Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe
Resource
win10v2004-20220812-en
General
-
Target
976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe
-
Size
332KB
-
MD5
933a85f92647e1d6ebc124fabb767475
-
SHA1
cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3
-
SHA256
976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b
-
SHA512
5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922
-
SSDEEP
6144:ZQve+k+JZnNEfnxMQFUBVDl42is8Gs3fxSHdbqoWJzRIDceNVS:ZQWf+J/Ux/y542FVoo9GoWJaDceNVS
Malware Config
Extracted
amadey
3.50
62.204.41.6/p9cWxH/index.php
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral1/files/0x000a000000022e7a-148.dat amadey_cred_module behavioral1/files/0x000a000000022e7a-149.dat amadey_cred_module behavioral1/files/0x000a000000022e7a-150.dat amadey_cred_module behavioral1/memory/4376-151-0x00000000020D0000-0x00000000020F4000-memory.dmp amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 32 4376 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 396 gntuud.exe 4432 gntuud.exe 2496 gntuud.exe 2732 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 2 IoCs
pid Process 4376 rundll32.exe 4376 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1664 4772 WerFault.exe 79 376 4432 WerFault.exe 85 784 2496 WerFault.exe 93 1116 2732 WerFault.exe 100 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4376 rundll32.exe 4376 rundll32.exe 4376 rundll32.exe 4376 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4772 wrote to memory of 396 4772 976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe 80 PID 4772 wrote to memory of 396 4772 976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe 80 PID 4772 wrote to memory of 396 4772 976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe 80 PID 396 wrote to memory of 2364 396 gntuud.exe 83 PID 396 wrote to memory of 2364 396 gntuud.exe 83 PID 396 wrote to memory of 2364 396 gntuud.exe 83 PID 396 wrote to memory of 4376 396 gntuud.exe 90 PID 396 wrote to memory of 4376 396 gntuud.exe 90 PID 396 wrote to memory of 4376 396 gntuud.exe 90 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe"C:\Users\Admin\AppData\Local\Temp\976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2364
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 11362⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4772 -ip 47721⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 4242⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4432 -ip 44321⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 1882⤵
- Program crash
PID:784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2496 -ip 24961⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 4242⤵
- Program crash
PID:1116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2732 -ip 27321⤵PID:1472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5933a85f92647e1d6ebc124fabb767475
SHA1cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3
SHA256976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b
SHA5125f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922
-
Filesize
332KB
MD5933a85f92647e1d6ebc124fabb767475
SHA1cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3
SHA256976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b
SHA5125f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922
-
Filesize
332KB
MD5933a85f92647e1d6ebc124fabb767475
SHA1cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3
SHA256976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b
SHA5125f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922
-
Filesize
332KB
MD5933a85f92647e1d6ebc124fabb767475
SHA1cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3
SHA256976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b
SHA5125f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922
-
Filesize
332KB
MD5933a85f92647e1d6ebc124fabb767475
SHA1cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3
SHA256976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b
SHA5125f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1