Analysis
-
max time kernel
168s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
415KB
-
MD5
bb0df5d5985091ef9a308d0d78fc0a0a
-
SHA1
3c1b7b27748aada2899cc9320d00820d562ad57f
-
SHA256
4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
-
SHA512
54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
SSDEEP
6144:WjWUZQjLKPEZ3p/GHPVyUhODasKoxOtUG84WcoBlCEnaV:WjhZi+PEppGHPV3hQasKoUmcWCEn
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x0008000000012322-118.dat amadey_cred_module behavioral1/files/0x0008000000012322-119.dat amadey_cred_module behavioral1/files/0x0008000000012322-117.dat amadey_cred_module behavioral1/files/0x0008000000012322-116.dat amadey_cred_module behavioral1/files/0x0008000000012322-115.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 1400 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1660 gntuud.exe 1356 linda5.exe 904 gntuud.exe 1312 gntuud.exe 1612 gntuud.exe -
Loads dropped DLL 15 IoCs
pid Process 1992 file.exe 1992 file.exe 1660 gntuud.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 528 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000014001\\linda5.exe" gntuud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe 1400 rundll32.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1660 1992 file.exe 28 PID 1992 wrote to memory of 1660 1992 file.exe 28 PID 1992 wrote to memory of 1660 1992 file.exe 28 PID 1992 wrote to memory of 1660 1992 file.exe 28 PID 1660 wrote to memory of 1492 1660 gntuud.exe 29 PID 1660 wrote to memory of 1492 1660 gntuud.exe 29 PID 1660 wrote to memory of 1492 1660 gntuud.exe 29 PID 1660 wrote to memory of 1492 1660 gntuud.exe 29 PID 1660 wrote to memory of 1356 1660 gntuud.exe 33 PID 1660 wrote to memory of 1356 1660 gntuud.exe 33 PID 1660 wrote to memory of 1356 1660 gntuud.exe 33 PID 1660 wrote to memory of 1356 1660 gntuud.exe 33 PID 1356 wrote to memory of 672 1356 linda5.exe 34 PID 1356 wrote to memory of 672 1356 linda5.exe 34 PID 1356 wrote to memory of 672 1356 linda5.exe 34 PID 1356 wrote to memory of 672 1356 linda5.exe 34 PID 672 wrote to memory of 2016 672 control.exe 35 PID 672 wrote to memory of 2016 672 control.exe 35 PID 672 wrote to memory of 2016 672 control.exe 35 PID 672 wrote to memory of 2016 672 control.exe 35 PID 672 wrote to memory of 2016 672 control.exe 35 PID 672 wrote to memory of 2016 672 control.exe 35 PID 672 wrote to memory of 2016 672 control.exe 35 PID 2016 wrote to memory of 1864 2016 rundll32.exe 36 PID 2016 wrote to memory of 1864 2016 rundll32.exe 36 PID 2016 wrote to memory of 1864 2016 rundll32.exe 36 PID 2016 wrote to memory of 1864 2016 rundll32.exe 36 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1864 wrote to memory of 528 1864 RunDll32.exe 37 PID 1084 wrote to memory of 904 1084 taskeng.exe 39 PID 1084 wrote to memory of 904 1084 taskeng.exe 39 PID 1084 wrote to memory of 904 1084 taskeng.exe 39 PID 1084 wrote to memory of 904 1084 taskeng.exe 39 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1660 wrote to memory of 1400 1660 gntuud.exe 40 PID 1084 wrote to memory of 1312 1084 taskeng.exe 41 PID 1084 wrote to memory of 1312 1084 taskeng.exe 41 PID 1084 wrote to memory of 1312 1084 taskeng.exe 41 PID 1084 wrote to memory of 1312 1084 taskeng.exe 41 PID 1084 wrote to memory of 1612 1084 taskeng.exe 42 PID 1084 wrote to memory of 1612 1084 taskeng.exe 42 PID 1084 wrote to memory of 1612 1084 taskeng.exe 42 PID 1084 wrote to memory of 1612 1084 taskeng.exe 42 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",6⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",7⤵
- Loads dropped DLL
PID:528
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1400
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F0F4E105-8AB2-4E5F-A0F8-78A68B3A00D8} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe2⤵
- Executes dropped EXE
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe2⤵
- Executes dropped EXE
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe2⤵
- Executes dropped EXE
PID:1612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b5f33079af16dbc86274ceb993fba03f
SHA14dd739ce392d943444fab4ac47ed2f049d59a043
SHA2567412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982
SHA512a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92
-
Filesize
1.9MB
MD5b5f33079af16dbc86274ceb993fba03f
SHA14dd739ce392d943444fab4ac47ed2f049d59a043
SHA2567412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982
SHA512a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
1.9MB
MD5b5f33079af16dbc86274ceb993fba03f
SHA14dd739ce392d943444fab4ac47ed2f049d59a043
SHA2567412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982
SHA512a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
415KB
MD5bb0df5d5985091ef9a308d0d78fc0a0a
SHA13c1b7b27748aada2899cc9320d00820d562ad57f
SHA2564df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c
SHA51254bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
3.6MB
MD5effbf8ff952db0e09c79a7982788222a
SHA18e01b5d78a2b4eccfe3bd188c2fbc845d847a57e
SHA2561fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022
SHA512527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
Filesize
126KB
MD5aebf8cd9ea982decded5ee6f3777c6d7
SHA1406e723158cd5697503d1d04839d3bc7a5051603
SHA256104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
SHA512f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981