Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29/10/2022, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe
Resource
win10-20220812-en
General
-
Target
b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe
-
Size
293KB
-
MD5
3f0aa56d85079980c41c0f281579bc09
-
SHA1
9eb62ae8fc632f866b34f19fd34d004917c09d2b
-
SHA256
b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087
-
SHA512
eab3097f5541d9f11a09751dc45aca4a6d9f9bc8916e02c2cbc8226c654e165003198c5bfcff23a688d76852f3c548c05c62d41d770c3d917f5e4c2c358b6407
-
SSDEEP
3072:Wf3qBUKQLf7w4Qz5mEux5QfDLCl5kOFx8s9zVUsDFuAw2R2PQ3bWopZ4LEbM/h3:iqBbQLDwKTQfdOAsbTzw26QTL4Lu
Malware Config
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral1/files/0x0003000000015568-292.dat amadey_cred_module behavioral1/files/0x0003000000015568-293.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 4520 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 3296 rovwer.exe 5052 rovwer.exe 5088 rovwer.exe -
Loads dropped DLL 1 IoCs
pid Process 4520 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4520 rundll32.exe 4520 rundll32.exe 4520 rundll32.exe 4520 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2660 wrote to memory of 3296 2660 b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe 66 PID 2660 wrote to memory of 3296 2660 b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe 66 PID 2660 wrote to memory of 3296 2660 b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe 66 PID 3296 wrote to memory of 3776 3296 rovwer.exe 67 PID 3296 wrote to memory of 3776 3296 rovwer.exe 67 PID 3296 wrote to memory of 3776 3296 rovwer.exe 67 PID 3296 wrote to memory of 4520 3296 rovwer.exe 69 PID 3296 wrote to memory of 4520 3296 rovwer.exe 69 PID 3296 wrote to memory of 4520 3296 rovwer.exe 69 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe"C:\Users\Admin\AppData\Local\Temp\b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:3776
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe1⤵
- Executes dropped EXE
PID:5052
-
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe1⤵
- Executes dropped EXE
PID:5088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD53f0aa56d85079980c41c0f281579bc09
SHA19eb62ae8fc632f866b34f19fd34d004917c09d2b
SHA256b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087
SHA512eab3097f5541d9f11a09751dc45aca4a6d9f9bc8916e02c2cbc8226c654e165003198c5bfcff23a688d76852f3c548c05c62d41d770c3d917f5e4c2c358b6407
-
Filesize
293KB
MD53f0aa56d85079980c41c0f281579bc09
SHA19eb62ae8fc632f866b34f19fd34d004917c09d2b
SHA256b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087
SHA512eab3097f5541d9f11a09751dc45aca4a6d9f9bc8916e02c2cbc8226c654e165003198c5bfcff23a688d76852f3c548c05c62d41d770c3d917f5e4c2c358b6407
-
Filesize
293KB
MD53f0aa56d85079980c41c0f281579bc09
SHA19eb62ae8fc632f866b34f19fd34d004917c09d2b
SHA256b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087
SHA512eab3097f5541d9f11a09751dc45aca4a6d9f9bc8916e02c2cbc8226c654e165003198c5bfcff23a688d76852f3c548c05c62d41d770c3d917f5e4c2c358b6407
-
Filesize
293KB
MD53f0aa56d85079980c41c0f281579bc09
SHA19eb62ae8fc632f866b34f19fd34d004917c09d2b
SHA256b9628685dc03866d8841270ded979a5e4d6162c391caf0b8220dc19a297c5087
SHA512eab3097f5541d9f11a09751dc45aca4a6d9f9bc8916e02c2cbc8226c654e165003198c5bfcff23a688d76852f3c548c05c62d41d770c3d917f5e4c2c358b6407
-
Filesize
126KB
MD5e92a6a3a013a87cf57f3753d77a1b9c9
SHA101366b392cb71fed71f5bc1cd09e0f8c76657519
SHA25642a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5
SHA512c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57
-
Filesize
126KB
MD5e92a6a3a013a87cf57f3753d77a1b9c9
SHA101366b392cb71fed71f5bc1cd09e0f8c76657519
SHA25642a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5
SHA512c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57