID 4896 wrote to memory of 3428 4896 gntuud.exe 90 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:4204
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:3428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 11402⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2816 -ip 28161⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 4162⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 320 -ip 3201⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 4162⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3672 -ip 36721⤵PID:1968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5559c9d12ae8756355fee60cb2c780355
SHA179eecc0272cde8be02c78fc4f335e83e4c5d0c1c
SHA25631e900bd0c0d359e102fa9b498382ddf04641c5c8468703ed6fd8bdcf2bc1d5e
SHA512aa6e2a2a5b33e8d12755a665ee0fc56b9ba6aea733884a0417183e88c7104b0c9a8d4787247f863097f9d330d29ed1fbb7026b3561732850a3dd872e5351b297
-
Filesize
415KB
MD5559c9d12ae8756355fee60cb2c780355
SHA179eecc0272cde8be02c78fc4f335e83e4c5d0c1c
SHA25631e900bd0c0d359e102fa9b498382ddf04641c5c8468703ed6fd8bdcf2bc1d5e
SHA512aa6e2a2a5b33e8d12755a665ee0fc56b9ba6aea733884a0417183e88c7104b0c9a8d4787247f863097f9d330d29ed1fbb7026b3561732850a3dd872e5351b297
-
Filesize
415KB
MD5559c9d12ae8756355fee60cb2c780355
SHA179eecc0272cde8be02c78fc4f335e83e4c5d0c1c
SHA25631e900bd0c0d359e102fa9b498382ddf04641c5c8468703ed6fd8bdcf2bc1d5e
SHA512aa6e2a2a5b33e8d12755a665ee0fc56b9ba6aea733884a0417183e88c7104b0c9a8d4787247f863097f9d330d29ed1fbb7026b3561732850a3dd872e5351b297
-
Filesize
415KB
MD5559c9d12ae8756355fee60cb2c780355
SHA179eecc0272cde8be02c78fc4f335e83e4c5d0c1c
SHA25631e900bd0c0d359e102fa9b498382ddf04641c5c8468703ed6fd8bdcf2bc1d5e
SHA512aa6e2a2a5b33e8d12755a665ee0fc56b9ba6aea733884a0417183e88c7104b0c9a8d4787247f863097f9d330d29ed1fbb7026b3561732850a3dd872e5351b297
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981