Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe
Resource
win10v2004-20221111-en
General
-
Target
1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe
-
Size
273KB
-
MD5
c5e6b0ddf6414795b054b7448380e1e5
-
SHA1
fcbe111058babc8078836b603cc9b5b72407a638
-
SHA256
1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30
-
SHA512
266dd087a6798e35cfacb94f8e3d260c61c9bca876f1746532233901367181886ca65ba21772eedbadb6606d695f46e56d4e2c800a597760be39189159c572ed
-
SSDEEP
6144:Jd5KBLJk9cxa5tTNHKgODZP+VAFwV8Il+rjjlVklPH:JTi1UcKFKgA+VI2MlU
Malware Config
Extracted
amadey
3.50
31.41.244.237/jg94cVd30f/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023181-155.dat amadey_cred_module behavioral1/files/0x0009000000023181-156.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 39 452 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2980 gntuud.exe 3652 gntuud.exe 2568 gntuud.exe 4496 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 1 IoCs
pid Process 452 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1712 1208 WerFault.exe 78 4340 3652 WerFault.exe 98 4380 2568 WerFault.exe 103 4092 4496 WerFault.exe 106 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2980 1208 1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe 81 PID 1208 wrote to memory of 2980 1208 1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe 81 PID 1208 wrote to memory of 2980 1208 1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe 81 PID 2980 wrote to memory of 1672 2980 gntuud.exe 85 PID 2980 wrote to memory of 1672 2980 gntuud.exe 85 PID 2980 wrote to memory of 1672 2980 gntuud.exe 85 PID 2980 wrote to memory of 4288 2980 gntuud.exe 87 PID 2980 wrote to memory of 4288 2980 gntuud.exe 87 PID 2980 wrote to memory of 4288 2980 gntuud.exe 87 PID 4288 wrote to memory of 4720 4288 cmd.exe 89 PID 4288 wrote to memory of 4720 4288 cmd.exe 89 PID 4288 wrote to memory of 4720 4288 cmd.exe 89 PID 4288 wrote to memory of 3748 4288 cmd.exe 90 PID 4288 wrote to memory of 3748 4288 cmd.exe 90 PID 4288 wrote to memory of 3748 4288 cmd.exe 90 PID 4288 wrote to memory of 4460 4288 cmd.exe 91 PID 4288 wrote to memory of 4460 4288 cmd.exe 91 PID 4288 wrote to memory of 4460 4288 cmd.exe 91 PID 4288 wrote to memory of 5016 4288 cmd.exe 92 PID 4288 wrote to memory of 5016 4288 cmd.exe 92 PID 4288 wrote to memory of 5016 4288 cmd.exe 92 PID 4288 wrote to memory of 4984 4288 cmd.exe 93 PID 4288 wrote to memory of 4984 4288 cmd.exe 93 PID 4288 wrote to memory of 4984 4288 cmd.exe 93 PID 4288 wrote to memory of 3720 4288 cmd.exe 94 PID 4288 wrote to memory of 3720 4288 cmd.exe 94 PID 4288 wrote to memory of 3720 4288 cmd.exe 94 PID 2980 wrote to memory of 452 2980 gntuud.exe 102 PID 2980 wrote to memory of 452 2980 gntuud.exe 102 PID 2980 wrote to memory of 452 2980 gntuud.exe 102 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe"C:\Users\Admin\AppData\Local\Temp\1a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\9c69749b54" /P "Admin:N"&&CACLS "..\9c69749b54" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:3748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:4460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9c69749b54" /P "Admin:N"4⤵PID:4984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9c69749b54" /P "Admin:R" /E4⤵PID:3720
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\85f469ce401df1\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 9002⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1208 -ip 12081⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe1⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 4162⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3652 -ip 36521⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe1⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 4162⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2568 -ip 25681⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe1⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 4162⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4496 -ip 44961⤵PID:5052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5c5e6b0ddf6414795b054b7448380e1e5
SHA1fcbe111058babc8078836b603cc9b5b72407a638
SHA2561a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30
SHA512266dd087a6798e35cfacb94f8e3d260c61c9bca876f1746532233901367181886ca65ba21772eedbadb6606d695f46e56d4e2c800a597760be39189159c572ed
-
Filesize
273KB
MD5c5e6b0ddf6414795b054b7448380e1e5
SHA1fcbe111058babc8078836b603cc9b5b72407a638
SHA2561a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30
SHA512266dd087a6798e35cfacb94f8e3d260c61c9bca876f1746532233901367181886ca65ba21772eedbadb6606d695f46e56d4e2c800a597760be39189159c572ed
-
Filesize
273KB
MD5c5e6b0ddf6414795b054b7448380e1e5
SHA1fcbe111058babc8078836b603cc9b5b72407a638
SHA2561a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30
SHA512266dd087a6798e35cfacb94f8e3d260c61c9bca876f1746532233901367181886ca65ba21772eedbadb6606d695f46e56d4e2c800a597760be39189159c572ed
-
Filesize
273KB
MD5c5e6b0ddf6414795b054b7448380e1e5
SHA1fcbe111058babc8078836b603cc9b5b72407a638
SHA2561a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30
SHA512266dd087a6798e35cfacb94f8e3d260c61c9bca876f1746532233901367181886ca65ba21772eedbadb6606d695f46e56d4e2c800a597760be39189159c572ed
-
Filesize
273KB
MD5c5e6b0ddf6414795b054b7448380e1e5
SHA1fcbe111058babc8078836b603cc9b5b72407a638
SHA2561a9fcc9824192930be4f99536934ce03a2e06ab428097285aa1617e9c4c87d30
SHA512266dd087a6798e35cfacb94f8e3d260c61c9bca876f1746532233901367181886ca65ba21772eedbadb6606d695f46e56d4e2c800a597760be39189159c572ed
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9