Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-12-2022 17:28
Static task
static1
Behavioral task
behavioral1
Sample
952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe
Resource
win10v2004-20220812-en
General
-
Target
952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe
-
Size
367KB
-
MD5
17988a22cb3105fae2488f11a38e55e7
-
SHA1
ded099d65110a6be60931ae3e46d14c24ef562e6
-
SHA256
952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
-
SHA512
0bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
SSDEEP
6144:JYCnsLtk6+k4guyzJGRRpppzgLno2VMzrPrTvt0l0iPvzpQ6ijLxQFiaI:FsBkDtOFKpdgLoBPfv+lxnzpQ6ijqF
Malware Config
Extracted
amadey
3.60
62.204.41.79/fb73jc3/index.php
Signatures
-
Detect Amadey credential stealer module 6 IoCs
resource yara_rule behavioral1/files/0x00070000000126c9-85.dat amadey_cred_module behavioral1/files/0x00070000000126c9-86.dat amadey_cred_module behavioral1/memory/1928-90-0x00000000001B0000-0x00000000001D4000-memory.dmp amadey_cred_module behavioral1/files/0x00070000000126c9-89.dat amadey_cred_module behavioral1/files/0x00070000000126c9-88.dat amadey_cred_module behavioral1/files/0x00070000000126c9-87.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1928 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1656 gntuud.exe 1540 gntuud.exe 1112 gntuud.exe 2024 gntuud.exe -
Loads dropped DLL 6 IoCs
pid Process 1076 952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe 1076 952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1656 1076 952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe 28 PID 1076 wrote to memory of 1656 1076 952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe 28 PID 1076 wrote to memory of 1656 1076 952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe 28 PID 1076 wrote to memory of 1656 1076 952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe 28 PID 1656 wrote to memory of 624 1656 gntuud.exe 29 PID 1656 wrote to memory of 624 1656 gntuud.exe 29 PID 1656 wrote to memory of 624 1656 gntuud.exe 29 PID 1656 wrote to memory of 624 1656 gntuud.exe 29 PID 1656 wrote to memory of 952 1656 gntuud.exe 31 PID 1656 wrote to memory of 952 1656 gntuud.exe 31 PID 1656 wrote to memory of 952 1656 gntuud.exe 31 PID 1656 wrote to memory of 952 1656 gntuud.exe 31 PID 952 wrote to memory of 1032 952 cmd.exe 33 PID 952 wrote to memory of 1032 952 cmd.exe 33 PID 952 wrote to memory of 1032 952 cmd.exe 33 PID 952 wrote to memory of 1032 952 cmd.exe 33 PID 952 wrote to memory of 1456 952 cmd.exe 34 PID 952 wrote to memory of 1456 952 cmd.exe 34 PID 952 wrote to memory of 1456 952 cmd.exe 34 PID 952 wrote to memory of 1456 952 cmd.exe 34 PID 952 wrote to memory of 560 952 cmd.exe 35 PID 952 wrote to memory of 560 952 cmd.exe 35 PID 952 wrote to memory of 560 952 cmd.exe 35 PID 952 wrote to memory of 560 952 cmd.exe 35 PID 952 wrote to memory of 868 952 cmd.exe 36 PID 952 wrote to memory of 868 952 cmd.exe 36 PID 952 wrote to memory of 868 952 cmd.exe 36 PID 952 wrote to memory of 868 952 cmd.exe 36 PID 952 wrote to memory of 768 952 cmd.exe 37 PID 952 wrote to memory of 768 952 cmd.exe 37 PID 952 wrote to memory of 768 952 cmd.exe 37 PID 952 wrote to memory of 768 952 cmd.exe 37 PID 952 wrote to memory of 940 952 cmd.exe 38 PID 952 wrote to memory of 940 952 cmd.exe 38 PID 952 wrote to memory of 940 952 cmd.exe 38 PID 952 wrote to memory of 940 952 cmd.exe 38 PID 1980 wrote to memory of 1540 1980 taskeng.exe 42 PID 1980 wrote to memory of 1540 1980 taskeng.exe 42 PID 1980 wrote to memory of 1540 1980 taskeng.exe 42 PID 1980 wrote to memory of 1540 1980 taskeng.exe 42 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1656 wrote to memory of 1928 1656 gntuud.exe 43 PID 1980 wrote to memory of 1112 1980 taskeng.exe 44 PID 1980 wrote to memory of 1112 1980 taskeng.exe 44 PID 1980 wrote to memory of 1112 1980 taskeng.exe 44 PID 1980 wrote to memory of 1112 1980 taskeng.exe 44 PID 1980 wrote to memory of 2024 1980 taskeng.exe 45 PID 1980 wrote to memory of 2024 1980 taskeng.exe 45 PID 1980 wrote to memory of 2024 1980 taskeng.exe 45 PID 1980 wrote to memory of 2024 1980 taskeng.exe 45 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe"C:\Users\Admin\AppData\Local\Temp\952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\2c33368f7d" /P "Admin:N"&&CACLS "..\2c33368f7d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:1456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:N"4⤵PID:768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:R" /E4⤵PID:940
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1928
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B3652FC7-0F90-4AA4-89FE-C1EE7A820C80} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
367KB
MD517988a22cb3105fae2488f11a38e55e7
SHA1ded099d65110a6be60931ae3e46d14c24ef562e6
SHA256952516f9329a78c22dd4616690e1da1d468876a5a5d7410bf3b087d2bd65eec4
SHA5120bceec8403c66a7417d9a837e3531c070ccf22f6473845dcd1ba877a26f6469f4dafdfb185e1462165171f476b3b20d2b596c6d676e93ccbf9394e00d3603a56
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda