Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
q3oUuJIXkc.exe

Overview

General Information

Sample Name:q3oUuJIXkc.exe
Analysis ID:764037
MD5:2239a58cc93fd94dc2806ce7f6af0a0b
SHA1:f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256:682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
Tags:32exetrojan
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Amadeys stealer DLL
Multi AV Scanner detection for submitted file
Yara detected Amadey bot
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Hides threads from debuggers
Tries to steal Mail credentials (via file / registry access)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Overwrites code with function prologues
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to evade analysis by execution special instruction (VM detection)
Tries to detect virtualization through RDTSC time measurements
Creates an undocumented autostart registry key
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to steal Instant Messenger accounts or passwords
PE file contains section with special chars
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Entry point lies outside standard sections
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Uses cacls to modify the permissions of files
Checks if the current process is being debugged
PE / OLE file has an invalid certificate
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • q3oUuJIXkc.exe (PID: 1780 cmdline: C:\Users\user\Desktop\q3oUuJIXkc.exe MD5: 2239A58CC93FD94DC2806CE7F6AF0A0B)
    • gntuud.exe (PID: 5280 cmdline: "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" MD5: 2239A58CC93FD94DC2806CE7F6AF0A0B)
      • schtasks.exe (PID: 1128 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 2188 cmdline: "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 5164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 4216 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Y" MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • cacls.exe (PID: 1844 cmdline: CACLS "gntuud.exe" /P "user:N" MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
        • cacls.exe (PID: 5132 cmdline: CACLS "gntuud.exe" /P "user:R" /E MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
        • cmd.exe (PID: 4768 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Y" MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • cacls.exe (PID: 5412 cmdline: CACLS "..\03bd543fce" /P "user:N" MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
        • cacls.exe (PID: 5344 cmdline: CACLS "..\03bd543fce" /P "user:R" /E MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
      • rundll32.exe (PID: 4828 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • gntuud.exe (PID: 2468 cmdline: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe MD5: 2239A58CC93FD94DC2806CE7F6AF0A0B)
  • cleanup
{"C2 url": "85.209.135.109/jg94cVd30f/index.php", "Version": "3.50"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.315315946.0000000000071000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    0000000C.00000002.379083563.0000000001281000.00000020.00000001.01000000.00000004.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000001.00000003.350752206.0000000000EAD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AmadeyYara detected Amadey botJoe Security
        Process Memory Space: gntuud.exe PID: 5280JoeSecurity_AmadeyYara detected Amadey botJoe Security
          SourceRuleDescriptionAuthorStrings
          12.2.gntuud.exe.1280000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            0.2.q3oUuJIXkc.exe.70000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: q3oUuJIXkc.exeVirustotal: Detection: 15%Perma Link
              Source: q3oUuJIXkc.exeReversingLabs: Detection: 35%
              Source: http://85.209.135.109/jg94cVd30f/index.php?scr=1Avira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeReversingLabs: Detection: 35%
              Source: 12.2.gntuud.exe.1280000.0.unpackMalware Configuration Extractor: Amadey {"C2 url": "85.209.135.109/jg94cVd30f/index.php", "Version": "3.50"}
              Source: q3oUuJIXkc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: q3oUuJIXkc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: q3oUuJIXkc.exe, gntuud.exe.0.dr

              Networking

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 192.168.2.4 80
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 85.209.135.109 80
              Source: Malware configuration extractorURLs: 85.209.135.109/jg94cVd30f/index.php
              Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.php
              Source: gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.php0
              Source: gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.php58e5d3
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.php?scr=1
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpF
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpR
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpb
              Source: gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpd3
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpj
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpv
              Source: gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.209.135.109/jg94cVd30f/index.phpz
              Source: q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
              Source: q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
              Source: q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drString found in binary or memory: http://ocsp.sectigo.com0
              Source: q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drString found in binary or memory: https://sectigo.com/CPS0
              Source: q3oUuJIXkc.exe, 00000000.00000002.324348201.000000000136A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: q3oUuJIXkc.exeStatic PE information: section name: lB@dO\ih
              Source: q3oUuJIXkc.exeStatic PE information: section name: Fh?jG[OJ
              Source: q3oUuJIXkc.exeStatic PE information: section name: qNR5:WbS
              Source: q3oUuJIXkc.exeStatic PE information: section name: z?fd8ijJ
              Source: q3oUuJIXkc.exeStatic PE information: section name: CV?7x>JO
              Source: q3oUuJIXkc.exeStatic PE information: section name: dT<:EHzj
              Source: q3oUuJIXkc.exeStatic PE information: section name: @]topACL
              Source: gntuud.exe.0.drStatic PE information: section name: lB@dO\ih
              Source: gntuud.exe.0.drStatic PE information: section name: Fh?jG[OJ
              Source: gntuud.exe.0.drStatic PE information: section name: qNR5:WbS
              Source: gntuud.exe.0.drStatic PE information: section name: z?fd8ijJ
              Source: gntuud.exe.0.drStatic PE information: section name: CV?7x>JO
              Source: gntuud.exe.0.drStatic PE information: section name: dT<:EHzj
              Source: gntuud.exe.0.drStatic PE information: section name: @]topACL
              Source: cred64[1].dll.1.drStatic PE information: section name: f5g\gWe7
              Source: cred64[1].dll.1.drStatic PE information: section name: zDthL)*@
              Source: cred64[1].dll.1.drStatic PE information: section name: nb"h!m#Y
              Source: cred64[1].dll.1.drStatic PE information: section name: $^+<%+dU
              Source: cred64[1].dll.1.drStatic PE information: section name: Z-),j99t
              Source: cred64[1].dll.1.drStatic PE information: section name: 8"ikKHD[
              Source: cred64[1].dll.1.drStatic PE information: section name: k&l<0?<6
              Source: cred64[1].dll.1.drStatic PE information: section name: n[uZh3ex
              Source: cred64[1].dll.1.drStatic PE information: section name: Uh%r6i!H
              Source: cred64.dll.1.drStatic PE information: section name: f5g\gWe7
              Source: cred64.dll.1.drStatic PE information: section name: zDthL)*@
              Source: cred64.dll.1.drStatic PE information: section name: nb"h!m#Y
              Source: cred64.dll.1.drStatic PE information: section name: $^+<%+dU
              Source: cred64.dll.1.drStatic PE information: section name: Z-),j99t
              Source: cred64.dll.1.drStatic PE information: section name: 8"ikKHD[
              Source: cred64.dll.1.drStatic PE information: section name: k&l<0?<6
              Source: cred64.dll.1.drStatic PE information: section name: n[uZh3ex
              Source: cred64.dll.1.drStatic PE information: section name: Uh%r6i!H
              Source: q3oUuJIXkc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess Stats: CPU usage > 98%
              Source: q3oUuJIXkc.exe, 00000000.00000003.307486785.00000000012DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDuetDisp.exe: vs q3oUuJIXkc.exe
              Source: q3oUuJIXkc.exe, 00000000.00000002.324049922.0000000000B85000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDuetDisp.exe: vs q3oUuJIXkc.exe
              Source: q3oUuJIXkc.exe, 00000000.00000000.297381574.0000000000B85000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDuetDisp.exe: vs q3oUuJIXkc.exe
              Source: q3oUuJIXkc.exeBinary or memory string: OriginalFilenameDuetDisp.exe: vs q3oUuJIXkc.exe
              Source: q3oUuJIXkc.exeStatic PE information: invalid certificate
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll 8C46C2AF1CB25BFA8FBBF9D683D72D30DDB2E5D0ECC6BBA997B24714CF2B8C91
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe 682ABD62B6E3C0E8CA57F079CD96F2D3848752EAF7002BDF57BFB512BD242811
              Source: q3oUuJIXkc.exeVirustotal: Detection: 15%
              Source: q3oUuJIXkc.exeReversingLabs: Detection: 35%
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeFile read: C:\Users\user\Desktop\q3oUuJIXkc.exeJump to behavior
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\q3oUuJIXkc.exe C:\Users\user\Desktop\q3oUuJIXkc.exe
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess created: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:R" /E
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\03bd543fce" /P "user:N"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\03bd543fce" /P "user:R" /E
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess created: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:R" /E
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\03bd543fce" /P "user:N"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\03bd543fce" /P "user:R" /E
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeFile created: C:\Users\user\AppData\Roaming\c33e9ad058e5d3Jump to behavior
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeFile created: C:\Users\user\AppData\Local\Temp\03bd543fceJump to behavior
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@24/9@0/2
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5164:120:WilError_01
              Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\118b2709b7d16171ccdcf59ab82ccd18
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1592:120:WilError_01
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMutant created: \Sessions\1\BaseNamedObjects\c33e9ad058e5d380869687d885c0668c
              Source: q3oUuJIXkc.exeStatic file information: File size 7732440 > 1048576
              Source: q3oUuJIXkc.exeStatic PE information: Raw size of EVjKc_MI is bigger than: 0x100000 < 0x6f7800
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: q3oUuJIXkc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: q3oUuJIXkc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: q3oUuJIXkc.exe, gntuud.exe.0.dr
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_3_04F5861C pushad ; ret
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_3_04F5460E push eax; ret
              Source: q3oUuJIXkc.exeStatic PE information: section name: lB@dO\ih
              Source: q3oUuJIXkc.exeStatic PE information: section name: Fh?jG[OJ
              Source: q3oUuJIXkc.exeStatic PE information: section name: qNR5:WbS
              Source: q3oUuJIXkc.exeStatic PE information: section name: z?fd8ijJ
              Source: q3oUuJIXkc.exeStatic PE information: section name: CV?7x>JO
              Source: q3oUuJIXkc.exeStatic PE information: section name: EVjKc_MI
              Source: q3oUuJIXkc.exeStatic PE information: section name: dT<:EHzj
              Source: q3oUuJIXkc.exeStatic PE information: section name: @]topACL
              Source: gntuud.exe.0.drStatic PE information: section name: lB@dO\ih
              Source: gntuud.exe.0.drStatic PE information: section name: Fh?jG[OJ
              Source: gntuud.exe.0.drStatic PE information: section name: qNR5:WbS
              Source: gntuud.exe.0.drStatic PE information: section name: z?fd8ijJ
              Source: gntuud.exe.0.drStatic PE information: section name: CV?7x>JO
              Source: gntuud.exe.0.drStatic PE information: section name: EVjKc_MI
              Source: gntuud.exe.0.drStatic PE information: section name: dT<:EHzj
              Source: gntuud.exe.0.drStatic PE information: section name: @]topACL
              Source: cred64[1].dll.1.drStatic PE information: section name: f5g\gWe7
              Source: cred64[1].dll.1.drStatic PE information: section name: zDthL)*@
              Source: cred64[1].dll.1.drStatic PE information: section name: nb"h!m#Y
              Source: cred64[1].dll.1.drStatic PE information: section name: $^+<%+dU
              Source: cred64[1].dll.1.drStatic PE information: section name: Z-),j99t
              Source: cred64[1].dll.1.drStatic PE information: section name: 8"ikKHD[
              Source: cred64[1].dll.1.drStatic PE information: section name: k&l<0?<6
              Source: cred64[1].dll.1.drStatic PE information: section name: n[uZh3ex
              Source: cred64[1].dll.1.drStatic PE information: section name: Uh%r6i!H
              Source: cred64.dll.1.drStatic PE information: section name: f5g\gWe7
              Source: cred64.dll.1.drStatic PE information: section name: zDthL)*@
              Source: cred64.dll.1.drStatic PE information: section name: nb"h!m#Y
              Source: cred64.dll.1.drStatic PE information: section name: $^+<%+dU
              Source: cred64.dll.1.drStatic PE information: section name: Z-),j99t
              Source: cred64.dll.1.drStatic PE information: section name: 8"ikKHD[
              Source: cred64.dll.1.drStatic PE information: section name: k&l<0?<6
              Source: cred64.dll.1.drStatic PE information: section name: n[uZh3ex
              Source: cred64.dll.1.drStatic PE information: section name: Uh%r6i!H
              Source: initial sampleStatic PE information: section where entry point is pointing to: EVjKc_MI

              Persistence and Installation Behavior

              barindex
              Source: Yara matchFile source: 00000001.00000003.350752206.0000000000EAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 5280, type: MEMORYSTR
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeFile created: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeFile created: C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dllJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeMemory written: PID: 1780 base: 1150005 value: E9 FB 99 C1 76
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeMemory written: PID: 1780 base: 77D69A00 value: E9 0A 66 3E 89
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeMemory written: PID: 1780 base: 1170007 value: E9 7B 4C C3 76
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeMemory written: PID: 1780 base: 77DA4C80 value: E9 8E B3 3C 89
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 5280 base: CB0005 value: E9 FB 99 0B 77
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 5280 base: 77D69A00 value: E9 0A 66 F4 88
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 5280 base: CC0007 value: E9 7B 4C 0E 77
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 5280 base: 77DA4C80 value: E9 8E B3 F1 88
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 2468 base: 1230005 value: E9 FB 99 B3 76
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 2468 base: 77D69A00 value: E9 0A 66 4C 89
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 2468 base: 1240007 value: E9 7B 4C B6 76
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeMemory written: PID: 2468 base: 77DA4C80 value: E9 8E B3 49 89
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 9A0005 value: E9 FB 99 3C 77
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 77D69A00 value: E9 0A 66 C3 88
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 9B0007 value: E9 7B 4C 3F 77
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 77DA4C80 value: E9 8E B3 C0 88
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 9C0005 value: E9 FB BF 37 77
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 77D3C000 value: E9 0A 40 C8 88
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 9E0008 value: E9 AB E0 39 77
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 77D7E0B0 value: E9 60 1F C6 88
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: D00005 value: E9 CB 5A 8D 76
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 775D5AD0 value: E9 3A A5 72 89
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: D10005 value: E9 5B B0 8E 76
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 775FB060 value: E9 AA 4F 71 89
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: D20005 value: E9 DB F8 E0 73
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 74B2F8E0 value: E9 2A 07 1F 8C
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 4EB0005 value: E9 FB 42 CA 6F
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 74B54300 value: E9 0A BD 35 90
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 77D3C000 value: 8B FF 55 8B EC
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 775D5AD0 value: 8B FF 55 8B EC
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 775FB060 value: 8B FF 55 8B EC
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 74B2F8E0 value: 8B FF 55 8B EC
              Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4828 base: 74B54300 value: 8B FF 55 8B EC
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeSpecial instruction interceptor: First address: 00000000006B25FE instructions rdtsc caused by: RDTSC with Trap Flag (TF)
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeSpecial instruction interceptor: First address: 00000000018C25FE instructions rdtsc caused by: RDTSC with Trap Flag (TF)
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeRDTSC instruction interceptor: First address: 00000000006B25FE second address: 00000000006D33CF instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 call 00007F02DCAB0BC1h 0x00000008 call 00007F02DCA4F441h 0x0000000d mov dword ptr [esp+04h], 7A546ADEh 0x00000015 lea esp, dword ptr [esp+04h] 0x00000019 call 00007F02DCC022DAh 0x0000001e push edx 0x0000001f push eax 0x00000020 cmovnl eax, ebp 0x00000023 push ebp 0x00000024 rdtsc
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeRDTSC instruction interceptor: First address: 00000000018C25FE second address: 00000000018E33CF instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 call 00007F02DCDA5551h 0x00000008 call 00007F02DCD43DD1h 0x0000000d mov dword ptr [esp+04h], 7A546ADEh 0x00000015 lea esp, dword ptr [esp+04h] 0x00000019 call 00007F02DCEF6C6Ah 0x0000001e push edx 0x0000001f push eax 0x00000020 cmovnl eax, ebp 0x00000023 push ebp 0x00000024 rdtsc
              Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 0000000004CED526 second address: 0000000004CED559 instructions: 0x00000000 rdtsc 0x00000002 movsx dx, bh 0x00000006 dec cl 0x00000008 or edx, ecx 0x0000000a bts edx, ecx 0x0000000d xchg dh, dh 0x0000000f not cl 0x00000011 cbw 0x00000013 neg cl 0x00000015 bsf eax, eax 0x00000018 mov eax, 78B605B0h 0x0000001d or ah, FFFFFF9Eh 0x00000020 add cl, FFFFFF94h 0x00000023 xor bl, cl 0x00000025 or dh, dl 0x00000027 push ebp 0x00000028 inc ebp 0x00000029 cdq 0x0000002a cwd 0x0000002c push esi 0x0000002d push ebx 0x0000002e xor bp, di 0x00000031 cwd 0x00000033 rdtsc
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe TID: 5372Thread sleep time: -870000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe TID: 3176Thread sleep time: -50000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe TID: 3312Thread sleep time: -180000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe TID: 4992Thread sleep time: -1440000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe TID: 3312Thread sleep time: -180000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe TID: 5372Thread sleep time: -30000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 180000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 360000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 180000
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 30000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 50000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 180000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 360000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 180000
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread delayed: delay time: 30000
              Source: C:\Windows\SysWOW64\rundll32.exeSystem information queried: ModuleInformation
              Source: gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeThread information set: HideFromDebugger
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeThread information set: HideFromDebugger
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread information set: HideFromDebugger
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread information set: HideFromDebugger
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread information set: HideFromDebugger
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeThread information set: HideFromDebugger
              Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
              Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess queried: DebugPort
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugObjectHandle
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess queried: DebugPort
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 192.168.2.4 80
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 85.209.135.109 80
              Source: C:\Users\user\Desktop\q3oUuJIXkc.exeProcess created: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:R" /E
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\03bd543fce" /P "user:N"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\03bd543fce" /P "user:R" /E
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 12.2.gntuud.exe.1280000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.q3oUuJIXkc.exe.70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.315315946.0000000000071000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.379083563.0000000001281000.00000020.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000003.350752206.0000000000EAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 5280, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Sessions
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xml
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\.purple\accounts.xml
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              111
              Process Injection
              1
              Masquerading
              1
              OS Credential Dumping
              411
              Security Software Discovery
              Remote Services1
              Email Collection
              Exfiltration Over Other Network Medium1
              Application Layer Protocol
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/Job1
              Registry Run Keys / Startup Folder
              1
              Scheduled Task/Job
              131
              Virtualization/Sandbox Evasion
              1
              Credential API Hooking
              1
              Process Discovery
              Remote Desktop Protocol1
              Credential API Hooking
              Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)1
              Services File Permissions Weakness
              1
              Registry Run Keys / Startup Folder
              111
              Process Injection
              1
              Input Capture
              131
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares1
              Input Capture
              Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)1
              Services File Permissions Weakness
              1
              Obfuscated Files or Information
              2
              Credentials in Registry
              1
              File and Directory Discovery
              Distributed Component Object Model1
              Data from Local System
              Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Services File Permissions Weakness
              1
              Credentials In Files
              212
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              Rundll32
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 764037 Sample: q3oUuJIXkc.exe Startdate: 09/12/2022 Architecture: WINDOWS Score: 100 57 Antivirus detection for URL or domain 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 Yara detected Amadeys stealer DLL 2->61 63 3 other signatures 2->63 8 q3oUuJIXkc.exe 4 2->8         started        12 gntuud.exe 2->12         started        process3 file4 37 C:\Users\user\AppData\Local\...\gntuud.exe, PE32 8->37 dropped 39 C:\Users\user\...\gntuud.exe:Zone.Identifier, ASCII 8->39 dropped 73 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->73 75 Tries to evade analysis by execution special instruction (VM detection) 8->75 77 Tries to detect virtualization through RDTSC time measurements 8->77 14 gntuud.exe 17 8->14         started        79 Hides threads from debuggers 12->79 signatures5 process6 dnsIp7 47 85.209.135.109 CMCSUS Germany 14->47 41 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32 14->41 dropped 43 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32 14->43 dropped 49 Multi AV Scanner detection for dropped file 14->49 51 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->51 53 Creates an undocumented autostart registry key 14->53 55 4 other signatures 14->55 19 rundll32.exe 14->19         started        23 cmd.exe 1 14->23         started        25 schtasks.exe 1 14->25         started        file8 signatures9 process10 dnsIp11 45 192.168.2.4 unknown unknown 19->45 65 System process connects to network (likely due to code injection or exploit) 19->65 67 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 19->67 69 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->69 71 6 other signatures 19->71 27 conhost.exe 23->27         started        29 cmd.exe 1 23->29         started        31 cacls.exe 1 23->31         started        35 4 other processes 23->35 33 conhost.exe 25->33         started        signatures12 process13

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              q3oUuJIXkc.exe15%VirustotalBrowse
              q3oUuJIXkc.exe35%ReversingLabsWin32.Trojan.Amadey
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll12%ReversingLabs
              C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe35%ReversingLabsWin32.Trojan.Amadey
              C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll12%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
              http://85.209.135.109/jg94cVd30f/index.phpj0%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.phpF0%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.php0%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.php?scr=1100%Avira URL Cloudmalware
              http://85.209.135.109/jg94cVd30f/index.phpb0%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.phpd30%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.php58e5d30%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.phpz0%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.phpv0%Avira URL Cloudsafe
              85.209.135.109/jg94cVd30f/index.php0%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.php00%Avira URL Cloudsafe
              http://85.209.135.109/jg94cVd30f/index.phpR0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              85.209.135.109/jg94cVd30f/index.phptrue
              • Avira URL Cloud: safe
              low
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tq3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drfalse
              • URL Reputation: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpjgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://sectigo.com/CPS0q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.sectigo.com0q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpFgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.php?scr=1gntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#q3oUuJIXkc.exe, gntuud.exe.0.dr, cred64[1].dll.1.dr, cred64.dll.1.drfalse
              • URL Reputation: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpbgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.php58e5d3gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpd3gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpzgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpvgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.phpRgntuud.exe, 00000001.00000003.350729543.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.209.135.109/jg94cVd30f/index.php0gntuud.exe, 00000001.00000003.350805710.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              85.209.135.109
              unknownGermany
              33657CMCSUStrue
              IP
              192.168.2.4
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:764037
              Start date and time:2022-12-09 10:52:09 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 9m 7s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:q3oUuJIXkc.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:19
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.phis.troj.spyw.evad.winEXE@24/9@0/2
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for rundll32
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
              • Execution Graph export aborted for target rundll32.exe, PID 4828 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              TimeTypeDescription
              10:53:18API Interceptor2546x Sleep call for process: gntuud.exe modified
              10:53:19Task SchedulerRun new task: gntuud.exe path: C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):7705824
              Entropy (8bit):7.9708080300718365
              Encrypted:false
              SSDEEP:196608:ZQoqS56OZEssxxpKIIue41Cf7sgZz6kmAZQ/9RWB0:dMOevKiB1CfQgplmz/9a0
              MD5:2B62E02B3581980EE5A1DDA42FA4F3FE
              SHA1:5C36BFA4A4973E8F694D5C077E7312B1C991AEDF
              SHA-256:8C46C2AF1CB25BFA8FBBF9D683D72D30DDB2E5D0ECC6BBA997B24714CF2B8C91
              SHA-512:255E1B1D51D52872C5E0C54F7807ADC3581D36B3DFB8220C818AC38AC7FCEA91DD42999EE6CCAEF3B9836CD59FCFE19C2669A5B697D627DE4C1D9B8BA563EB3D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 12%
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L....^B*.....................X....................@.................................*.u.............................,..O...X>..@....................~u...............................................................F.............................f5g\gWe7............................ ..`zDthL)*@............................@...nb"h!m#Y................................$^+<%+dU&...........................@...Z-),j99tO...........................@..P8"ikKHD[b.C......................... ..`k&l<0?<6......F.....................@...n[uZh3ex.lu...F..nu................. ..`Uh%r6i!H.............xu.............@..P.............................................................@......................@..P................................................................................................................................................................................
              Process:C:\Users\user\Desktop\q3oUuJIXkc.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):7732440
              Entropy (8bit):7.8779499305543865
              Encrypted:false
              SSDEEP:196608:U+rNR2F7EU+iE09OKsRk3PdM+i+8lHFL9AYS:/RWEU+1OP6+X+oYS
              MD5:2239A58CC93FD94DC2806CE7F6AF0A0B
              SHA1:F09EB7D69BC7440D3D45E14267236A78AC789FCB
              SHA-256:682ABD62B6E3C0E8CA57F079CD96F2D3848752EAF7002BDF57BFB512BD242811
              SHA-512:F77C16626A0E17FF79B95F9FDED6A365F913896C89BAF76D16BCC8706F3AD10A9476C7CBD3F235250B936171C6E958E145C402952506DC0E434A4F911C99FE02
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 35%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........XH..6...6...6...5...6...3.a.6...2...6.(.2...6.(.5...6.(.3...6...7...6...7.\.6.f.?...6.f.....6.f.4...6.Rich..6.........PE..L....6.c.....................r.......FU...........@................................~.v...@...................................p......`..`c............u......P......0E..p........................... A..@.............A.h...........................lB@dO\ih............................ ..`Fh?jG[OJL...........................@..@qNR5:WbSLD..........................@...z?fd8ijJh.=......................... ..`CV?7x>JO......A.....................@...EVjKc_MI.wo...A..xo................. ..`dT<:EHzj.....P........o.............@..@@]topACL`c...`...\....o.............@..@........................................................................................................................................................................................
              Process:C:\Users\user\Desktop\q3oUuJIXkc.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
              Category:dropped
              Size (bytes):106755
              Entropy (8bit):7.930938749687084
              Encrypted:false
              SSDEEP:1536:C+HaFexHpq4LV97q5wQq23vv5C4bndDT4vSxJu0VdNjEfYcnF4MXRWNt9bsdjogU:xt/q4xlnQqF0VrX5XrMXWAksu6rGu01
              MD5:BC1FA342F0AE360EA815BF64C71D503E
              SHA1:929ACB54CBF1E6B6C495A8768F694804FA0ECED1
              SHA-256:5722B2526976E9C37277C435D09080C9CEBA052922B306A694D4EA0CCB1ABDFA
              SHA-512:1F1065173E96BCEF16F0E40FE90A8B35372C15CB59453CB3DBF130A9E20B7DEF1CAAF741146643D6ADF8F662566D9120284F1D2BB19420B8DFA32A67A4898471
              Malicious:false
              Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\....xcS.m..#Hm.....T......<!...wq5...v1.?S.....rHj-.U:...5............|..+.......}...<.>...H.......Wo.CK`/l.1./...C...W.....,1....R.0.W......qco;.\..%r........H.'.|..)..m..e#..N.}5y._.pY\L.w[....r....%.......5...L..S....CN5b..6..>.... ZJ(.........|.....hW.:..M...9.>R..z.IE].)...AK_Q...G.....SR...O......SV~.%.)...^....6...R.i$K.Y?..!o5v+c'...
              Process:C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):7705824
              Entropy (8bit):7.9708080300718365
              Encrypted:false
              SSDEEP:196608:ZQoqS56OZEssxxpKIIue41Cf7sgZz6kmAZQ/9RWB0:dMOevKiB1CfQgplmz/9a0
              MD5:2B62E02B3581980EE5A1DDA42FA4F3FE
              SHA1:5C36BFA4A4973E8F694D5C077E7312B1C991AEDF
              SHA-256:8C46C2AF1CB25BFA8FBBF9D683D72D30DDB2E5D0ECC6BBA997B24714CF2B8C91
              SHA-512:255E1B1D51D52872C5E0C54F7807ADC3581D36B3DFB8220C818AC38AC7FCEA91DD42999EE6CCAEF3B9836CD59FCFE19C2669A5B697D627DE4C1D9B8BA563EB3D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 12%
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L....^B*.....................X....................@.................................*.u.............................,..O...X>..@....................~u...............................................................F.............................f5g\gWe7............................ ..`zDthL)*@............................@...nb"h!m#Y................................$^+<%+dU&...........................@...Z-),j99tO...........................@..P8"ikKHD[b.C......................... ..`k&l<0?<6......F.....................@...n[uZh3ex.lu...F..nu................. ..`Uh%r6i!H.............xu.............@..P.............................................................@......................@..P................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\cacls.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):15
              Entropy (8bit):3.240223928941852
              Encrypted:false
              SSDEEP:3:o3F:o1
              MD5:509B054634B6DE74F111C3E646BC80FD
              SHA1:99B4C0F39144A92FE42E22473A2A2552FB16BD13
              SHA-256:07C7C151ADD6D955F3C876359C0E2A3A3FB0C519DD1E574413F0B68B345D8C36
              SHA-512:A9C2D23947DBE09D5ECFBF6B3109F3CF8409E43176AE10C18083446EDE006E60E41C3EA2D2765036A967FC81B085D5F271686606AED4154AE45287D412CF6D40
              Malicious:false
              Preview:processed dir:
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.8779499305543865
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:q3oUuJIXkc.exe
              File size:7732440
              MD5:2239a58cc93fd94dc2806ce7f6af0a0b
              SHA1:f09eb7d69bc7440d3d45e14267236a78ac789fcb
              SHA256:682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
              SHA512:f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
              SSDEEP:196608:U+rNR2F7EU+iE09OKsRk3PdM+i+8lHFL9AYS:/RWEU+1OP6+X+oYS
              TLSH:C57623B3A3B41145C1D0CD3D9537AFA473F18FA7CB422A36658DB9C618721F4E622A87
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........XH..6...6...6...5...6...3.a.6...2...6.(.2...6.(.5...6.(.3...6...7...6...7.\.6.f.?...6.f.....6.f.4...6.Rich..6.........PE..L..
              Icon Hash:78c09ace96cee071
              Entrypoint:0x9546db
              Entrypoint Section:EVjKc_MI
              Digitally signed:true
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x639036D5 [Wed Dec 7 06:46:45 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:a09599f99e4c72911ae32fe016ed9145
              Signature Valid:false
              Signature Issuer:CN=luminous company
              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
              Error Number:-2146762487
              Not Before, Not After
              • 12/8/2022 1:47:11 AM 12/8/2023 2:07:11 AM
              Subject Chain
              • CN=luminous company
              Version:3
              Thumbprint MD5:48B0126BEA96E72E0ACAF9BF22EFD655
              Thumbprint SHA-1:9CC7CA44B6A43D98C0CFE0845AB97B6AB08694BA
              Thumbprint SHA-256:5E29C591440A557F3A7B7CAB7BA338B2C19D4BC16CFC917BFAAAC0804627E3EE
              Serial:4E9D6FD78307E6AD4C5583A2D9753AE2
              Instruction
              push edx
              mov edx, 006C25E2h
              push ecx
              call 00007F02DD1E4FEEh
              stc
              rol al, 1
              neg al
              cmovnl edx, ebx
              mov edx, ebp
              not al
              rol al, 1
              xor bl, al
              mov word ptr [esp+eax], cx
              stc
              lea edi, dword ptr [edi-00000004h]
              sal dx, cl
              mov edx, dword ptr [edi]
              cmp ah, 00000053h
              xor edx, ebx
              stc
              cmc
              clc
              not edx
              cmc
              clc
              rol edx, 1
              test bp, 1AA8h
              cmp esi, eax
              test ebx, ebp
              neg edx
              jmp 00007F02DCFA5223h
              inc ecx
              rol ecx, 1
              cmp ebx, esp
              test dh, dh
              add ecx, 32723618h
              clc
              cmc
              test esp, 3E02325Eh
              xor ebx, ecx
              cmp ecx, ecx
              jmp 00007F02DD0474D4h
              dec ebp
              mov ebx, dword ptr [edx]
              dec eax
              movzx ecx, bp
              inc ecx
              mov edi, dword ptr [edx+08h]
              dec eax
              cmp ebx, esi
              inc cx
              sub ecx, ebp
              clc
              dec ecx
              add edx, 0000000Ch
              inc ecx
              mov dword ptr [ebx], edi
              jmp 00007F02DD1C6408h
              inc cx
              movzx edi, byte ptr [edx]
              inc ebp
              mov cl, byte ptr [edx+02h]
              cmp ch, 00000015h
              jmp 00007F02DD1BF94Eh
              jne 00007F02DD0914E6h
              pop ebx
              not edx
              btc eax, 51h
              dec al
              mov dword ptr [esi], edx
              lea ebp, dword ptr [ebp-00000004h]
              mov eax, dword ptr [ebp+00h]
              stc
              cmc
              xor eax, ebx
              neg eax
              dec eax
              jmp 00007F02DD1F6924h
              xor al, bl
              clc
              jmp 00007F02DD0583F4h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x70adbc0xdcEVjKc_MI
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb160000x66360@]topACL
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x75e6000x16d8EVjKc_MI
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb150000x610dT<:EHzj
              IMAGE_DIRECTORY_ENTRY_DEBUG0xb145300x70EVjKc_MI
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb141200x40EVjKc_MI
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x41c0000x68CV?7x>JO
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              lB@dO\ih0x10000x2df160x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Fh?jG[OJ0x2f0000x9c4c0x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              qNR5:WbS0x390000x444c0x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              z?fd8ijJ0x3e0000x3ddf680x0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              CV?7x>JO0x41c0000x5cc0x600False0.057291666666666664data0.36065717947425463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              EVjKc_MI0x41d0000x6f77a00x6f7800unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              dT<:EHzj0xb150000x6100x800False0.40869140625data3.500908726389375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              @]topACL0xb160000x663600x65c00False0.2412133369164619data3.398442344823821IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0xb165c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
              RT_ICON0xb16a300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
              RT_ICON0xb173b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
              RT_ICON0xb184600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
              RT_ICON0xb1aa080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
              RT_ICON0xb1ec300x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
              RT_ICON0xb240b80x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 25600EnglishUnited States
              RT_ICON0xb2a8a00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
              RT_ICON0xb33d480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
              RT_ICON0xb445700x47e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
              RT_ICON0xb48d580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
              RT_ICON0xb491c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
              RT_ICON0xb49b480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
              RT_ICON0xb4abf00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
              RT_ICON0xb4d1980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
              RT_ICON0xb513c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
              RT_ICON0xb568480x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 25600EnglishUnited States
              RT_ICON0xb5d0300x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
              RT_ICON0xb664d80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
              RT_ICON0xb76d000x47e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
              RT_DIALOG0xb7ba5c0x7edataEnglishUnited States
              RT_DIALOG0xb7badc0xa8dataEnglishUnited States
              RT_DIALOG0xb7bb840x114dataEnglishUnited States
              RT_DIALOG0xb7bc980x6c8emptyEnglishUnited States
              RT_GROUP_ICON0xb7b4e80x92dataEnglishUnited States
              RT_GROUP_ICON0xb7b57c0x92dataEnglishUnited States
              RT_VERSION0xb7b6100x2ccdataEnglishUnited States
              RT_MANIFEST0xb7b8dc0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
              DLLImport
              KERNEL32.dllGetVersionExW
              USER32.dllGetSystemMetrics
              GDI32.dllCreateCompatibleBitmap
              ADVAPI32.dllRegCloseKey
              SHELL32.dllShellExecuteA
              WININET.dllHttpOpenRequestA
              gdiplus.dllGdipSaveImageToFile
              KERNEL32.dllGetSystemTimeAsFileTime
              USER32.dllCharUpperBuffW
              KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Target ID:0
              Start time:10:52:59
              Start date:09/12/2022
              Path:C:\Users\user\Desktop\q3oUuJIXkc.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\q3oUuJIXkc.exe
              Imagebase:0x70000
              File size:7732440 bytes
              MD5 hash:2239A58CC93FD94DC2806CE7F6AF0A0B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.315315946.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low

              Target ID:1
              Start time:10:53:07
              Start date:09/12/2022
              Path:C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
              Imagebase:0x1280000
              File size:7732440 bytes
              MD5 hash:2239A58CC93FD94DC2806CE7F6AF0A0B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Amadey, Description: Yara detected Amadey bot, Source: 00000001.00000003.350752206.0000000000EAD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 35%, ReversingLabs
              Reputation:low

              Target ID:2
              Start time:10:53:17
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
              Imagebase:0x1340000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:3
              Start time:10:53:17
              Start date:09/12/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7c72c0000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:4
              Start time:10:53:17
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
              Imagebase:0xd90000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:10:53:17
              Start date:09/12/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7c72c0000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:10:53:17
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Imagebase:0xd90000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:10:53:17
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cacls.exe
              Wow64 process (32bit):true
              Commandline:CACLS "gntuud.exe" /P "user:N"
              Imagebase:0x1270000
              File size:27648 bytes
              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:8
              Start time:10:53:18
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cacls.exe
              Wow64 process (32bit):true
              Commandline:CACLS "gntuud.exe" /P "user:R" /E
              Imagebase:0x1270000
              File size:27648 bytes
              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:9
              Start time:10:53:18
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              Imagebase:0xd90000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:10
              Start time:10:53:18
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cacls.exe
              Wow64 process (32bit):true
              Commandline:CACLS "..\03bd543fce" /P "user:N"
              Imagebase:0x1270000
              File size:27648 bytes
              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:11
              Start time:10:53:18
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\cacls.exe
              Wow64 process (32bit):true
              Commandline:CACLS "..\03bd543fce" /P "user:R" /E
              Imagebase:0x1270000
              File size:27648 bytes
              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:12
              Start time:10:53:19
              Start date:09/12/2022
              Path:C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
              Imagebase:0x1280000
              File size:7732440 bytes
              MD5 hash:2239A58CC93FD94DC2806CE7F6AF0A0B
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000C.00000002.379083563.0000000001281000.00000020.00000001.01000000.00000004.sdmp, Author: Joe Security

              Target ID:13
              Start time:10:53:22
              Start date:09/12/2022
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
              Imagebase:0xd30000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi

              No disassembly