Analysis

  • max time kernel
    127s
  • max time network
    169s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/12/2022, 18:52

General

  • Target

    bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe

  • Size

    415KB

  • MD5

    851d5a35012042d7dfbad2e189fd8de7

  • SHA1

    515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf

  • SHA256

    bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188

  • SHA512

    f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60

  • SSDEEP

    12288:2cbZ2+iwqwUsAeOnwZ2/GIdByXIcWCJlK:2ALqwrAeOnCgyXIcWC3

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.167/v7eWcjs/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe
    "C:\Users\Admin\AppData\Local\Temp\bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:5108
      • C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4660
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2104
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1836
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
                7⤵
                • Loads dropped DLL
                PID:4772
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:4636
  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:2124
  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:3764

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe

          Filesize

          1.9MB

          MD5

          b5f33079af16dbc86274ceb993fba03f

          SHA1

          4dd739ce392d943444fab4ac47ed2f049d59a043

          SHA256

          7412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982

          SHA512

          a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92

        • C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe

          Filesize

          1.9MB

          MD5

          b5f33079af16dbc86274ceb993fba03f

          SHA1

          4dd739ce392d943444fab4ac47ed2f049d59a043

          SHA256

          7412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982

          SHA512

          a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92

        • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

          Filesize

          415KB

          MD5

          851d5a35012042d7dfbad2e189fd8de7

          SHA1

          515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf

          SHA256

          bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188

          SHA512

          f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60

        • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

          Filesize

          415KB

          MD5

          851d5a35012042d7dfbad2e189fd8de7

          SHA1

          515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf

          SHA256

          bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188

          SHA512

          f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60

        • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

          Filesize

          415KB

          MD5

          851d5a35012042d7dfbad2e189fd8de7

          SHA1

          515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf

          SHA256

          bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188

          SHA512

          f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60

        • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

          Filesize

          415KB

          MD5

          851d5a35012042d7dfbad2e189fd8de7

          SHA1

          515ca9fa8a3c22b69d20e4ffff66b7b69eab38bf

          SHA256

          bd246928484b805c4c5bd6d37a6dc76233f130c9ca850565fa97bca529d2c188

          SHA512

          f7bcb69bb92f21ac606109761bce33728afb9a382f5ace110e6a0e8890959742d61fbd2568f7975adb49f0036ff414fc1c3173bc6f91cdb0f678c15fed1f6b60

        • C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl

          Filesize

          3.6MB

          MD5

          effbf8ff952db0e09c79a7982788222a

          SHA1

          8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

          SHA256

          1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

          SHA512

          527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

        • C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

          Filesize

          126KB

          MD5

          aebf8cd9ea982decded5ee6f3777c6d7

          SHA1

          406e723158cd5697503d1d04839d3bc7a5051603

          SHA256

          104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

          SHA512

          f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

        • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

          Filesize

          3.6MB

          MD5

          effbf8ff952db0e09c79a7982788222a

          SHA1

          8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

          SHA256

          1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

          SHA512

          527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

        • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

          Filesize

          3.6MB

          MD5

          effbf8ff952db0e09c79a7982788222a

          SHA1

          8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

          SHA256

          1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

          SHA512

          527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

        • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

          Filesize

          3.6MB

          MD5

          effbf8ff952db0e09c79a7982788222a

          SHA1

          8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

          SHA256

          1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

          SHA512

          527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

        • \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

          Filesize

          126KB

          MD5

          aebf8cd9ea982decded5ee6f3777c6d7

          SHA1

          406e723158cd5697503d1d04839d3bc7a5051603

          SHA256

          104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

          SHA512

          f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

        • memory/2104-418-0x0000000004C90000-0x0000000004F82000-memory.dmp

          Filesize

          2.9MB

        • memory/2104-419-0x0000000004F90000-0x00000000050DA000-memory.dmp

          Filesize

          1.3MB

        • memory/2104-485-0x0000000004F90000-0x00000000050DA000-memory.dmp

          Filesize

          1.3MB

        • memory/2124-521-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/2456-170-0x0000000000470000-0x00000000005BA000-memory.dmp

          Filesize

          1.3MB

        • memory/2456-133-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-141-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-142-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-143-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-144-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-145-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-146-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-147-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-148-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-149-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-150-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-151-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-152-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-153-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-154-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-155-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-156-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-157-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-158-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/2456-159-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-160-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-161-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-162-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-163-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-164-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-165-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-166-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-167-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-168-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-169-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-171-0x00000000006E0000-0x000000000071E000-memory.dmp

          Filesize

          248KB

        • memory/2456-120-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-172-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-121-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-122-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-177-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/2456-123-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-124-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-125-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-140-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-126-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-128-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-138-0x0000000000470000-0x00000000005BA000-memory.dmp

          Filesize

          1.3MB

        • memory/2456-129-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-130-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-131-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-132-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-139-0x00000000006E0000-0x000000000071E000-memory.dmp

          Filesize

          248KB

        • memory/2456-134-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-135-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-136-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/2456-137-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-176-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-186-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-198-0x0000000000470000-0x00000000005BA000-memory.dmp

          Filesize

          1.3MB

        • memory/3528-218-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/3528-179-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-193-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-192-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-191-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-181-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-190-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-189-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-188-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-187-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-178-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-194-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-185-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-180-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-421-0x0000000000470000-0x00000000005BA000-memory.dmp

          Filesize

          1.3MB

        • memory/3528-446-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/3528-182-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3528-175-0x00000000774F0000-0x000000007767E000-memory.dmp

          Filesize

          1.6MB

        • memory/3764-639-0x0000000000644000-0x0000000000663000-memory.dmp

          Filesize

          124KB

        • memory/3764-640-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/4772-483-0x0000000005690000-0x00000000057DA000-memory.dmp

          Filesize

          1.3MB

        • memory/4772-476-0x0000000005690000-0x00000000057DA000-memory.dmp

          Filesize

          1.3MB

        • memory/4772-475-0x0000000005240000-0x0000000005532000-memory.dmp

          Filesize

          2.9MB