Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
415KB
-
MD5
4e12f53b36ae58a9e181cd3bc660e750
-
SHA1
d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
-
SHA256
c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
-
SHA512
3932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
SSDEEP
6144:/mjIyZwfLm4RP6BLMZhJrAHo496ZC4qVatxX4WcoBlCwh/yaV:/mjBZWi4RCBQ8oFQ3VatxrcWCsq
Malware Config
Extracted
amadey
3.50
77.73.133.72/hfk3vK9/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x00070000000136c6-79.dat amadey_cred_module behavioral1/files/0x00070000000136c6-80.dat amadey_cred_module behavioral1/files/0x00070000000136c6-83.dat amadey_cred_module behavioral1/files/0x00070000000136c6-82.dat amadey_cred_module behavioral1/files/0x00070000000136c6-81.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1380 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1096 gntuud.exe 1328 gntuud.exe 332 gntuud.exe 296 gntuud.exe -
Loads dropped DLL 6 IoCs
pid Process 1260 file.exe 1260 file.exe 1380 rundll32.exe 1380 rundll32.exe 1380 rundll32.exe 1380 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1380 rundll32.exe 1380 rundll32.exe 1380 rundll32.exe 1380 rundll32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1096 1260 file.exe 27 PID 1260 wrote to memory of 1096 1260 file.exe 27 PID 1260 wrote to memory of 1096 1260 file.exe 27 PID 1260 wrote to memory of 1096 1260 file.exe 27 PID 1096 wrote to memory of 2004 1096 gntuud.exe 28 PID 1096 wrote to memory of 2004 1096 gntuud.exe 28 PID 1096 wrote to memory of 2004 1096 gntuud.exe 28 PID 1096 wrote to memory of 2004 1096 gntuud.exe 28 PID 588 wrote to memory of 1328 588 taskeng.exe 33 PID 588 wrote to memory of 1328 588 taskeng.exe 33 PID 588 wrote to memory of 1328 588 taskeng.exe 33 PID 588 wrote to memory of 1328 588 taskeng.exe 33 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 1096 wrote to memory of 1380 1096 gntuud.exe 34 PID 588 wrote to memory of 332 588 taskeng.exe 35 PID 588 wrote to memory of 332 588 taskeng.exe 35 PID 588 wrote to memory of 332 588 taskeng.exe 35 PID 588 wrote to memory of 332 588 taskeng.exe 35 PID 588 wrote to memory of 296 588 taskeng.exe 36 PID 588 wrote to memory of 296 588 taskeng.exe 36 PID 588 wrote to memory of 296 588 taskeng.exe 36 PID 588 wrote to memory of 296 588 taskeng.exe 36 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2004
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1380
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {19F0A3AA-E4B6-43A8-B5F5-6F2713AFFBDC} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe2⤵
- Executes dropped EXE
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe2⤵
- Executes dropped EXE
PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe2⤵
- Executes dropped EXE
PID:296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
415KB
MD54e12f53b36ae58a9e181cd3bc660e750
SHA1d8643ea88ebc7a3c249f67d960bcbdd8f0256f62
SHA256c3f33b61a8c1d216fd5cedf8bd44dfae0496420885507f415b26a3b0019a920f
SHA5123932823c120a27c0174b079816ae35ee0289a07895bf7be695b2d89b825378ccab71e7293ad5286ad60ae1ce9beff8f34d1d6586ebeb91a56ca4dc5249281d16
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773