Analysis
-
max time kernel
115s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16/12/2022, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
286KB
-
MD5
b7f0855a38e270a7d2d939d62f20174a
-
SHA1
7ae4e3d97c18e0c2b250dab479621a82ccc88555
-
SHA256
76f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
-
SHA512
58fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
SSDEEP
6144:0XkiLw8PBfHzx15maSvpDrLPagR3MyI62DtF13VHj8qMrc:0XkiU0x910LvtPZ3My92DbHj8n
Malware Config
Extracted
amadey
3.60
62.204.41.79/fb73jc3/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x0008000000012355-86.dat amadey_cred_module behavioral1/files/0x0008000000012355-87.dat amadey_cred_module behavioral1/files/0x0008000000012355-88.dat amadey_cred_module behavioral1/files/0x0008000000012355-89.dat amadey_cred_module behavioral1/files/0x0008000000012355-90.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1676 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 964 gntuud.exe 632 gntuud.exe 1312 gntuud.exe -
Loads dropped DLL 6 IoCs
pid Process 2008 file.exe 2008 file.exe 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2008 wrote to memory of 964 2008 file.exe 28 PID 2008 wrote to memory of 964 2008 file.exe 28 PID 2008 wrote to memory of 964 2008 file.exe 28 PID 2008 wrote to memory of 964 2008 file.exe 28 PID 964 wrote to memory of 872 964 gntuud.exe 29 PID 964 wrote to memory of 872 964 gntuud.exe 29 PID 964 wrote to memory of 872 964 gntuud.exe 29 PID 964 wrote to memory of 872 964 gntuud.exe 29 PID 964 wrote to memory of 520 964 gntuud.exe 31 PID 964 wrote to memory of 520 964 gntuud.exe 31 PID 964 wrote to memory of 520 964 gntuud.exe 31 PID 964 wrote to memory of 520 964 gntuud.exe 31 PID 520 wrote to memory of 764 520 cmd.exe 33 PID 520 wrote to memory of 764 520 cmd.exe 33 PID 520 wrote to memory of 764 520 cmd.exe 33 PID 520 wrote to memory of 764 520 cmd.exe 33 PID 520 wrote to memory of 560 520 cmd.exe 34 PID 520 wrote to memory of 560 520 cmd.exe 34 PID 520 wrote to memory of 560 520 cmd.exe 34 PID 520 wrote to memory of 560 520 cmd.exe 34 PID 520 wrote to memory of 700 520 cmd.exe 35 PID 520 wrote to memory of 700 520 cmd.exe 35 PID 520 wrote to memory of 700 520 cmd.exe 35 PID 520 wrote to memory of 700 520 cmd.exe 35 PID 520 wrote to memory of 1360 520 cmd.exe 36 PID 520 wrote to memory of 1360 520 cmd.exe 36 PID 520 wrote to memory of 1360 520 cmd.exe 36 PID 520 wrote to memory of 1360 520 cmd.exe 36 PID 520 wrote to memory of 776 520 cmd.exe 37 PID 520 wrote to memory of 776 520 cmd.exe 37 PID 520 wrote to memory of 776 520 cmd.exe 37 PID 520 wrote to memory of 776 520 cmd.exe 37 PID 520 wrote to memory of 1580 520 cmd.exe 38 PID 520 wrote to memory of 1580 520 cmd.exe 38 PID 520 wrote to memory of 1580 520 cmd.exe 38 PID 520 wrote to memory of 1580 520 cmd.exe 38 PID 1624 wrote to memory of 632 1624 taskeng.exe 42 PID 1624 wrote to memory of 632 1624 taskeng.exe 42 PID 1624 wrote to memory of 632 1624 taskeng.exe 42 PID 1624 wrote to memory of 632 1624 taskeng.exe 42 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 964 wrote to memory of 1676 964 gntuud.exe 43 PID 1624 wrote to memory of 1312 1624 taskeng.exe 44 PID 1624 wrote to memory of 1312 1624 taskeng.exe 44 PID 1624 wrote to memory of 1312 1624 taskeng.exe 44 PID 1624 wrote to memory of 1312 1624 taskeng.exe 44 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\2c33368f7d" /P "Admin:N"&&CACLS "..\2c33368f7d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:N"4⤵PID:776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:R" /E4⤵PID:1580
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1676
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {58A251FD-A520-43DD-B247-37A353FBCA9B} S-1-5-21-1214520366-621468234-4062160515-1000:VDWSWJJD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:1312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda