Analysis
-
max time kernel
127s -
max time network
169s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/12/2022, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe
Resource
win10-20220901-en
General
-
Target
bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe
-
Size
415KB
-
MD5
851d5a35012042d7dfbad2e189fd8de7
-
SHA1
515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf
-
SHA256
bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188
-
SHA512
f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60
-
SSDEEP
12288:2cbZ2+iwqwUsAeOnwZ2/GIdByXIcWCJlK:2ALqwrAeOnCgyXIcWC3
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral1/files/0x000900000001abc2-562.dat amadey_cred_module behavioral1/files/0x000900000001abc2-563.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 4636 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 3528 gntuud.exe 4504 linda5.exe 2124 gntuud.exe 3764 gntuud.exe -
Loads dropped DLL 4 IoCs
pid Process 2104 rundll32.exe 2104 rundll32.exe 4772 rundll32.exe 4636 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000014001\\linda5.exe" gntuud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5108 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings linda5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4636 rundll32.exe 4636 rundll32.exe 4636 rundll32.exe 4636 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2456 wrote to memory of 3528 2456 bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe 66 PID 2456 wrote to memory of 3528 2456 bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe 66 PID 2456 wrote to memory of 3528 2456 bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe 66 PID 3528 wrote to memory of 5108 3528 gntuud.exe 67 PID 3528 wrote to memory of 5108 3528 gntuud.exe 67 PID 3528 wrote to memory of 5108 3528 gntuud.exe 67 PID 3528 wrote to memory of 4504 3528 gntuud.exe 69 PID 3528 wrote to memory of 4504 3528 gntuud.exe 69 PID 3528 wrote to memory of 4504 3528 gntuud.exe 69 PID 4504 wrote to memory of 4660 4504 linda5.exe 70 PID 4504 wrote to memory of 4660 4504 linda5.exe 70 PID 4504 wrote to memory of 4660 4504 linda5.exe 70 PID 4660 wrote to memory of 2104 4660 control.exe 72 PID 4660 wrote to memory of 2104 4660 control.exe 72 PID 4660 wrote to memory of 2104 4660 control.exe 72 PID 2104 wrote to memory of 1836 2104 rundll32.exe 73 PID 2104 wrote to memory of 1836 2104 rundll32.exe 73 PID 1836 wrote to memory of 4772 1836 RunDll32.exe 74 PID 1836 wrote to memory of 4772 1836 RunDll32.exe 74 PID 1836 wrote to memory of 4772 1836 RunDll32.exe 74 PID 3528 wrote to memory of 4636 3528 gntuud.exe 76 PID 3528 wrote to memory of 4636 3528 gntuud.exe 76 PID 3528 wrote to memory of 4636 3528 gntuud.exe 76 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe"C:\Users\Admin\AppData\Local\Temp\bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",6⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",7⤵
- Loads dropped DLL
PID:4772
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:2124
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:3764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b5f33079af16dbc86274ceb993fba03f
SHA14dd739ce392d943444fab4ac47ed2f049d59a043
SHA2567412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982
SHA512a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92
-
Filesize
1.9MB
MD5b5f33079af16dbc86274ceb993fba03f
SHA14dd739ce392d943444fab4ac47ed2f049d59a043
SHA2567412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982
SHA512a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92
-
Filesize
415KB
MD5851d5a35012042d7dfbad2e189fd8de7
SHA1515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf
SHA256bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188
SHA512f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60
-
Filesize
415KB
MD5851d5a35012042d7dfbad2e189fd8de7
SHA1515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf
SHA256bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188
SHA512f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60
-
Filesize
415KB
MD5851d5a35012042d7dfbad2e189fd8de7
SHA1515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf
SHA256bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188
SHA512f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60
-
Filesize
415KB
MD5851d5a35012042d7dfbad2e189fd8de7
SHA1515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf
SHA256bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188
SHA512f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981