Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe
Resource
win10v2004-20220901-en
General
-
Target
009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe
-
Size
220KB
-
MD5
ea28c15e9af2a55f313039ed3110b691
-
SHA1
19fc1b7b60964e3c7033b1e94b5f3adea7cc989e
-
SHA256
009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1
-
SHA512
145d4756147f2dcf471a04b12987117e17f1a54b6b1f24ad447f6182886c4d87b5fe65b4f7aa95c1a6aa169b39810230dfee404d4d302ca0d6fcb9269e56269e
-
SSDEEP
3072:e1jMJDdlipHtrpd54QTSdUkqVYxQnQ2Dv/Ym2ZVL6Y4+Sv8ngNGNwtrxZfFSBZ1Z:cKDdItd+XqVYegy5+yb9Kvp7cd
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e5a3-154.dat amadey_cred_module behavioral2/files/0x000400000001e5a3-155.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 36 3404 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 3664 rovwer.exe 1420 rovwer.exe 5016 rovwer.exe 4896 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation rovwer.exe -
Loads dropped DLL 1 IoCs
pid Process 3404 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 3692 3400 WerFault.exe 82 1720 1420 WerFault.exe 102 4328 5016 WerFault.exe 107 1524 4896 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3404 rundll32.exe 3404 rundll32.exe 3404 rundll32.exe 3404 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3400 wrote to memory of 3664 3400 009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe 86 PID 3400 wrote to memory of 3664 3400 009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe 86 PID 3400 wrote to memory of 3664 3400 009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe 86 PID 3664 wrote to memory of 4956 3664 rovwer.exe 90 PID 3664 wrote to memory of 4956 3664 rovwer.exe 90 PID 3664 wrote to memory of 4956 3664 rovwer.exe 90 PID 3664 wrote to memory of 4136 3664 rovwer.exe 92 PID 3664 wrote to memory of 4136 3664 rovwer.exe 92 PID 3664 wrote to memory of 4136 3664 rovwer.exe 92 PID 4136 wrote to memory of 312 4136 cmd.exe 94 PID 4136 wrote to memory of 312 4136 cmd.exe 94 PID 4136 wrote to memory of 312 4136 cmd.exe 94 PID 4136 wrote to memory of 4268 4136 cmd.exe 95 PID 4136 wrote to memory of 4268 4136 cmd.exe 95 PID 4136 wrote to memory of 4268 4136 cmd.exe 95 PID 4136 wrote to memory of 4656 4136 cmd.exe 96 PID 4136 wrote to memory of 4656 4136 cmd.exe 96 PID 4136 wrote to memory of 4656 4136 cmd.exe 96 PID 4136 wrote to memory of 408 4136 cmd.exe 99 PID 4136 wrote to memory of 408 4136 cmd.exe 99 PID 4136 wrote to memory of 408 4136 cmd.exe 99 PID 4136 wrote to memory of 4172 4136 cmd.exe 98 PID 4136 wrote to memory of 4172 4136 cmd.exe 98 PID 4136 wrote to memory of 4172 4136 cmd.exe 98 PID 4136 wrote to memory of 4112 4136 cmd.exe 97 PID 4136 wrote to memory of 4112 4136 cmd.exe 97 PID 4136 wrote to memory of 4112 4136 cmd.exe 97 PID 3664 wrote to memory of 3404 3664 rovwer.exe 106 PID 3664 wrote to memory of 3404 3664 rovwer.exe 106 PID 3664 wrote to memory of 3404 3664 rovwer.exe 106 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe"C:\Users\Admin\AppData\Local\Temp\009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:4268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:4656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:4112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:4172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:408
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:3404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 9082⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3400 -ip 34001⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 4162⤵
- Program crash
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1420 -ip 14201⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 4242⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5016 -ip 50161⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 4162⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4896 -ip 48961⤵PID:1320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5ea28c15e9af2a55f313039ed3110b691
SHA119fc1b7b60964e3c7033b1e94b5f3adea7cc989e
SHA256009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1
SHA512145d4756147f2dcf471a04b12987117e17f1a54b6b1f24ad447f6182886c4d87b5fe65b4f7aa95c1a6aa169b39810230dfee404d4d302ca0d6fcb9269e56269e
-
Filesize
220KB
MD5ea28c15e9af2a55f313039ed3110b691
SHA119fc1b7b60964e3c7033b1e94b5f3adea7cc989e
SHA256009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1
SHA512145d4756147f2dcf471a04b12987117e17f1a54b6b1f24ad447f6182886c4d87b5fe65b4f7aa95c1a6aa169b39810230dfee404d4d302ca0d6fcb9269e56269e
-
Filesize
220KB
MD5ea28c15e9af2a55f313039ed3110b691
SHA119fc1b7b60964e3c7033b1e94b5f3adea7cc989e
SHA256009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1
SHA512145d4756147f2dcf471a04b12987117e17f1a54b6b1f24ad447f6182886c4d87b5fe65b4f7aa95c1a6aa169b39810230dfee404d4d302ca0d6fcb9269e56269e
-
Filesize
220KB
MD5ea28c15e9af2a55f313039ed3110b691
SHA119fc1b7b60964e3c7033b1e94b5f3adea7cc989e
SHA256009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1
SHA512145d4756147f2dcf471a04b12987117e17f1a54b6b1f24ad447f6182886c4d87b5fe65b4f7aa95c1a6aa169b39810230dfee404d4d302ca0d6fcb9269e56269e
-
Filesize
220KB
MD5ea28c15e9af2a55f313039ed3110b691
SHA119fc1b7b60964e3c7033b1e94b5f3adea7cc989e
SHA256009adc2d6239a57f51e0e6add913c5c050817274ee9becafd713e8ce243d34c1
SHA512145d4756147f2dcf471a04b12987117e17f1a54b6b1f24ad447f6182886c4d87b5fe65b4f7aa95c1a6aa169b39810230dfee404d4d302ca0d6fcb9269e56269e
-
Filesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302
-
Filesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302