Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
109s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
424KB
-
MD5
4c6266913d07fb5f0d93a672245bce4d
-
SHA1
7f0350c11ffd551d254b43104b777b037bb483f9
-
SHA256
5466d0943a1847718121bd431d6ecbf3bfcd0d10fcc0d97cd559c5e99f4bf92e
-
SHA512
b0ff6f887110643c08a98800cd62cb320aba82969632539058a998fc90495b4262bdb2feb5b7785380a4e3f54a64ec894da24319040de90a25caf9e84145b794
-
SSDEEP
6144:op6hZKsL6S1a6x3KL01PzJA0S6qm/3ydFBDfxhgAWcoBlC9XcObSaVe:opwZfuS1a65AcO0S6xyjBJMcWCFfS3
Malware Config
Extracted
amadey
3.50
62.204.41.6/p9cWxH/index.php
Signatures
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000700000001e82a-149.dat amadey_cred_module behavioral2/files/0x000700000001e82a-150.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 36 3516 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4896 gntuud.exe 4248 gntuud.exe 2780 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file.exe -
Loads dropped DLL 1 IoCs
pid Process 3516 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4972 2012 WerFault.exe 79 4580 4248 WerFault.exe 93 804 2780 WerFault.exe 97 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3516 rundll32.exe 3516 rundll32.exe 3516 rundll32.exe 3516 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4896 2012 file.exe 80 PID 2012 wrote to memory of 4896 2012 file.exe 80 PID 2012 wrote to memory of 4896 2012 file.exe 80 PID 4896 wrote to memory of 2144 4896 gntuud.exe 87 PID 4896 wrote to memory of 2144 4896 gntuud.exe 87 PID 4896 wrote to memory of 2144 4896 gntuud.exe 87 PID 4896 wrote to memory of 3516 4896 gntuud.exe 96 PID 4896 wrote to memory of 3516 4896 gntuud.exe 96 PID 4896 wrote to memory of 3516 4896 gntuud.exe 96 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2144
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:3516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 11322⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2012 -ip 20121⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 4202⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4248 -ip 42481⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 4162⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2780 -ip 27801⤵PID:3316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD54c6266913d07fb5f0d93a672245bce4d
SHA17f0350c11ffd551d254b43104b777b037bb483f9
SHA2565466d0943a1847718121bd431d6ecbf3bfcd0d10fcc0d97cd559c5e99f4bf92e
SHA512b0ff6f887110643c08a98800cd62cb320aba82969632539058a998fc90495b4262bdb2feb5b7785380a4e3f54a64ec894da24319040de90a25caf9e84145b794
-
Filesize
424KB
MD54c6266913d07fb5f0d93a672245bce4d
SHA17f0350c11ffd551d254b43104b777b037bb483f9
SHA2565466d0943a1847718121bd431d6ecbf3bfcd0d10fcc0d97cd559c5e99f4bf92e
SHA512b0ff6f887110643c08a98800cd62cb320aba82969632539058a998fc90495b4262bdb2feb5b7785380a4e3f54a64ec894da24319040de90a25caf9e84145b794
-
Filesize
424KB
MD54c6266913d07fb5f0d93a672245bce4d
SHA17f0350c11ffd551d254b43104b777b037bb483f9
SHA2565466d0943a1847718121bd431d6ecbf3bfcd0d10fcc0d97cd559c5e99f4bf92e
SHA512b0ff6f887110643c08a98800cd62cb320aba82969632539058a998fc90495b4262bdb2feb5b7785380a4e3f54a64ec894da24319040de90a25caf9e84145b794
-
Filesize
424KB
MD54c6266913d07fb5f0d93a672245bce4d
SHA17f0350c11ffd551d254b43104b777b037bb483f9
SHA2565466d0943a1847718121bd431d6ecbf3bfcd0d10fcc0d97cd559c5e99f4bf92e
SHA512b0ff6f887110643c08a98800cd62cb320aba82969632539058a998fc90495b4262bdb2feb5b7785380a4e3f54a64ec894da24319040de90a25caf9e84145b794
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
Filesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1