Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-12-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
338KB
-
MD5
fe641225d44e5c64bac142415f5e2ca9
-
SHA1
bb52078f856857af809aab239b5462da2e0e9e39
-
SHA256
26884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
-
SHA512
be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
SSDEEP
6144:CWUH4LEwjG5BeT56lcqeMy8v3lbviynvyh8slw7n1HbwZoV9J:2YowjG58ycl+lxnqh80w7
Malware Config
Extracted
amadey
3.63
62.204.41.17/8bdSvcD/index.php
Signatures
-
Detect Amadey credential stealer module 6 IoCs
resource yara_rule behavioral1/files/0x001900000001249b-75.dat amadey_cred_module behavioral1/files/0x001900000001249b-76.dat amadey_cred_module behavioral1/memory/1916-80-0x0000000000170000-0x0000000000194000-memory.dmp amadey_cred_module behavioral1/files/0x001900000001249b-79.dat amadey_cred_module behavioral1/files/0x001900000001249b-78.dat amadey_cred_module behavioral1/files/0x001900000001249b-77.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1916 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 1232 nbveek.exe 1092 nbveek.exe 1016 nbveek.exe -
Loads dropped DLL 6 IoCs
pid Process 936 file.exe 936 file.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 936 wrote to memory of 1232 936 file.exe 28 PID 936 wrote to memory of 1232 936 file.exe 28 PID 936 wrote to memory of 1232 936 file.exe 28 PID 936 wrote to memory of 1232 936 file.exe 28 PID 1232 wrote to memory of 1464 1232 nbveek.exe 29 PID 1232 wrote to memory of 1464 1232 nbveek.exe 29 PID 1232 wrote to memory of 1464 1232 nbveek.exe 29 PID 1232 wrote to memory of 1464 1232 nbveek.exe 29 PID 1520 wrote to memory of 1092 1520 taskeng.exe 34 PID 1520 wrote to memory of 1092 1520 taskeng.exe 34 PID 1520 wrote to memory of 1092 1520 taskeng.exe 34 PID 1520 wrote to memory of 1092 1520 taskeng.exe 34 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1232 wrote to memory of 1916 1232 nbveek.exe 35 PID 1520 wrote to memory of 1016 1520 taskeng.exe 36 PID 1520 wrote to memory of 1016 1520 taskeng.exe 36 PID 1520 wrote to memory of 1016 1520 taskeng.exe 36 PID 1520 wrote to memory of 1016 1520 taskeng.exe 36 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:1464
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1916
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6204DB13-C6AC-4013-9EC2-105874B41BAE} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exeC:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exe2⤵
- Executes dropped EXE
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exeC:\Users\Admin\AppData\Local\Temp\3858e4df6b\nbveek.exe2⤵
- Executes dropped EXE
PID:1016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD5fe641225d44e5c64bac142415f5e2ca9
SHA1bb52078f856857af809aab239b5462da2e0e9e39
SHA25626884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
SHA512be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
Filesize
338KB
MD5fe641225d44e5c64bac142415f5e2ca9
SHA1bb52078f856857af809aab239b5462da2e0e9e39
SHA25626884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
SHA512be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
Filesize
338KB
MD5fe641225d44e5c64bac142415f5e2ca9
SHA1bb52078f856857af809aab239b5462da2e0e9e39
SHA25626884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
SHA512be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
Filesize
338KB
MD5fe641225d44e5c64bac142415f5e2ca9
SHA1bb52078f856857af809aab239b5462da2e0e9e39
SHA25626884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
SHA512be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
Filesize
126KB
MD59cb722f11d688872348be236f8e5d149
SHA1e54f80b631c1931b574baf6953a3948fe3d7d354
SHA25653bb660c1ae533d41b887a771ab2d8a2f73320c4d1441448c4bf75dfbc875321
SHA51252e318939fd63c89ee8f92b3c7e17f08919f6a5ac229418a6f0678daad9a3f285f121ad4aab7ef4bb575d368c989fc02e07a654b919f9bb1ba7fe7a9c5c37774
-
Filesize
338KB
MD5fe641225d44e5c64bac142415f5e2ca9
SHA1bb52078f856857af809aab239b5462da2e0e9e39
SHA25626884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
SHA512be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
Filesize
338KB
MD5fe641225d44e5c64bac142415f5e2ca9
SHA1bb52078f856857af809aab239b5462da2e0e9e39
SHA25626884198ab42034a2515a138d610a912875f1fc361c7a19bf5d861ab8a5841ae
SHA512be0545fec243e9baae0c298e891956b843b3c7fb1a1b62f55bcdae43315c3311066baa3c02aa8b2e73f0423be48ac1cb8d6d36aac5cc3a84bbe942d78c72d276
-
Filesize
126KB
MD59cb722f11d688872348be236f8e5d149
SHA1e54f80b631c1931b574baf6953a3948fe3d7d354
SHA25653bb660c1ae533d41b887a771ab2d8a2f73320c4d1441448c4bf75dfbc875321
SHA51252e318939fd63c89ee8f92b3c7e17f08919f6a5ac229418a6f0678daad9a3f285f121ad4aab7ef4bb575d368c989fc02e07a654b919f9bb1ba7fe7a9c5c37774
-
Filesize
126KB
MD59cb722f11d688872348be236f8e5d149
SHA1e54f80b631c1931b574baf6953a3948fe3d7d354
SHA25653bb660c1ae533d41b887a771ab2d8a2f73320c4d1441448c4bf75dfbc875321
SHA51252e318939fd63c89ee8f92b3c7e17f08919f6a5ac229418a6f0678daad9a3f285f121ad4aab7ef4bb575d368c989fc02e07a654b919f9bb1ba7fe7a9c5c37774
-
Filesize
126KB
MD59cb722f11d688872348be236f8e5d149
SHA1e54f80b631c1931b574baf6953a3948fe3d7d354
SHA25653bb660c1ae533d41b887a771ab2d8a2f73320c4d1441448c4bf75dfbc875321
SHA51252e318939fd63c89ee8f92b3c7e17f08919f6a5ac229418a6f0678daad9a3f285f121ad4aab7ef4bb575d368c989fc02e07a654b919f9bb1ba7fe7a9c5c37774
-
Filesize
126KB
MD59cb722f11d688872348be236f8e5d149
SHA1e54f80b631c1931b574baf6953a3948fe3d7d354
SHA25653bb660c1ae533d41b887a771ab2d8a2f73320c4d1441448c4bf75dfbc875321
SHA51252e318939fd63c89ee8f92b3c7e17f08919f6a5ac229418a6f0678daad9a3f285f121ad4aab7ef4bb575d368c989fc02e07a654b919f9bb1ba7fe7a9c5c37774