Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 02:02

General

  • Target

    file.exe

  • Size

    331KB

  • MD5

    4f574fc271a929d588d132559039a444

  • SHA1

    831e5c9bdb1f02bcd8e99047df194f0c4aecf080

  • SHA256

    03a20a50d7c2d93ef7e22355a1d0244e795d1a0d67d211b6e24451823608e443

  • SHA512

    1415ce833a08ec30d893155556f87fc27748bc73e3b3dfcc7b48244d73fcc2cf0a680ee34ce5938ea05901b32e66e764ea806ca15578d60cd9b24235e11298cb

  • SSDEEP

    6144:kZDnH1LIv8PF2ykp9ubIvYcVhoL+LUNquyIDcidVS:kZDH1EuSvjLADcidVS

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.167/v7eWcjs/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 13 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4744
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:4368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1304
      2⤵
      • Program crash
      PID:5096
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1312
      2⤵
      • Program crash
      PID:2284
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1308
      2⤵
      • Program crash
      PID:2064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4844 -ip 4844
    1⤵
      PID:540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4844 -ip 4844
      1⤵
        PID:2744
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4844 -ip 4844
        1⤵
          PID:3628
        • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
          C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
          1⤵
          • Executes dropped EXE
          PID:952
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 536
            2⤵
            • Program crash
            PID:2092
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 544
            2⤵
            • Program crash
            PID:3732
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 796
            2⤵
            • Program crash
            PID:5088
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 816
            2⤵
            • Program crash
            PID:4924
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 840
            2⤵
            • Program crash
            PID:4048
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 952 -ip 952
          1⤵
            PID:2280
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 952 -ip 952
            1⤵
              PID:924
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 952 -ip 952
              1⤵
                PID:1828
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 952 -ip 952
                1⤵
                  PID:1832
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 952 -ip 952
                  1⤵
                    PID:1988
                  • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
                    C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1824
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 540
                      2⤵
                      • Program crash
                      PID:5012
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 548
                      2⤵
                      • Program crash
                      PID:4524
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 796
                      2⤵
                      • Program crash
                      PID:1212
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 804
                      2⤵
                      • Program crash
                      PID:3568
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 812
                      2⤵
                      • Program crash
                      PID:3596
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1824 -ip 1824
                    1⤵
                      PID:3560
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1824 -ip 1824
                      1⤵
                        PID:4408
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1824 -ip 1824
                        1⤵
                          PID:3088
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1824 -ip 1824
                          1⤵
                            PID:1480
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1824 -ip 1824
                            1⤵
                              PID:3000

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

                              Filesize

                              331KB

                              MD5

                              4f574fc271a929d588d132559039a444

                              SHA1

                              831e5c9bdb1f02bcd8e99047df194f0c4aecf080

                              SHA256

                              03a20a50d7c2d93ef7e22355a1d0244e795d1a0d67d211b6e24451823608e443

                              SHA512

                              1415ce833a08ec30d893155556f87fc27748bc73e3b3dfcc7b48244d73fcc2cf0a680ee34ce5938ea05901b32e66e764ea806ca15578d60cd9b24235e11298cb

                            • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

                              Filesize

                              331KB

                              MD5

                              4f574fc271a929d588d132559039a444

                              SHA1

                              831e5c9bdb1f02bcd8e99047df194f0c4aecf080

                              SHA256

                              03a20a50d7c2d93ef7e22355a1d0244e795d1a0d67d211b6e24451823608e443

                              SHA512

                              1415ce833a08ec30d893155556f87fc27748bc73e3b3dfcc7b48244d73fcc2cf0a680ee34ce5938ea05901b32e66e764ea806ca15578d60cd9b24235e11298cb

                            • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

                              Filesize

                              331KB

                              MD5

                              4f574fc271a929d588d132559039a444

                              SHA1

                              831e5c9bdb1f02bcd8e99047df194f0c4aecf080

                              SHA256

                              03a20a50d7c2d93ef7e22355a1d0244e795d1a0d67d211b6e24451823608e443

                              SHA512

                              1415ce833a08ec30d893155556f87fc27748bc73e3b3dfcc7b48244d73fcc2cf0a680ee34ce5938ea05901b32e66e764ea806ca15578d60cd9b24235e11298cb

                            • C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe

                              Filesize

                              331KB

                              MD5

                              4f574fc271a929d588d132559039a444

                              SHA1

                              831e5c9bdb1f02bcd8e99047df194f0c4aecf080

                              SHA256

                              03a20a50d7c2d93ef7e22355a1d0244e795d1a0d67d211b6e24451823608e443

                              SHA512

                              1415ce833a08ec30d893155556f87fc27748bc73e3b3dfcc7b48244d73fcc2cf0a680ee34ce5938ea05901b32e66e764ea806ca15578d60cd9b24235e11298cb

                            • C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

                              Filesize

                              126KB

                              MD5

                              aebf8cd9ea982decded5ee6f3777c6d7

                              SHA1

                              406e723158cd5697503d1d04839d3bc7a5051603

                              SHA256

                              104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

                              SHA512

                              f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

                            • C:\Users\Admin\AppData\Roaming\56a1c3d463f381\cred64.dll

                              Filesize

                              126KB

                              MD5

                              aebf8cd9ea982decded5ee6f3777c6d7

                              SHA1

                              406e723158cd5697503d1d04839d3bc7a5051603

                              SHA256

                              104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62

                              SHA512

                              f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981

                            • memory/952-149-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/952-148-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/952-147-0x0000000000480000-0x0000000000580000-memory.dmp

                              Filesize

                              1024KB

                            • memory/1824-156-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/1824-155-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/1824-154-0x000000000066C000-0x000000000068A000-memory.dmp

                              Filesize

                              120KB

                            • memory/3032-144-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/3032-143-0x0000000000658000-0x0000000000677000-memory.dmp

                              Filesize

                              124KB

                            • memory/3032-140-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/3032-139-0x0000000000658000-0x0000000000677000-memory.dmp

                              Filesize

                              124KB

                            • memory/4844-132-0x0000000000739000-0x0000000000758000-memory.dmp

                              Filesize

                              124KB

                            • memory/4844-142-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/4844-141-0x0000000000739000-0x0000000000758000-memory.dmp

                              Filesize

                              124KB

                            • memory/4844-134-0x0000000000400000-0x0000000000471000-memory.dmp

                              Filesize

                              452KB

                            • memory/4844-133-0x00000000021C0000-0x00000000021FE000-memory.dmp

                              Filesize

                              248KB