Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:15
Behavioral task
behavioral1
Sample
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll
Resource
win10v2004-20241007-en
General
-
Target
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll
-
Size
126KB
-
MD5
674cec24e36e0dfaec6290db96dda86e
-
SHA1
581e3a7a541cc04641e751fc850d92e07236681f
-
SHA256
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
-
SHA512
6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
SSDEEP
3072:ox7pOYzBektmWDWCMq6As523HeS9FAiZ87vO2rlL3Rne9:ox7ZNht/dMq6AO0a7vVlT
Malware Config
Signatures
-
Amadey family
-
resource yara_rule behavioral1/memory/2708-0-0x0000000000200000-0x0000000000224000-memory.dmp amadey_cred_module behavioral1/memory/2708-1-0x0000000000200000-0x0000000000224000-memory.dmp amadey_cred_module -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2792 2708 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2336 wrote to memory of 2708 2336 rundll32.exe 30 PID 2708 wrote to memory of 2792 2708 rundll32.exe 31 PID 2708 wrote to memory of 2792 2708 rundll32.exe 31 PID 2708 wrote to memory of 2792 2708 rundll32.exe 31 PID 2708 wrote to memory of 2792 2708 rundll32.exe 31 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll,#12⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 4523⤵
- Program crash
PID:2792
-
-