Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/12/2022, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe
Resource
win10-20220812-en
General
-
Target
77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe
-
Size
423KB
-
MD5
cd334129fb0d8e174eca8566e0e542fe
-
SHA1
ffd830c762c2015b120acc25a24ecf8331047749
-
SHA256
77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff
-
SHA512
be8ee28ccf003ae90201f293e6dc2c704ceafa8dcba40d34a9f353436a8c6a97bde3e6ae8811964847b97c8d8ed593ddb1b08053665ec753fcee092c282becc4
-
SSDEEP
6144:zicpZRsLJg+alhrpsmriQv89qIV2HUEUEU67bDLAWcoBlCdi1taVe:ziiZ61g+Idps97qIwKEU6fD3cWC+t3
Malware Config
Extracted
amadey
3.50
77.73.133.72/hfk3vK9/index.php
Signatures
-
Detect Amadey credential stealer module 3 IoCs
resource yara_rule behavioral1/files/0x0003000000015568-298.dat amadey_cred_module behavioral1/files/0x0003000000015568-300.dat amadey_cred_module behavioral1/files/0x0003000000015568-299.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 3832 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 4916 gntuud.exe 4812 gntuud.exe 4720 gntuud.exe -
Loads dropped DLL 2 IoCs
pid Process 3832 rundll32.exe 3832 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3832 rundll32.exe 3832 rundll32.exe 3832 rundll32.exe 3832 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4916 1924 77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe 66 PID 1924 wrote to memory of 4916 1924 77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe 66 PID 1924 wrote to memory of 4916 1924 77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe 66 PID 4916 wrote to memory of 2888 4916 gntuud.exe 67 PID 4916 wrote to memory of 2888 4916 gntuud.exe 67 PID 4916 wrote to memory of 2888 4916 gntuud.exe 67 PID 4916 wrote to memory of 3832 4916 gntuud.exe 69 PID 4916 wrote to memory of 3832 4916 gntuud.exe 69 PID 4916 wrote to memory of 3832 4916 gntuud.exe 69 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe"C:\Users\Admin\AppData\Local\Temp\77b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2888
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
PID:4812
-
C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exeC:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe1⤵
- Executes dropped EXE
PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5cd334129fb0d8e174eca8566e0e542fe
SHA1ffd830c762c2015b120acc25a24ecf8331047749
SHA25677b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff
SHA512be8ee28ccf003ae90201f293e6dc2c704ceafa8dcba40d34a9f353436a8c6a97bde3e6ae8811964847b97c8d8ed593ddb1b08053665ec753fcee092c282becc4
-
Filesize
423KB
MD5cd334129fb0d8e174eca8566e0e542fe
SHA1ffd830c762c2015b120acc25a24ecf8331047749
SHA25677b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff
SHA512be8ee28ccf003ae90201f293e6dc2c704ceafa8dcba40d34a9f353436a8c6a97bde3e6ae8811964847b97c8d8ed593ddb1b08053665ec753fcee092c282becc4
-
Filesize
423KB
MD5cd334129fb0d8e174eca8566e0e542fe
SHA1ffd830c762c2015b120acc25a24ecf8331047749
SHA25677b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff
SHA512be8ee28ccf003ae90201f293e6dc2c704ceafa8dcba40d34a9f353436a8c6a97bde3e6ae8811964847b97c8d8ed593ddb1b08053665ec753fcee092c282becc4
-
Filesize
423KB
MD5cd334129fb0d8e174eca8566e0e542fe
SHA1ffd830c762c2015b120acc25a24ecf8331047749
SHA25677b5cef1f46958b16b21d2fe4836130c1406832002beac168af7cfb3db4713ff
SHA512be8ee28ccf003ae90201f293e6dc2c704ceafa8dcba40d34a9f353436a8c6a97bde3e6ae8811964847b97c8d8ed593ddb1b08053665ec753fcee092c282becc4
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773
-
Filesize
126KB
MD5349b2b47fef50fa6a1fc19d0ee4b2db8
SHA1077f4328b3f060a9f010b1a63d9e127d24ddafd4
SHA2565cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0
SHA51283fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773