Analysis

  • max time kernel
    168s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 19:12

General

  • Target

    file.exe

  • Size

    415KB

  • MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

  • SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

  • SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

  • SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • SSDEEP

    6144:WjWUZQjLKPEZ3p/GHPVyUhODasKoxOtUG84WcoBlCEnaV:WjhZi+PEppGHPV3hQasKoUmcWCEn

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.167/v7eWcjs/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1492
      • C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:672
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2016
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1864
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl",
                7⤵
                • Loads dropped DLL
                PID:528
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:1400
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F0F4E105-8AB2-4E5F-A0F8-78A68B3A00D8} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:904
    • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1312
    • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe

    Filesize

    1.9MB

    MD5

    b5f33079af16dbc86274ceb993fba03f

    SHA1

    4dd739ce392d943444fab4ac47ed2f049d59a043

    SHA256

    7412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982

    SHA512

    a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92

  • C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe

    Filesize

    1.9MB

    MD5

    b5f33079af16dbc86274ceb993fba03f

    SHA1

    4dd739ce392d943444fab4ac47ed2f049d59a043

    SHA256

    7412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982

    SHA512

    a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92

  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • C:\Users\Admin\AppData\Local\Temp\8ZQXBYZD.CPl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

    Filesize

    126KB

    MD5

    aebf8cd9ea982decded5ee6f3777c6d7

    SHA1

    406e723158cd5697503d1d04839d3bc7a5051603

    SHA256

    104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

    SHA512

    f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

  • \Users\Admin\AppData\Local\Temp\1000014001\linda5.exe

    Filesize

    1.9MB

    MD5

    b5f33079af16dbc86274ceb993fba03f

    SHA1

    4dd739ce392d943444fab4ac47ed2f049d59a043

    SHA256

    7412f8c14bb009b2db18385d9a6be5795b6a63c675ad241579f41fa56e637982

    SHA512

    a2cac09213c8a6e3e2913571c14c3b9d95bbb598a12f2eb5c4659533752e39052c20bac2c9388008c7e1c64e843610e31bc8910a1b7a819b92378373d3186d92

  • \Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • \Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

    Filesize

    415KB

    MD5

    bb0df5d5985091ef9a308d0d78fc0a0a

    SHA1

    3c1b7b27748aada2899cc9320d00820d562ad57f

    SHA256

    4df604772c5244204b6450edf0a885698ee1f46e832d234542a0a79a6293d55c

    SHA512

    54bdb7c944677c065ec95b90e5bf10df37a68b7f0b4096e6f8ee9343397706808c7378691f2e77d7d95bdec4503dee24c4cc84c68c1ecc2e799fe547bd1393c8

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Local\Temp\8zQXBYzD.cpl

    Filesize

    3.6MB

    MD5

    effbf8ff952db0e09c79a7982788222a

    SHA1

    8e01b5d78a2b4eccfe3bd188c2fbc845d847a57e

    SHA256

    1fb9fb7a04ecf63049924d1f6641cdb3834d09ac6f6940e1b41e281a68806022

    SHA512

    527d6a550531cd31dc39528565bce3971106bbccdb00f7c2105ef23e7447c76ba0ac1564da7921f1de3909ff2cf101c7a2eaa28129d48d6c984958ea6f36dce9

  • \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

    Filesize

    126KB

    MD5

    aebf8cd9ea982decded5ee6f3777c6d7

    SHA1

    406e723158cd5697503d1d04839d3bc7a5051603

    SHA256

    104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

    SHA512

    f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

  • \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

    Filesize

    126KB

    MD5

    aebf8cd9ea982decded5ee6f3777c6d7

    SHA1

    406e723158cd5697503d1d04839d3bc7a5051603

    SHA256

    104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

    SHA512

    f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

  • \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

    Filesize

    126KB

    MD5

    aebf8cd9ea982decded5ee6f3777c6d7

    SHA1

    406e723158cd5697503d1d04839d3bc7a5051603

    SHA256

    104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

    SHA512

    f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

  • \Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

    Filesize

    126KB

    MD5

    aebf8cd9ea982decded5ee6f3777c6d7

    SHA1

    406e723158cd5697503d1d04839d3bc7a5051603

    SHA256

    104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

    SHA512

    f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

  • memory/528-105-0x0000000002F20000-0x0000000002FEE000-memory.dmp

    Filesize

    824KB

  • memory/528-108-0x0000000002CE0000-0x0000000002E2A000-memory.dmp

    Filesize

    1.3MB

  • memory/528-101-0x0000000002E30000-0x0000000002F15000-memory.dmp

    Filesize

    916KB

  • memory/528-100-0x0000000002CE0000-0x0000000002E2A000-memory.dmp

    Filesize

    1.3MB

  • memory/528-99-0x0000000001E10000-0x0000000002A5A000-memory.dmp

    Filesize

    12.3MB

  • memory/904-112-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/904-111-0x0000000000608000-0x0000000000627000-memory.dmp

    Filesize

    124KB

  • memory/904-104-0x0000000000608000-0x0000000000627000-memory.dmp

    Filesize

    124KB

  • memory/1312-126-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/1312-125-0x00000000002A8000-0x00000000002C7000-memory.dmp

    Filesize

    124KB

  • memory/1312-123-0x00000000002A8000-0x00000000002C7000-memory.dmp

    Filesize

    124KB

  • memory/1400-120-0x0000000000161000-0x000000000017B000-memory.dmp

    Filesize

    104KB

  • memory/1612-129-0x0000000000618000-0x0000000000637000-memory.dmp

    Filesize

    124KB

  • memory/1660-67-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/1660-66-0x00000000002A9000-0x00000000002C8000-memory.dmp

    Filesize

    124KB

  • memory/1660-89-0x00000000002A9000-0x00000000002C8000-memory.dmp

    Filesize

    124KB

  • memory/1660-91-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/1992-60-0x00000000005A8000-0x00000000005C7000-memory.dmp

    Filesize

    124KB

  • memory/1992-61-0x0000000000280000-0x00000000002BE000-memory.dmp

    Filesize

    248KB

  • memory/1992-62-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/1992-54-0x00000000005A8000-0x00000000005C7000-memory.dmp

    Filesize

    124KB

  • memory/1992-55-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/2016-109-0x0000000002FA0000-0x00000000030EA000-memory.dmp

    Filesize

    1.3MB

  • memory/2016-83-0x00000000021D0000-0x0000000002E1A000-memory.dmp

    Filesize

    12.3MB

  • memory/2016-84-0x0000000002FA0000-0x00000000030EA000-memory.dmp

    Filesize

    1.3MB

  • memory/2016-85-0x0000000000600000-0x00000000006E5000-memory.dmp

    Filesize

    916KB

  • memory/2016-86-0x0000000000750000-0x000000000081E000-memory.dmp

    Filesize

    824KB