Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
344KB
-
MD5
75ccd08a0c97ace8136fdb7f8e9595f0
-
SHA1
0f1a820b10915798e0b4026695fa484f8a44c888
-
SHA256
707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
-
SHA512
d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
SSDEEP
6144:bK3E/11JKDVqjPtkbSZdRc40hc7oZ22tThsIeGjY6x:R/j0mFYSelhMm22ZVEM
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Extracted
redline
novr
31.41.244.14:4694
-
auth_value
34ddf4eb9326256f20a48cd5f1e9b496
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x00080000000122ce-84.dat amadey_cred_module behavioral1/files/0x00080000000122ce-85.dat amadey_cred_module behavioral1/files/0x00080000000122ce-86.dat amadey_cred_module behavioral1/files/0x00080000000122ce-87.dat amadey_cred_module behavioral1/files/0x00080000000122ce-88.dat amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x00080000000122c4-69.dat family_redline behavioral1/files/0x00080000000122c4-71.dat family_redline behavioral1/files/0x00080000000122c4-72.dat family_redline behavioral1/memory/848-73-0x00000000000E0000-0x0000000000108000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 1496 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1792 rovwer.exe 848 lada.exe 2028 rovwer.exe 1956 rovwer.exe -
Loads dropped DLL 7 IoCs
pid Process 112 file.exe 112 file.exe 1792 rovwer.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lada.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000121001\\lada.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 848 lada.exe 848 lada.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 848 lada.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 112 wrote to memory of 1792 112 file.exe 27 PID 112 wrote to memory of 1792 112 file.exe 27 PID 112 wrote to memory of 1792 112 file.exe 27 PID 112 wrote to memory of 1792 112 file.exe 27 PID 1792 wrote to memory of 1800 1792 rovwer.exe 28 PID 1792 wrote to memory of 1800 1792 rovwer.exe 28 PID 1792 wrote to memory of 1800 1792 rovwer.exe 28 PID 1792 wrote to memory of 1800 1792 rovwer.exe 28 PID 1792 wrote to memory of 848 1792 rovwer.exe 32 PID 1792 wrote to memory of 848 1792 rovwer.exe 32 PID 1792 wrote to memory of 848 1792 rovwer.exe 32 PID 1792 wrote to memory of 848 1792 rovwer.exe 32 PID 1520 wrote to memory of 2028 1520 taskeng.exe 35 PID 1520 wrote to memory of 2028 1520 taskeng.exe 35 PID 1520 wrote to memory of 2028 1520 taskeng.exe 35 PID 1520 wrote to memory of 2028 1520 taskeng.exe 35 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1792 wrote to memory of 1496 1792 rovwer.exe 36 PID 1520 wrote to memory of 1956 1520 taskeng.exe 37 PID 1520 wrote to memory of 1956 1520 taskeng.exe 37 PID 1520 wrote to memory of 1956 1520 taskeng.exe 37 PID 1520 wrote to memory of 1956 1520 taskeng.exe 37 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe"C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1496
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7D2C4EAC-EE56-43CB-953B-5F15BF62D647} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
344KB
MD575ccd08a0c97ace8136fdb7f8e9595f0
SHA10f1a820b10915798e0b4026695fa484f8a44c888
SHA256707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
SHA512d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
Filesize
344KB
MD575ccd08a0c97ace8136fdb7f8e9595f0
SHA10f1a820b10915798e0b4026695fa484f8a44c888
SHA256707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
SHA512d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
Filesize
344KB
MD575ccd08a0c97ace8136fdb7f8e9595f0
SHA10f1a820b10915798e0b4026695fa484f8a44c888
SHA256707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
SHA512d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
Filesize
344KB
MD575ccd08a0c97ace8136fdb7f8e9595f0
SHA10f1a820b10915798e0b4026695fa484f8a44c888
SHA256707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
SHA512d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
344KB
MD575ccd08a0c97ace8136fdb7f8e9595f0
SHA10f1a820b10915798e0b4026695fa484f8a44c888
SHA256707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
SHA512d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
Filesize
344KB
MD575ccd08a0c97ace8136fdb7f8e9595f0
SHA10f1a820b10915798e0b4026695fa484f8a44c888
SHA256707b6abcad4dcd7ec70be02dea64fb17f90065a13126a022e8046c4dd3d0e34c
SHA512d7e313c253d32b660faf718cd61754b6610ec0799313c9b7a04a292cc769510662e01a9783526aec66246cc98bce80df062cf1a0771f716a4a51fa89a08af7c9
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029