Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
287KB
-
MD5
1a97c4406f348d25ead8d0602ad4bc76
-
SHA1
22e5a1098ab941bd29ccc584535db7e70dea21d7
-
SHA256
d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
-
SHA512
2588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
SSDEEP
6144:tUk2LiaIHxnaoo2WoBUqraScFELtf8qMrc:tUk2eaSxnaz3qujELx8n
Malware Config
Extracted
amadey
3.60
62.204.41.79/fb73jc3/index.php
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral2/files/0x000b000000022f6d-156.dat amadey_cred_module behavioral2/files/0x000b000000022f6d-157.dat amadey_cred_module behavioral2/files/0x000b000000022f6d-158.dat amadey_cred_module behavioral2/memory/4184-159-0x00000000009D0000-0x00000000009F4000-memory.dmp amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 39 4184 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1376 gntuud.exe 1116 gntuud.exe 536 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 2 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4896 4568 WerFault.exe 78 1408 1116 WerFault.exe 101 860 536 WerFault.exe 105 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1376 4568 file.exe 79 PID 4568 wrote to memory of 1376 4568 file.exe 79 PID 4568 wrote to memory of 1376 4568 file.exe 79 PID 1376 wrote to memory of 5032 1376 gntuud.exe 85 PID 1376 wrote to memory of 5032 1376 gntuud.exe 85 PID 1376 wrote to memory of 5032 1376 gntuud.exe 85 PID 1376 wrote to memory of 1896 1376 gntuud.exe 87 PID 1376 wrote to memory of 1896 1376 gntuud.exe 87 PID 1376 wrote to memory of 1896 1376 gntuud.exe 87 PID 1896 wrote to memory of 2508 1896 cmd.exe 89 PID 1896 wrote to memory of 2508 1896 cmd.exe 89 PID 1896 wrote to memory of 2508 1896 cmd.exe 89 PID 1896 wrote to memory of 2428 1896 cmd.exe 90 PID 1896 wrote to memory of 2428 1896 cmd.exe 90 PID 1896 wrote to memory of 2428 1896 cmd.exe 90 PID 1896 wrote to memory of 224 1896 cmd.exe 91 PID 1896 wrote to memory of 224 1896 cmd.exe 91 PID 1896 wrote to memory of 224 1896 cmd.exe 91 PID 1896 wrote to memory of 2260 1896 cmd.exe 92 PID 1896 wrote to memory of 2260 1896 cmd.exe 92 PID 1896 wrote to memory of 2260 1896 cmd.exe 92 PID 1896 wrote to memory of 1564 1896 cmd.exe 93 PID 1896 wrote to memory of 1564 1896 cmd.exe 93 PID 1896 wrote to memory of 1564 1896 cmd.exe 93 PID 1896 wrote to memory of 708 1896 cmd.exe 94 PID 1896 wrote to memory of 708 1896 cmd.exe 94 PID 1896 wrote to memory of 708 1896 cmd.exe 94 PID 1376 wrote to memory of 4184 1376 gntuud.exe 104 PID 1376 wrote to memory of 4184 1376 gntuud.exe 104 PID 1376 wrote to memory of 4184 1376 gntuud.exe 104 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:5032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\2c33368f7d" /P "Admin:N"&&CACLS "..\2c33368f7d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:2428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:N"4⤵PID:1564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:R" /E4⤵PID:708
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 11362⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4568 -ip 45681⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe1⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 4162⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1116 -ip 11161⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe1⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 4242⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 536 -ip 5361⤵PID:1808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda