Analysis
-
max time kernel
109s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 19:14
Static task
static1
Behavioral task
behavioral1
Sample
c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe
Resource
win10-20220812-en
General
-
Target
c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe
-
Size
415KB
-
MD5
4e12f53b36ae58a9e181cd3bc660e750
-
SHA1
d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
-
SHA256
c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
-
SHA512
3932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
SSDEEP
6144:/mjIyZwfLm4RP6BLMZhJrAHo496ZC4qVatxX4WcoBlCwh/yaV:/mjBZWi4RCBQ8oFQ3VatxrcWCsq
Malware Config
Extracted
amadey
3.50
77.73.133.72/hfk3vK9/index.php
Extracted
redline
@2023@
193.106.191.138:32796
-
auth_value
ca057e5baadfd0774a34a6a949cd5e69
Signatures
-
Detect Amadey credential stealer module 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3020-301-0x0000000002240000-0x0000000002286000-memory.dmp family_redline behavioral1/memory/3020-308-0x0000000004A40000-0x0000000004A84000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 10 752 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
gntuud.exesoftx64.exegntuud.exegntuud.exepid process 3812 gntuud.exe 3020 softx64.exe 1920 gntuud.exe 2676 gntuud.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 752 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\softx64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000015001\\softx64.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
softx64.exerundll32.exepid process 3020 softx64.exe 752 rundll32.exe 752 rundll32.exe 752 rundll32.exe 752 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
softx64.exedescription pid process Token: SeDebugPrivilege 3020 softx64.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exegntuud.exedescription pid process target process PID 3668 wrote to memory of 3812 3668 c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe gntuud.exe PID 3668 wrote to memory of 3812 3668 c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe gntuud.exe PID 3668 wrote to memory of 3812 3668 c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe gntuud.exe PID 3812 wrote to memory of 4360 3812 gntuud.exe schtasks.exe PID 3812 wrote to memory of 4360 3812 gntuud.exe schtasks.exe PID 3812 wrote to memory of 4360 3812 gntuud.exe schtasks.exe PID 3812 wrote to memory of 3020 3812 gntuud.exe softx64.exe PID 3812 wrote to memory of 3020 3812 gntuud.exe softx64.exe PID 3812 wrote to memory of 3020 3812 gntuud.exe softx64.exe PID 3812 wrote to memory of 752 3812 gntuud.exe rundll32.exe PID 3812 wrote to memory of 752 3812 gntuud.exe rundll32.exe PID 3812 wrote to memory of 752 3812 gntuud.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe"C:\Users\Admin\AppData\Local\Temp\c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000015001\softx64.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\softx64.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000015001\softx64.exeFilesize
476KB
MD5eda400d0724f108284bb21c257f7fcd7
SHA174d91cd3afb64195bb8d74cf953afbc5cfa8e80f
SHA25649c5c8e220e2349246c14690a79904bed01bc47e86506edd61b323257795f952
SHA5127f8be6149c0e19881c7cd9a8a8d9d0771c926dec56ce80742618f563fdf55e8a89fba2106d7311828f67aa748d948c2bab95604a1a74268575226260d8f619c7
-
C:\Users\Admin\AppData\Local\Temp\1000015001\softx64.exeFilesize
476KB
MD5eda400d0724f108284bb21c257f7fcd7
SHA174d91cd3afb64195bb8d74cf953afbc5cfa8e80f
SHA25649c5c8e220e2349246c14690a79904bed01bc47e86506edd61b323257795f952
SHA5127f8be6149c0e19881c7cd9a8a8d9d0771c926dec56ce80742618f563fdf55e8a89fba2106d7311828f67aa748d948c2bab95604a1a74268575226260d8f619c7
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeFilesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeFilesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeFilesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeFilesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dllFilesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dllFilesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
memory/752-400-0x0000000000000000-mapping.dmp
-
memory/1920-380-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2676-518-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2676-517-0x00000000007A4000-0x00000000007C3000-memory.dmpFilesize
124KB
-
memory/3020-347-0x00000000077B0000-0x00000000077FB000-memory.dmpFilesize
300KB
-
memory/3020-392-0x0000000008820000-0x0000000008D4C000-memory.dmpFilesize
5.2MB
-
memory/3020-337-0x0000000007740000-0x0000000007752000-memory.dmpFilesize
72KB
-
memory/3020-330-0x0000000007410000-0x000000000751A000-memory.dmpFilesize
1.0MB
-
memory/3020-381-0x0000000000500000-0x000000000064A000-memory.dmpFilesize
1.3MB
-
memory/3020-383-0x00000000081C0000-0x0000000008226000-memory.dmpFilesize
408KB
-
memory/3020-390-0x00000000084B0000-0x0000000008542000-memory.dmpFilesize
584KB
-
memory/3020-391-0x0000000008650000-0x0000000008812000-memory.dmpFilesize
1.8MB
-
memory/3020-301-0x0000000002240000-0x0000000002286000-memory.dmpFilesize
280KB
-
memory/3020-344-0x0000000007760000-0x000000000779E000-memory.dmpFilesize
248KB
-
memory/3020-328-0x00000000056C0000-0x0000000005CC6000-memory.dmpFilesize
6.0MB
-
memory/3020-399-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/3020-252-0x0000000000000000-mapping.dmp
-
memory/3020-308-0x0000000004A40000-0x0000000004A84000-memory.dmpFilesize
272KB
-
memory/3020-306-0x0000000004BB0000-0x00000000050AE000-memory.dmpFilesize
5.0MB
-
memory/3020-288-0x0000000000500000-0x000000000064A000-memory.dmpFilesize
1.3MB
-
memory/3020-289-0x00000000020D0000-0x000000000211B000-memory.dmpFilesize
300KB
-
memory/3020-290-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/3668-138-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-145-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-150-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-151-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-152-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-153-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-154-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-155-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-156-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-157-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-158-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-159-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-160-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-161-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-162-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3668-163-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-164-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-165-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-166-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-167-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-168-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-118-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-148-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-147-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-172-0x00000000007C0000-0x00000000007FE000-memory.dmpFilesize
248KB
-
memory/3668-146-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-174-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3668-149-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-144-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-139-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-142-0x00000000007C0000-0x00000000007FE000-memory.dmpFilesize
248KB
-
memory/3668-143-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-140-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB
-
memory/3668-141-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-137-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-136-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-135-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-134-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-133-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-132-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-131-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-130-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-129-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-128-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-127-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-126-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-125-0x0000000000501000-0x0000000000520000-memory.dmpFilesize
124KB
-
memory/3668-124-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-123-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-122-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-121-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-120-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3668-119-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-169-0x0000000000000000-mapping.dmp
-
memory/3812-186-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-286-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/3812-171-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-213-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3812-212-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/3812-190-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-189-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-188-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-187-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-185-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-287-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3812-184-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-183-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-182-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-179-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-178-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-177-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-176-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-175-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3812-173-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/4360-224-0x0000000000000000-mapping.dmp