Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 05:15
Behavioral task
behavioral1
Sample
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll
Resource
win10v2004-20241007-en
General
-
Target
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll
-
Size
126KB
-
MD5
674cec24e36e0dfaec6290db96dda86e
-
SHA1
581e3a7a541cc04641e751fc850d92e07236681f
-
SHA256
de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
-
SHA512
6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
SSDEEP
3072:ox7pOYzBektmWDWCMq6As523HeS9FAiZ87vO2rlL3Rne9:ox7ZNht/dMq6AO0a7vVlT
Malware Config
Signatures
-
Amadey family
-
resource yara_rule behavioral2/memory/4496-0-0x00000000008C0000-0x00000000008E4000-memory.dmp amadey_cred_module behavioral2/memory/4496-1-0x00000000008C0000-0x00000000008E4000-memory.dmp amadey_cred_module -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 4496 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4496 rundll32.exe 4496 rundll32.exe 4496 rundll32.exe 4496 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 4496 396 rundll32.exe 82 PID 396 wrote to memory of 4496 396 rundll32.exe 82 PID 396 wrote to memory of 4496 396 rundll32.exe 82 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded.dll,#12⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 8043⤵
- Program crash
PID:2964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4496 -ip 44961⤵PID:1704