Analysis
-
max time kernel
99s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2022 17:10
Static task
static1
Behavioral task
behavioral1
Sample
a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe
Resource
win10v2004-20221111-en
General
-
Target
a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe
-
Size
287KB
-
MD5
8f3d9f98ff8a5559b93f96c2ad8fef1b
-
SHA1
b8ea5c58600943fda8f0957006e5c02e8af3ef42
-
SHA256
a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc
-
SHA512
a579b5ff6f105e3ca019472bbaeb95acfcd2fcdaf46712bc6fab4f2fb2c1c5ac20fad9b045ca72d0e638eca4137c0ad686bb20b92950ba7d5b4af3dd4451a999
-
SSDEEP
6144:SfLqrVGgtnsQXjzVvvPwlS+RxgBu7VJ/RgGymI:SWhGgxtjzRj+RAu7VVRkm
Malware Config
Extracted
amadey
3.63
62.204.41.165/g8sjnd3xe/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral1/files/0x0010000000022dfe-148.dat amadey_cred_module behavioral1/files/0x0010000000022dfe-149.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 35 4552 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 3424 nbveek.exe 4864 nbveek.exe 1704 nbveek.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation nbveek.exe -
Loads dropped DLL 1 IoCs
pid Process 4552 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 22 IoCs
pid pid_target Process procid_target 4472 2180 WerFault.exe 81 220 2180 WerFault.exe 81 4184 2180 WerFault.exe 81 2724 2180 WerFault.exe 81 4380 2180 WerFault.exe 81 4652 2180 WerFault.exe 81 916 3424 WerFault.exe 97 1716 3424 WerFault.exe 97 3092 3424 WerFault.exe 97 3668 3424 WerFault.exe 97 5052 3424 WerFault.exe 97 5092 3424 WerFault.exe 97 724 3424 WerFault.exe 97 2684 3424 WerFault.exe 97 2696 3424 WerFault.exe 97 1500 3424 WerFault.exe 97 1320 3424 WerFault.exe 97 4840 3424 WerFault.exe 97 3996 3424 WerFault.exe 97 3244 3424 WerFault.exe 97 224 3424 WerFault.exe 97 3864 3424 WerFault.exe 97 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4552 rundll32.exe 4552 rundll32.exe 4552 rundll32.exe 4552 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3424 2180 a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe 97 PID 2180 wrote to memory of 3424 2180 a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe 97 PID 2180 wrote to memory of 3424 2180 a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe 97 PID 3424 wrote to memory of 4384 3424 nbveek.exe 113 PID 3424 wrote to memory of 4384 3424 nbveek.exe 113 PID 3424 wrote to memory of 4384 3424 nbveek.exe 113 PID 3424 wrote to memory of 4552 3424 nbveek.exe 133 PID 3424 wrote to memory of 4552 3424 nbveek.exe 133 PID 3424 wrote to memory of 4552 3424 nbveek.exe 133 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe"C:\Users\Admin\AppData\Local\Temp\a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 8642⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 9402⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 10722⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 9482⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 9482⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 9442⤵
- Program crash
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 5843⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 7283⤵
- Program crash
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 7323⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9523⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9843⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9763⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9403⤵
- Program crash
PID:724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 8963⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 11443⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6203⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 7883⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 13243⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10043⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 15243⤵
- Program crash
PID:3244
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 15083⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 15403⤵
- Program crash
PID:3864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2180 -ip 21801⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2180 -ip 21801⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2180 -ip 21801⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2180 -ip 21801⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2180 -ip 21801⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2180 -ip 21801⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3424 -ip 34241⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3424 -ip 34241⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3424 -ip 34241⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3424 -ip 34241⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3424 -ip 34241⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3424 -ip 34241⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3424 -ip 34241⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3424 -ip 34241⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3424 -ip 34241⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3424 -ip 34241⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3424 -ip 34241⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3424 -ip 34241⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exeC:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe1⤵
- Executes dropped EXE
PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3424 -ip 34241⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3424 -ip 34241⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3424 -ip 34241⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3424 -ip 34241⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exeC:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe1⤵
- Executes dropped EXE
PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD58f3d9f98ff8a5559b93f96c2ad8fef1b
SHA1b8ea5c58600943fda8f0957006e5c02e8af3ef42
SHA256a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc
SHA512a579b5ff6f105e3ca019472bbaeb95acfcd2fcdaf46712bc6fab4f2fb2c1c5ac20fad9b045ca72d0e638eca4137c0ad686bb20b92950ba7d5b4af3dd4451a999
-
Filesize
287KB
MD58f3d9f98ff8a5559b93f96c2ad8fef1b
SHA1b8ea5c58600943fda8f0957006e5c02e8af3ef42
SHA256a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc
SHA512a579b5ff6f105e3ca019472bbaeb95acfcd2fcdaf46712bc6fab4f2fb2c1c5ac20fad9b045ca72d0e638eca4137c0ad686bb20b92950ba7d5b4af3dd4451a999
-
Filesize
287KB
MD58f3d9f98ff8a5559b93f96c2ad8fef1b
SHA1b8ea5c58600943fda8f0957006e5c02e8af3ef42
SHA256a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc
SHA512a579b5ff6f105e3ca019472bbaeb95acfcd2fcdaf46712bc6fab4f2fb2c1c5ac20fad9b045ca72d0e638eca4137c0ad686bb20b92950ba7d5b4af3dd4451a999
-
Filesize
287KB
MD58f3d9f98ff8a5559b93f96c2ad8fef1b
SHA1b8ea5c58600943fda8f0957006e5c02e8af3ef42
SHA256a5c9769f707c8b675bc60692f63318d4e705f57bce1236653cbfb5ae87d7cabc
SHA512a579b5ff6f105e3ca019472bbaeb95acfcd2fcdaf46712bc6fab4f2fb2c1c5ac20fad9b045ca72d0e638eca4137c0ad686bb20b92950ba7d5b4af3dd4451a999
-
Filesize
126KB
MD53cad42aff77fbb4d2d652146e9c77e51
SHA1f95c2c64d2eac0d3ec2ea13f8f11c71abc8e7054
SHA256e29bf00054e8f9f6805d9e2aff7acad5120276ac2b2dee0525031c337e1cf81d
SHA5120b398fa3434237dc8f0f70bac795fa9fede3ea2a0388b24008edd5e71d13813bae0132d31893219840a6349dfe66d88bee48aa1d39e6172f67313035e27093ee
-
Filesize
126KB
MD53cad42aff77fbb4d2d652146e9c77e51
SHA1f95c2c64d2eac0d3ec2ea13f8f11c71abc8e7054
SHA256e29bf00054e8f9f6805d9e2aff7acad5120276ac2b2dee0525031c337e1cf81d
SHA5120b398fa3434237dc8f0f70bac795fa9fede3ea2a0388b24008edd5e71d13813bae0132d31893219840a6349dfe66d88bee48aa1d39e6172f67313035e27093ee