Analysis
-
max time kernel
115s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2022, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
286KB
-
MD5
b7f0855a38e270a7d2d939d62f20174a
-
SHA1
7ae4e3d97c18e0c2b250dab479621a82ccc88555
-
SHA256
76f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
-
SHA512
58fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
SSDEEP
6144:0XkiLw8PBfHzx15maSvpDrLPagR3MyI62DtF13VHj8qMrc:0XkiU0x910LvtPZ3My92DbHj8n
Malware Config
Extracted
amadey
3.60
62.204.41.79/fb73jc3/index.php
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral2/files/0x000700000001e514-155.dat amadey_cred_module behavioral2/memory/2228-158-0x00000000008B0000-0x00000000008D4000-memory.dmp amadey_cred_module behavioral2/files/0x000700000001e514-157.dat amadey_cred_module behavioral2/files/0x000700000001e514-156.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 38 2228 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3796 gntuud.exe 836 gntuud.exe 5076 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 rundll32.exe 2228 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 536 3828 WerFault.exe 82 4108 836 WerFault.exe 103 3592 5076 WerFault.exe 107 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3828 wrote to memory of 3796 3828 file.exe 83 PID 3828 wrote to memory of 3796 3828 file.exe 83 PID 3828 wrote to memory of 3796 3828 file.exe 83 PID 3796 wrote to memory of 4824 3796 gntuud.exe 89 PID 3796 wrote to memory of 4824 3796 gntuud.exe 89 PID 3796 wrote to memory of 4824 3796 gntuud.exe 89 PID 3796 wrote to memory of 1592 3796 gntuud.exe 91 PID 3796 wrote to memory of 1592 3796 gntuud.exe 91 PID 3796 wrote to memory of 1592 3796 gntuud.exe 91 PID 1592 wrote to memory of 1328 1592 cmd.exe 93 PID 1592 wrote to memory of 1328 1592 cmd.exe 93 PID 1592 wrote to memory of 1328 1592 cmd.exe 93 PID 1592 wrote to memory of 312 1592 cmd.exe 94 PID 1592 wrote to memory of 312 1592 cmd.exe 94 PID 1592 wrote to memory of 312 1592 cmd.exe 94 PID 1592 wrote to memory of 2704 1592 cmd.exe 95 PID 1592 wrote to memory of 2704 1592 cmd.exe 95 PID 1592 wrote to memory of 2704 1592 cmd.exe 95 PID 1592 wrote to memory of 448 1592 cmd.exe 96 PID 1592 wrote to memory of 448 1592 cmd.exe 96 PID 1592 wrote to memory of 448 1592 cmd.exe 96 PID 1592 wrote to memory of 4088 1592 cmd.exe 97 PID 1592 wrote to memory of 4088 1592 cmd.exe 97 PID 1592 wrote to memory of 4088 1592 cmd.exe 97 PID 1592 wrote to memory of 2632 1592 cmd.exe 98 PID 1592 wrote to memory of 2632 1592 cmd.exe 98 PID 1592 wrote to memory of 2632 1592 cmd.exe 98 PID 3796 wrote to memory of 2228 3796 gntuud.exe 106 PID 3796 wrote to memory of 2228 3796 gntuud.exe 106 PID 3796 wrote to memory of 2228 3796 gntuud.exe 106 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\2c33368f7d" /P "Admin:N"&&CACLS "..\2c33368f7d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:2704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:N"4⤵PID:4088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:R" /E4⤵PID:2632
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:2228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 9042⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3828 -ip 38281⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe1⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 4162⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 836 -ip 8361⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe1⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 4162⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5076 -ip 50761⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
286KB
MD5b7f0855a38e270a7d2d939d62f20174a
SHA17ae4e3d97c18e0c2b250dab479621a82ccc88555
SHA25676f53358df7fb36537cbfa5dcb9c6625d299438eb9ddabe1ca4897b9952b98da
SHA51258fba0c19644e45ad5db5cc935836305d68ebdbcf65c19cbd3d8a9c98392d6cbc73d2c0958451ba96a9be02e0a75af0db115fe4afd5513fa83e7aff5ef62e5b7
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda