Analysis
-
max time kernel
103s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2022 20:30
Static task
static1
Behavioral task
behavioral1
Sample
fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe
Resource
win10v2004-20221111-en
General
-
Target
fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe
-
Size
281KB
-
MD5
af991d7c2db58e42549976ccb36e5cc7
-
SHA1
748c8a3a47d7331df0fc2f25a4e891161ec11c2d
-
SHA256
fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa
-
SHA512
d57b56ea10ba0abf572ec67a272e0e6b958a4ddd27d9f8d92cfb31191cf9838132b99936f15490ca67acdedaddaae2c4a9239e30adef4d9cd970e0bff7421b2a
-
SSDEEP
6144:hYPLCzXNHJFXbYGq2x5whJ4X5R158YXeIeYC8o13azHk5o:hg2zXHFXEGqAwhaXXXXeZaQ
Malware Config
Extracted
amadey
3.61
62.204.41.79/U7vfDb3kg/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023173-147.dat amadey_cred_module behavioral1/files/0x000b000000023173-148.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 34 3932 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 4840 gntuud.exe 4792 gntuud.exe 5004 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 1 IoCs
pid Process 3932 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3916 3956 WerFault.exe 78 4536 4792 WerFault.exe 91 1976 5004 WerFault.exe 95 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3932 rundll32.exe 3932 rundll32.exe 3932 rundll32.exe 3932 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3956 wrote to memory of 4840 3956 fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe 81 PID 3956 wrote to memory of 4840 3956 fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe 81 PID 3956 wrote to memory of 4840 3956 fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe 81 PID 4840 wrote to memory of 380 4840 gntuud.exe 85 PID 4840 wrote to memory of 380 4840 gntuud.exe 85 PID 4840 wrote to memory of 380 4840 gntuud.exe 85 PID 4840 wrote to memory of 3932 4840 gntuud.exe 94 PID 4840 wrote to memory of 3932 4840 gntuud.exe 94 PID 4840 wrote to memory of 3932 4840 gntuud.exe 94 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe"C:\Users\Admin\AppData\Local\Temp\fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:380
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:3932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 8762⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3956 -ip 39561⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe1⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 3162⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4792 -ip 47921⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe1⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 3162⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5004 -ip 50041⤵PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5af991d7c2db58e42549976ccb36e5cc7
SHA1748c8a3a47d7331df0fc2f25a4e891161ec11c2d
SHA256fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa
SHA512d57b56ea10ba0abf572ec67a272e0e6b958a4ddd27d9f8d92cfb31191cf9838132b99936f15490ca67acdedaddaae2c4a9239e30adef4d9cd970e0bff7421b2a
-
Filesize
281KB
MD5af991d7c2db58e42549976ccb36e5cc7
SHA1748c8a3a47d7331df0fc2f25a4e891161ec11c2d
SHA256fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa
SHA512d57b56ea10ba0abf572ec67a272e0e6b958a4ddd27d9f8d92cfb31191cf9838132b99936f15490ca67acdedaddaae2c4a9239e30adef4d9cd970e0bff7421b2a
-
Filesize
281KB
MD5af991d7c2db58e42549976ccb36e5cc7
SHA1748c8a3a47d7331df0fc2f25a4e891161ec11c2d
SHA256fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa
SHA512d57b56ea10ba0abf572ec67a272e0e6b958a4ddd27d9f8d92cfb31191cf9838132b99936f15490ca67acdedaddaae2c4a9239e30adef4d9cd970e0bff7421b2a
-
Filesize
281KB
MD5af991d7c2db58e42549976ccb36e5cc7
SHA1748c8a3a47d7331df0fc2f25a4e891161ec11c2d
SHA256fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa
SHA512d57b56ea10ba0abf572ec67a272e0e6b958a4ddd27d9f8d92cfb31191cf9838132b99936f15490ca67acdedaddaae2c4a9239e30adef4d9cd970e0bff7421b2a
-
Filesize
126KB
MD5af364df1b3d1011a1e53cc43a0f47931
SHA140a1afe04bb41b40c0369ac5d4707fc74583d2a3
SHA2563357dbe44c1e509faa7b63e62b70600ef38fbc44aa9a7a4037b1edeb9c5528c2
SHA512e25a6185d047a29797c34d43c4bed82fb3c062f057fa0d28f19bdf6b067e1166a232b981797c0d7e371bf3faa2e5b3ca00bdf8a0a8303221bdcc8b126c669f69
-
Filesize
126KB
MD5af364df1b3d1011a1e53cc43a0f47931
SHA140a1afe04bb41b40c0369ac5d4707fc74583d2a3
SHA2563357dbe44c1e509faa7b63e62b70600ef38fbc44aa9a7a4037b1edeb9c5528c2
SHA512e25a6185d047a29797c34d43c4bed82fb3c062f057fa0d28f19bdf6b067e1166a232b981797c0d7e371bf3faa2e5b3ca00bdf8a0a8303221bdcc8b126c669f69