Analysis
-
max time kernel
115s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 19:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
415KB
-
MD5
70cd594f87a878654fd368101f377ff2
-
SHA1
a16ad597765ba4d92f8e5be733cbffc618abffe8
-
SHA256
ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
-
SHA512
eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
SSDEEP
6144:wTCEZKDLbCwKhuf0aPe5nkI+7jaRDro59t34aU4WcoBlCcg0n2+aV:wT1ZM3CwKQ8aPe5k17ja1stoJcWC/+
Malware Config
Extracted
amadey
3.50
62.204.41.6/p9cWxH/index.php
Extracted
redline
new2811
jamesmillion.xyz:15772
-
auth_value
86a08d2c48d5c5db0c9cb371fb180937
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral2/files/0x000a00000000072f-196.dat amadey_cred_module behavioral2/memory/408-199-0x00000000008E0000-0x0000000000904000-memory.dmp amadey_cred_module behavioral2/files/0x000a00000000072f-198.dat amadey_cred_module behavioral2/files/0x000a00000000072f-197.dat amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 43 408 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4156 gntuud.exe 3200 5jk29l2fg.exe 3864 linda5.exe 704 gntuud.exe 3868 gntuud.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation linda5.exe -
Loads dropped DLL 5 IoCs
pid Process 788 rundll32.exe 788 rundll32.exe 1772 rundll32.exe 408 rundll32.exe 408 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5jk29l2fg.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000033001\\5jk29l2fg.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\linda5.exe" gntuud.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3200 set thread context of 2424 3200 5jk29l2fg.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 4872 1528 WerFault.exe 81 952 3200 WerFault.exe 88 432 704 WerFault.exe 106 2188 3868 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings linda5.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2424 vbc.exe 2424 vbc.exe 408 rundll32.exe 408 rundll32.exe 408 rundll32.exe 408 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 vbc.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4156 1528 file.exe 82 PID 1528 wrote to memory of 4156 1528 file.exe 82 PID 1528 wrote to memory of 4156 1528 file.exe 82 PID 4156 wrote to memory of 1180 4156 gntuud.exe 86 PID 4156 wrote to memory of 1180 4156 gntuud.exe 86 PID 4156 wrote to memory of 1180 4156 gntuud.exe 86 PID 4156 wrote to memory of 3200 4156 gntuud.exe 88 PID 4156 wrote to memory of 3200 4156 gntuud.exe 88 PID 4156 wrote to memory of 3200 4156 gntuud.exe 88 PID 3200 wrote to memory of 2424 3200 5jk29l2fg.exe 90 PID 3200 wrote to memory of 2424 3200 5jk29l2fg.exe 90 PID 3200 wrote to memory of 2424 3200 5jk29l2fg.exe 90 PID 3200 wrote to memory of 2424 3200 5jk29l2fg.exe 90 PID 3200 wrote to memory of 2424 3200 5jk29l2fg.exe 90 PID 4156 wrote to memory of 3864 4156 gntuud.exe 93 PID 4156 wrote to memory of 3864 4156 gntuud.exe 93 PID 4156 wrote to memory of 3864 4156 gntuud.exe 93 PID 3864 wrote to memory of 1160 3864 linda5.exe 94 PID 3864 wrote to memory of 1160 3864 linda5.exe 94 PID 3864 wrote to memory of 1160 3864 linda5.exe 94 PID 1160 wrote to memory of 788 1160 control.exe 96 PID 1160 wrote to memory of 788 1160 control.exe 96 PID 1160 wrote to memory of 788 1160 control.exe 96 PID 788 wrote to memory of 4440 788 rundll32.exe 97 PID 788 wrote to memory of 4440 788 rundll32.exe 97 PID 4440 wrote to memory of 1772 4440 RunDll32.exe 98 PID 4440 wrote to memory of 1772 4440 RunDll32.exe 98 PID 4440 wrote to memory of 1772 4440 RunDll32.exe 98 PID 4156 wrote to memory of 408 4156 gntuud.exe 109 PID 4156 wrote to memory of 408 4156 gntuud.exe 109 PID 4156 wrote to memory of 408 4156 gntuud.exe 109 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\1000033001\5jk29l2fg.exe"C:\Users\Admin\AppData\Local\Temp\1000033001\5jk29l2fg.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 2524⤵
- Program crash
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000036001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\linda5.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",6⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Ew1QaMQ.cpl",7⤵
- Loads dropped DLL
PID:1772
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 11362⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1528 -ip 15281⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3200 -ip 32001⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 4242⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 704 -ip 7041⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:3868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 4202⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3868 -ip 38681⤵PID:1908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
787KB
MD5abacca218986209482f20ed9772c4cf4
SHA12398f39d3a0007ed0fbb5af7a26e4ccce249af9f
SHA256a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d
SHA5125a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6
-
Filesize
1.9MB
MD5b9f8dc26001bdf9033c8f3627152f1b4
SHA192ab797bdf46718424b7182a8a4b5af57f2f1978
SHA2566be15b7276c99b56145e867b200f93848e6513275ac006ff55b94350d5b7a849
SHA512982ce9ffa2d028e8a0bab013a6da4c60e955b6d4b90a1f15cd23a396f9d84748b1354f0cb1c8dcb5bfc12f65cfc87156a0d87b825dbe7a510983c311f13e848b
-
Filesize
1.9MB
MD5b9f8dc26001bdf9033c8f3627152f1b4
SHA192ab797bdf46718424b7182a8a4b5af57f2f1978
SHA2566be15b7276c99b56145e867b200f93848e6513275ac006ff55b94350d5b7a849
SHA512982ce9ffa2d028e8a0bab013a6da4c60e955b6d4b90a1f15cd23a396f9d84748b1354f0cb1c8dcb5bfc12f65cfc87156a0d87b825dbe7a510983c311f13e848b
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
415KB
MD570cd594f87a878654fd368101f377ff2
SHA1a16ad597765ba4d92f8e5be733cbffc618abffe8
SHA256ea4612578a49d01cde8383c01738edae7d04af2a5994937f3ab9791b853129fa
SHA512eddc50dfb47f4e78315a7b94380e2e9367611c683a41f4e3284c5d31739928d30fa3a0c992aee3dce11f4444e6ec5db6d46f0359df5458f55285967462b15e2c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
3.6MB
MD501543320298c4842b0223f584ab7f8ed
SHA1bdd998d63b06a8e80b0a0bc62b874e4920628ee8
SHA256ca0051a45a65118a3eca68af4c2bda1f15834b8418d385e7d1d98513bef499e5
SHA512db59490c79b4f5327325f14cee6191bb126d6c6366a862f6392d44da2b4aea1def26c1599ba7f40d79ab8e2923795ca7cf99dc5c3250fec34fb21cc87690d33c
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1