Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2022, 19:41

General

  • Target

    d9cbb8b59cb294437a95d632bd67bd95.exe

  • Size

    268KB

  • MD5

    d9cbb8b59cb294437a95d632bd67bd95

  • SHA1

    4660e342a02c6084ca69d84ac74ca7353befbca7

  • SHA256

    dcdd0cd8d4a274600c01db970c804976b8d56911111250786be99d8aa7dd094c

  • SHA512

    17f7b229083e623c70708aececde8f9e846364dad6c072668e8138978344d030379eaad271043dffbbb92ef1c7c00254a0db9d6afe42c508333d1730d893b7e3

  • SSDEEP

    3072:bXN1fhc0WNE7PalYhMm5WlbkvEfjsUK9St9k8AvNpPIcc2V788VggjcGkNIVqIx/:zTZtalYCp6EfQUWoKv/s2uI7ITsqe4

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 3 IoCs
  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9cbb8b59cb294437a95d632bd67bd95.exe
    "C:\Users\Admin\AppData\Local\Temp\d9cbb8b59cb294437a95d632bd67bd95.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:860
  • C:\Users\Admin\AppData\Local\Temp\F9F5.exe
    C:\Users\Admin\AppData\Local\Temp\F9F5.exe
    1⤵
    • Executes dropped EXE
    PID:4880
  • C:\Users\Admin\AppData\Local\Temp\FDDE.exe
    C:\Users\Admin\AppData\Local\Temp\FDDE.exe
    1⤵
    • Executes dropped EXE
    PID:4700
  • C:\Users\Admin\AppData\Local\Temp\1138.exe
    C:\Users\Admin\AppData\Local\Temp\1138.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
      "C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN wfyoot.exe /TR "C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3920
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\70b90d83e65db7\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        PID:4944
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\70b90d83e65db7\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • outlook_win_path
        PID:2412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 1124
      2⤵
      • Program crash
      PID:4872
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:4296
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:3288
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:4188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4452 -ip 4452
          1⤵
            PID:2828
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:1560
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:1932
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:412
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3740
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:2604
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3160
                      • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
                        C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
                        1⤵
                        • Executes dropped EXE
                        PID:4804
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 312
                          2⤵
                          • Program crash
                          PID:1092
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4804 -ip 4804
                        1⤵
                          PID:4384
                        • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
                          C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
                          1⤵
                          • Executes dropped EXE
                          PID:4856
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 316
                            2⤵
                            • Program crash
                            PID:1916
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4856 -ip 4856
                          1⤵
                            PID:1604

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                            Filesize

                            314KB

                            MD5

                            bff67ce5d7f8ebb150a23e848027d470

                            SHA1

                            c5e3a083979418315e2ac09cf1041da33a55f7d5

                            SHA256

                            23443648c2468ae2297b052c2cef4c652cfac9dc275b825a4407d8ba97963904

                            SHA512

                            300b220a36a36aab485a9d6ac3e5bcb6dfbd76b17e360cc80a65392fb4e7881cb0cf0e36567d14a9102040003f63cd1af37d39454affc7acc83cc474c574e575

                          • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                            Filesize

                            314KB

                            MD5

                            bff67ce5d7f8ebb150a23e848027d470

                            SHA1

                            c5e3a083979418315e2ac09cf1041da33a55f7d5

                            SHA256

                            23443648c2468ae2297b052c2cef4c652cfac9dc275b825a4407d8ba97963904

                            SHA512

                            300b220a36a36aab485a9d6ac3e5bcb6dfbd76b17e360cc80a65392fb4e7881cb0cf0e36567d14a9102040003f63cd1af37d39454affc7acc83cc474c574e575

                          • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                            Filesize

                            314KB

                            MD5

                            bff67ce5d7f8ebb150a23e848027d470

                            SHA1

                            c5e3a083979418315e2ac09cf1041da33a55f7d5

                            SHA256

                            23443648c2468ae2297b052c2cef4c652cfac9dc275b825a4407d8ba97963904

                            SHA512

                            300b220a36a36aab485a9d6ac3e5bcb6dfbd76b17e360cc80a65392fb4e7881cb0cf0e36567d14a9102040003f63cd1af37d39454affc7acc83cc474c574e575

                          • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                            Filesize

                            314KB

                            MD5

                            bff67ce5d7f8ebb150a23e848027d470

                            SHA1

                            c5e3a083979418315e2ac09cf1041da33a55f7d5

                            SHA256

                            23443648c2468ae2297b052c2cef4c652cfac9dc275b825a4407d8ba97963904

                            SHA512

                            300b220a36a36aab485a9d6ac3e5bcb6dfbd76b17e360cc80a65392fb4e7881cb0cf0e36567d14a9102040003f63cd1af37d39454affc7acc83cc474c574e575

                          • C:\Users\Admin\AppData\Local\Temp\1138.exe

                            Filesize

                            314KB

                            MD5

                            bff67ce5d7f8ebb150a23e848027d470

                            SHA1

                            c5e3a083979418315e2ac09cf1041da33a55f7d5

                            SHA256

                            23443648c2468ae2297b052c2cef4c652cfac9dc275b825a4407d8ba97963904

                            SHA512

                            300b220a36a36aab485a9d6ac3e5bcb6dfbd76b17e360cc80a65392fb4e7881cb0cf0e36567d14a9102040003f63cd1af37d39454affc7acc83cc474c574e575

                          • C:\Users\Admin\AppData\Local\Temp\1138.exe

                            Filesize

                            314KB

                            MD5

                            bff67ce5d7f8ebb150a23e848027d470

                            SHA1

                            c5e3a083979418315e2ac09cf1041da33a55f7d5

                            SHA256

                            23443648c2468ae2297b052c2cef4c652cfac9dc275b825a4407d8ba97963904

                            SHA512

                            300b220a36a36aab485a9d6ac3e5bcb6dfbd76b17e360cc80a65392fb4e7881cb0cf0e36567d14a9102040003f63cd1af37d39454affc7acc83cc474c574e575

                          • C:\Users\Admin\AppData\Local\Temp\F9F5.exe

                            Filesize

                            363KB

                            MD5

                            e292a6cbeb112872c04796311b52ae30

                            SHA1

                            8ecefecab9231e42429a33256f5db84eff302948

                            SHA256

                            39c4fa10490d1f6e5f909786dee9ab0d8e8eb79bb04a9c541d2209224367ad16

                            SHA512

                            c506b3c796d99f8fb3e70d36596720bd1a6328a653c77769e20cbb358da122e576d72518508f63217e80985eb9abaa79abaa681312e9100445e391828029577e

                          • C:\Users\Admin\AppData\Local\Temp\F9F5.exe

                            Filesize

                            363KB

                            MD5

                            e292a6cbeb112872c04796311b52ae30

                            SHA1

                            8ecefecab9231e42429a33256f5db84eff302948

                            SHA256

                            39c4fa10490d1f6e5f909786dee9ab0d8e8eb79bb04a9c541d2209224367ad16

                            SHA512

                            c506b3c796d99f8fb3e70d36596720bd1a6328a653c77769e20cbb358da122e576d72518508f63217e80985eb9abaa79abaa681312e9100445e391828029577e

                          • C:\Users\Admin\AppData\Local\Temp\FDDE.exe

                            Filesize

                            363KB

                            MD5

                            ad170ecbf3579649162c3cb67d398672

                            SHA1

                            838306ef60ae4286030be9b395c866abd0c8ff47

                            SHA256

                            5e924125ff6aeb76684f4fb7f578c6d9278b243ed18e9a9eff8b2b28045ec5a5

                            SHA512

                            83a5511b668f49d4361a4a9dd5c8944c6395504f8f31c3a0ab94a9ea1d75d4b17c72c433c53d73cd9dfbb641c34b2741ef15474bacc7c6728e889511ffafc185

                          • C:\Users\Admin\AppData\Local\Temp\FDDE.exe

                            Filesize

                            363KB

                            MD5

                            ad170ecbf3579649162c3cb67d398672

                            SHA1

                            838306ef60ae4286030be9b395c866abd0c8ff47

                            SHA256

                            5e924125ff6aeb76684f4fb7f578c6d9278b243ed18e9a9eff8b2b28045ec5a5

                            SHA512

                            83a5511b668f49d4361a4a9dd5c8944c6395504f8f31c3a0ab94a9ea1d75d4b17c72c433c53d73cd9dfbb641c34b2741ef15474bacc7c6728e889511ffafc185

                          • C:\Users\Admin\AppData\Roaming\70b90d83e65db7\cred64.dll

                            Filesize

                            126KB

                            MD5

                            6a0718d278ba7511b78df6706c12b71a

                            SHA1

                            83cefe0cdfcc041e0b8cdd8b903abcba95b947a2

                            SHA256

                            ed09ad4a634284fcff5d1e12eb0263092d5fdbe910c5c2ae76827bbab6401675

                            SHA512

                            f0afb8559dfd60af8be5269edb99b3c47ccb83ce48aaff6cce6daaf6ca3b3d77f4058cb43b7ca8c5d506afc15955db9cae8ea843aa081ff990ea6313f1f2f7df

                          • C:\Users\Admin\AppData\Roaming\70b90d83e65db7\cred64.dll

                            Filesize

                            126KB

                            MD5

                            6a0718d278ba7511b78df6706c12b71a

                            SHA1

                            83cefe0cdfcc041e0b8cdd8b903abcba95b947a2

                            SHA256

                            ed09ad4a634284fcff5d1e12eb0263092d5fdbe910c5c2ae76827bbab6401675

                            SHA512

                            f0afb8559dfd60af8be5269edb99b3c47ccb83ce48aaff6cce6daaf6ca3b3d77f4058cb43b7ca8c5d506afc15955db9cae8ea843aa081ff990ea6313f1f2f7df

                          • C:\Users\Admin\AppData\Roaming\70b90d83e65db7\cred64.dll

                            Filesize

                            126KB

                            MD5

                            6a0718d278ba7511b78df6706c12b71a

                            SHA1

                            83cefe0cdfcc041e0b8cdd8b903abcba95b947a2

                            SHA256

                            ed09ad4a634284fcff5d1e12eb0263092d5fdbe910c5c2ae76827bbab6401675

                            SHA512

                            f0afb8559dfd60af8be5269edb99b3c47ccb83ce48aaff6cce6daaf6ca3b3d77f4058cb43b7ca8c5d506afc15955db9cae8ea843aa081ff990ea6313f1f2f7df

                          • memory/412-188-0x0000000000A40000-0x0000000000A45000-memory.dmp

                            Filesize

                            20KB

                          • memory/412-171-0x0000000000A30000-0x0000000000A39000-memory.dmp

                            Filesize

                            36KB

                          • memory/412-170-0x0000000000A40000-0x0000000000A45000-memory.dmp

                            Filesize

                            20KB

                          • memory/860-132-0x000000000075D000-0x000000000076E000-memory.dmp

                            Filesize

                            68KB

                          • memory/860-135-0x0000000000400000-0x0000000000448000-memory.dmp

                            Filesize

                            288KB

                          • memory/860-134-0x0000000000400000-0x0000000000448000-memory.dmp

                            Filesize

                            288KB

                          • memory/860-133-0x00000000006A0000-0x00000000006A9000-memory.dmp

                            Filesize

                            36KB

                          • memory/1560-161-0x0000000000FD0000-0x0000000000FD6000-memory.dmp

                            Filesize

                            24KB

                          • memory/1560-184-0x0000000000FD0000-0x0000000000FD6000-memory.dmp

                            Filesize

                            24KB

                          • memory/1560-162-0x0000000000FC0000-0x0000000000FCC000-memory.dmp

                            Filesize

                            48KB

                          • memory/1932-165-0x0000000000A60000-0x0000000000A82000-memory.dmp

                            Filesize

                            136KB

                          • memory/1932-166-0x0000000000A30000-0x0000000000A57000-memory.dmp

                            Filesize

                            156KB

                          • memory/1932-186-0x0000000000A60000-0x0000000000A82000-memory.dmp

                            Filesize

                            136KB

                          • memory/2056-187-0x00000000007DC000-0x00000000007F8000-memory.dmp

                            Filesize

                            112KB

                          • memory/2056-167-0x00000000007DC000-0x00000000007F8000-memory.dmp

                            Filesize

                            112KB

                          • memory/2056-168-0x0000000000400000-0x0000000000453000-memory.dmp

                            Filesize

                            332KB

                          • memory/2604-192-0x0000000000520000-0x0000000000527000-memory.dmp

                            Filesize

                            28KB

                          • memory/2604-177-0x0000000000510000-0x000000000051D000-memory.dmp

                            Filesize

                            52KB

                          • memory/2604-176-0x0000000000520000-0x0000000000527000-memory.dmp

                            Filesize

                            28KB

                          • memory/3160-179-0x0000000000E50000-0x0000000000E58000-memory.dmp

                            Filesize

                            32KB

                          • memory/3160-180-0x0000000000E40000-0x0000000000E4B000-memory.dmp

                            Filesize

                            44KB

                          • memory/3160-193-0x0000000000E50000-0x0000000000E58000-memory.dmp

                            Filesize

                            32KB

                          • memory/3288-150-0x00000000003E0000-0x00000000003EF000-memory.dmp

                            Filesize

                            60KB

                          • memory/3288-182-0x00000000003F0000-0x00000000003F9000-memory.dmp

                            Filesize

                            36KB

                          • memory/3288-149-0x00000000003F0000-0x00000000003F9000-memory.dmp

                            Filesize

                            36KB

                          • memory/3740-173-0x0000000000A40000-0x0000000000A46000-memory.dmp

                            Filesize

                            24KB

                          • memory/3740-174-0x0000000000A30000-0x0000000000A3B000-memory.dmp

                            Filesize

                            44KB

                          • memory/3740-189-0x0000000000A40000-0x0000000000A46000-memory.dmp

                            Filesize

                            24KB

                          • memory/4188-159-0x00000000012F0000-0x00000000012F9000-memory.dmp

                            Filesize

                            36KB

                          • memory/4188-158-0x0000000001300000-0x0000000001305000-memory.dmp

                            Filesize

                            20KB

                          • memory/4188-183-0x0000000001300000-0x0000000001305000-memory.dmp

                            Filesize

                            20KB

                          • memory/4296-181-0x0000000001050000-0x0000000001057000-memory.dmp

                            Filesize

                            28KB

                          • memory/4296-147-0x0000000001040000-0x000000000104B000-memory.dmp

                            Filesize

                            44KB

                          • memory/4296-146-0x0000000001050000-0x0000000001057000-memory.dmp

                            Filesize

                            28KB

                          • memory/4452-156-0x00000000006B0000-0x00000000006E7000-memory.dmp

                            Filesize

                            220KB

                          • memory/4452-155-0x000000000075D000-0x000000000077A000-memory.dmp

                            Filesize

                            116KB

                          • memory/4452-157-0x0000000000400000-0x0000000000453000-memory.dmp

                            Filesize

                            332KB

                          • memory/4804-191-0x0000000000400000-0x0000000000453000-memory.dmp

                            Filesize

                            332KB

                          • memory/4804-190-0x0000000000480000-0x000000000049C000-memory.dmp

                            Filesize

                            112KB

                          • memory/4856-200-0x00000000004A0000-0x00000000004BC000-memory.dmp

                            Filesize

                            112KB

                          • memory/4856-201-0x0000000000400000-0x0000000000453000-memory.dmp

                            Filesize

                            332KB