Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
273KB
-
MD5
47760f0b6871e4b571ed5303d9cbe183
-
SHA1
34769f3ddf05f99ab6c96cc174a884084a6a3e25
-
SHA256
bbdf6fa992c7b4af6c838007a88af77b0fa4202cc894cddb75f55f623a79a877
-
SHA512
5966ca19f7a997c82445a06db684d80b372a8857d2ba685feab293ceeeb08c6fd03e805f26bf9581e9cc05cf28e0609487d19777fc30a89766774147edd542e1
-
SSDEEP
6144:/oLdVLHHr8qw3eIeVzUOhXy8mjO8g3CUU0V6:QL7DL8n3leb/bS5O
Malware Config
Extracted
amadey
3.61
62.204.41.79/r8Bsje3/index.php
Extracted
redline
Upadated.999
185.106.92.214:27015
-
auth_value
a6d503c1c63820e9c4a9b5de84087f3f
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral2/files/0x000a000000022f7c-171.dat amadey_cred_module behavioral2/files/0x000a000000022f7c-172.dat amadey_cred_module behavioral2/files/0x000a000000022f7c-173.dat amadey_cred_module behavioral2/memory/1316-174-0x0000000000940000-0x0000000000964000-memory.dmp amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 43 1316 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4652 gntuud.exe 116 joker.exe 220 anon.exe 2512 gntuud.exe 4616 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 2 IoCs
pid Process 1316 rundll32.exe 1316 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\joker.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000001051\\joker.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\anon.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002051\\anon.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 4204 5056 WerFault.exe 80 4160 116 WerFault.exe 86 4148 2512 WerFault.exe 98 3952 4616 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 220 anon.exe 116 joker.exe 220 anon.exe 116 joker.exe 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 116 joker.exe Token: SeDebugPrivilege 220 anon.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4652 5056 file.exe 81 PID 5056 wrote to memory of 4652 5056 file.exe 81 PID 5056 wrote to memory of 4652 5056 file.exe 81 PID 4652 wrote to memory of 2224 4652 gntuud.exe 84 PID 4652 wrote to memory of 2224 4652 gntuud.exe 84 PID 4652 wrote to memory of 2224 4652 gntuud.exe 84 PID 4652 wrote to memory of 116 4652 gntuud.exe 86 PID 4652 wrote to memory of 116 4652 gntuud.exe 86 PID 4652 wrote to memory of 116 4652 gntuud.exe 86 PID 4652 wrote to memory of 220 4652 gntuud.exe 87 PID 4652 wrote to memory of 220 4652 gntuud.exe 87 PID 4652 wrote to memory of 220 4652 gntuud.exe 87 PID 4652 wrote to memory of 1316 4652 gntuud.exe 101 PID 4652 wrote to memory of 1316 4652 gntuud.exe 101 PID 4652 wrote to memory of 1316 4652 gntuud.exe 101 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\1000001051\joker.exe"C:\Users\Admin\AppData\Local\Temp\1000001051\joker.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 16684⤵
- Program crash
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000002051\anon.exe"C:\Users\Admin\AppData\Local\Temp\1000002051\anon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 8962⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5056 -ip 50561⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 116 -ip 1161⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe1⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 2322⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2512 -ip 25121⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe1⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 1842⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4616 -ip 46161⤵PID:4184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5326da97d2b41992feb7d93927c5898b7
SHA1c991dc8e8fc3fa70bb0d1227dc94ce56efff488b
SHA2563aea52e0abe2310c261cf6faece42f308fdda969e1e0685dc86cfdc030cd597a
SHA512a76a4f20c18807835d13d3517bbb102a5ef4157a570fe5aa37d2c53ff23b3993ff8a48c639c54a5f8c4b158dd0bd40cf5648e218fb4b6fb4cf3eb7f89bb456df
-
Filesize
333KB
MD5326da97d2b41992feb7d93927c5898b7
SHA1c991dc8e8fc3fa70bb0d1227dc94ce56efff488b
SHA2563aea52e0abe2310c261cf6faece42f308fdda969e1e0685dc86cfdc030cd597a
SHA512a76a4f20c18807835d13d3517bbb102a5ef4157a570fe5aa37d2c53ff23b3993ff8a48c639c54a5f8c4b158dd0bd40cf5648e218fb4b6fb4cf3eb7f89bb456df
-
Filesize
335KB
MD5246ef065801c2aaac08b7c1c74e4b8bf
SHA15c15a2f7a8465a020d1ce72191bb2db76f969130
SHA256b844e3f70697b36557704833f491b8c19bfb683fe5e03c4bb488039c8c0e6422
SHA5122ad6be07d6e82678e01295ce3949b41cdf9e3a34ba6685d7400e776e612c1420a5e649cd5e17a31fb79254beb0b21a88337f4f282cd21a52e17a76fcc4ce39bd
-
Filesize
335KB
MD5246ef065801c2aaac08b7c1c74e4b8bf
SHA15c15a2f7a8465a020d1ce72191bb2db76f969130
SHA256b844e3f70697b36557704833f491b8c19bfb683fe5e03c4bb488039c8c0e6422
SHA5122ad6be07d6e82678e01295ce3949b41cdf9e3a34ba6685d7400e776e612c1420a5e649cd5e17a31fb79254beb0b21a88337f4f282cd21a52e17a76fcc4ce39bd
-
Filesize
273KB
MD547760f0b6871e4b571ed5303d9cbe183
SHA134769f3ddf05f99ab6c96cc174a884084a6a3e25
SHA256bbdf6fa992c7b4af6c838007a88af77b0fa4202cc894cddb75f55f623a79a877
SHA5125966ca19f7a997c82445a06db684d80b372a8857d2ba685feab293ceeeb08c6fd03e805f26bf9581e9cc05cf28e0609487d19777fc30a89766774147edd542e1
-
Filesize
273KB
MD547760f0b6871e4b571ed5303d9cbe183
SHA134769f3ddf05f99ab6c96cc174a884084a6a3e25
SHA256bbdf6fa992c7b4af6c838007a88af77b0fa4202cc894cddb75f55f623a79a877
SHA5125966ca19f7a997c82445a06db684d80b372a8857d2ba685feab293ceeeb08c6fd03e805f26bf9581e9cc05cf28e0609487d19777fc30a89766774147edd542e1
-
Filesize
273KB
MD547760f0b6871e4b571ed5303d9cbe183
SHA134769f3ddf05f99ab6c96cc174a884084a6a3e25
SHA256bbdf6fa992c7b4af6c838007a88af77b0fa4202cc894cddb75f55f623a79a877
SHA5125966ca19f7a997c82445a06db684d80b372a8857d2ba685feab293ceeeb08c6fd03e805f26bf9581e9cc05cf28e0609487d19777fc30a89766774147edd542e1
-
Filesize
273KB
MD547760f0b6871e4b571ed5303d9cbe183
SHA134769f3ddf05f99ab6c96cc174a884084a6a3e25
SHA256bbdf6fa992c7b4af6c838007a88af77b0fa4202cc894cddb75f55f623a79a877
SHA5125966ca19f7a997c82445a06db684d80b372a8857d2ba685feab293ceeeb08c6fd03e805f26bf9581e9cc05cf28e0609487d19777fc30a89766774147edd542e1
-
Filesize
126KB
MD52499af3cae193bfde304401dcc0e0f88
SHA11bfdec793c338421809d00bdd36e9135cf858d7f
SHA2560e943fdd8ab511a067276a911f9f9a2271771331d47d428b0f740c55d1baa0a7
SHA51213e3cc3d5296fecb18b47aa72957a43f851ef798be534dbd3995bd38508861efd8f879b86456f09341a817fc0b50a93233ca05bc0ffda949fac85c27c8e451c0
-
Filesize
126KB
MD52499af3cae193bfde304401dcc0e0f88
SHA11bfdec793c338421809d00bdd36e9135cf858d7f
SHA2560e943fdd8ab511a067276a911f9f9a2271771331d47d428b0f740c55d1baa0a7
SHA51213e3cc3d5296fecb18b47aa72957a43f851ef798be534dbd3995bd38508861efd8f879b86456f09341a817fc0b50a93233ca05bc0ffda949fac85c27c8e451c0
-
Filesize
126KB
MD52499af3cae193bfde304401dcc0e0f88
SHA11bfdec793c338421809d00bdd36e9135cf858d7f
SHA2560e943fdd8ab511a067276a911f9f9a2271771331d47d428b0f740c55d1baa0a7
SHA51213e3cc3d5296fecb18b47aa72957a43f851ef798be534dbd3995bd38508861efd8f879b86456f09341a817fc0b50a93233ca05bc0ffda949fac85c27c8e451c0