Analysis
-
max time kernel
110s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2022 23:02
Static task
static1
Behavioral task
behavioral1
Sample
29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe
Resource
win10v2004-20221111-en
General
-
Target
29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe
-
Size
282KB
-
MD5
06668068f58e3d7e100a89dba30e28a7
-
SHA1
50f45da4d0ea99d8306e9ba3dcf2866c06241f14
-
SHA256
29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc
-
SHA512
5b7d545ad3b2e1adb438f1d4717e950b9ddc88854649fe65d8a0343cb9213e1a570c95845c37901cf1ca0c195ea2b1cf8980b293375d5797d264621feec1d514
-
SSDEEP
3072:zd8I/LhqtT5BrCdP1DqyUqNFuBe2BwQs9xut1KJ+2lvmvoemHqkXPH8oS8noAY30:H/Lh8zw1Dq2wtUAt1fm8oJoAHk5o
Malware Config
Extracted
amadey
3.63
amadtrackings.com/g9TTnd3bS/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral1/files/0x000b000000021473-149.dat amadey_cred_module behavioral1/files/0x000b000000021473-150.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 42 628 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2240 nbveek.exe 4396 nbveek.exe 4860 nbveek.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation nbveek.exe -
Loads dropped DLL 1 IoCs
pid Process 628 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 25 IoCs
pid pid_target Process procid_target 2660 4896 WerFault.exe 80 2036 4896 WerFault.exe 80 2408 4896 WerFault.exe 80 1812 4896 WerFault.exe 80 4300 4896 WerFault.exe 80 220 4896 WerFault.exe 80 2876 4896 WerFault.exe 80 5060 2240 WerFault.exe 94 4636 2240 WerFault.exe 94 5008 2240 WerFault.exe 94 2868 2240 WerFault.exe 94 3704 2240 WerFault.exe 94 4100 2240 WerFault.exe 94 4972 2240 WerFault.exe 94 2788 2240 WerFault.exe 94 4356 2240 WerFault.exe 94 4812 2240 WerFault.exe 94 3736 2240 WerFault.exe 94 3228 2240 WerFault.exe 94 2428 2240 WerFault.exe 94 2304 4396 WerFault.exe 132 4088 2240 WerFault.exe 94 544 2240 WerFault.exe 94 3664 2240 WerFault.exe 94 728 4860 WerFault.exe 142 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 628 rundll32.exe 628 rundll32.exe 628 rundll32.exe 628 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2240 4896 29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe 94 PID 4896 wrote to memory of 2240 4896 29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe 94 PID 4896 wrote to memory of 2240 4896 29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe 94 PID 2240 wrote to memory of 4808 2240 nbveek.exe 111 PID 2240 wrote to memory of 4808 2240 nbveek.exe 111 PID 2240 wrote to memory of 4808 2240 nbveek.exe 111 PID 2240 wrote to memory of 628 2240 nbveek.exe 137 PID 2240 wrote to memory of 628 2240 nbveek.exe 137 PID 2240 wrote to memory of 628 2240 nbveek.exe 137 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe"C:\Users\Admin\AppData\Local\Temp\29ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 9002⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 9642⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 9722⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 10922⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 10922⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 9442⤵
- Program crash
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 5883⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 7283⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 7163⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9643⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9643⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9803⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9883⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9523⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 6243⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 6443⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 8443⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 13723⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 10083⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 16163⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\253fa33afbb5b2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 10283⤵
- Program crash
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 16243⤵
- Program crash
PID:3664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 8722⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4896 -ip 48961⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4896 -ip 48961⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4896 -ip 48961⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4896 -ip 48961⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4896 -ip 48961⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4896 -ip 48961⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4896 -ip 48961⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2240 -ip 22401⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2240 -ip 22401⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2240 -ip 22401⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2240 -ip 22401⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2240 -ip 22401⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2240 -ip 22401⤵PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2240 -ip 22401⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2240 -ip 22401⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2240 -ip 22401⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2240 -ip 22401⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2240 -ip 22401⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2240 -ip 22401⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2240 -ip 22401⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exeC:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe1⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 3162⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4396 -ip 43961⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2240 -ip 22401⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2240 -ip 22401⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2240 -ip 22401⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exeC:\Users\Admin\AppData\Local\Temp\320d7ecc7e\nbveek.exe1⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 3162⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4860 -ip 48601⤵PID:3896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD506668068f58e3d7e100a89dba30e28a7
SHA150f45da4d0ea99d8306e9ba3dcf2866c06241f14
SHA25629ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc
SHA5125b7d545ad3b2e1adb438f1d4717e950b9ddc88854649fe65d8a0343cb9213e1a570c95845c37901cf1ca0c195ea2b1cf8980b293375d5797d264621feec1d514
-
Filesize
282KB
MD506668068f58e3d7e100a89dba30e28a7
SHA150f45da4d0ea99d8306e9ba3dcf2866c06241f14
SHA25629ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc
SHA5125b7d545ad3b2e1adb438f1d4717e950b9ddc88854649fe65d8a0343cb9213e1a570c95845c37901cf1ca0c195ea2b1cf8980b293375d5797d264621feec1d514
-
Filesize
282KB
MD506668068f58e3d7e100a89dba30e28a7
SHA150f45da4d0ea99d8306e9ba3dcf2866c06241f14
SHA25629ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc
SHA5125b7d545ad3b2e1adb438f1d4717e950b9ddc88854649fe65d8a0343cb9213e1a570c95845c37901cf1ca0c195ea2b1cf8980b293375d5797d264621feec1d514
-
Filesize
282KB
MD506668068f58e3d7e100a89dba30e28a7
SHA150f45da4d0ea99d8306e9ba3dcf2866c06241f14
SHA25629ea73123e3f421cbd0ebe032acc974de754fd1fe40d497adba54e42ba6cc7bc
SHA5125b7d545ad3b2e1adb438f1d4717e950b9ddc88854649fe65d8a0343cb9213e1a570c95845c37901cf1ca0c195ea2b1cf8980b293375d5797d264621feec1d514
-
Filesize
126KB
MD5bfee01170eb2d9a9d881a27d3c590b21
SHA11fce13219189f12350427570cf3f00eced380978
SHA25678edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf
SHA512123bbf0f8d8c9b8d98e44f2a38041afb3cbba68d24564976a39a9143c85fe988b4645dd092957060f6498a399210a808edebd7d35a85495927ea4b0bb5f1883a
-
Filesize
126KB
MD5bfee01170eb2d9a9d881a27d3c590b21
SHA11fce13219189f12350427570cf3f00eced380978
SHA25678edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf
SHA512123bbf0f8d8c9b8d98e44f2a38041afb3cbba68d24564976a39a9143c85fe988b4645dd092957060f6498a399210a808edebd7d35a85495927ea4b0bb5f1883a