Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/12/2022, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
287KB
-
MD5
1a97c4406f348d25ead8d0602ad4bc76
-
SHA1
22e5a1098ab941bd29ccc584535db7e70dea21d7
-
SHA256
d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
-
SHA512
2588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
SSDEEP
6144:tUk2LiaIHxnaoo2WoBUqraScFELtf8qMrc:tUk2eaSxnaz3qujELx8n
Malware Config
Extracted
amadey
3.60
62.204.41.79/fb73jc3/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x0008000000012300-86.dat amadey_cred_module behavioral1/files/0x0008000000012300-87.dat amadey_cred_module behavioral1/files/0x0008000000012300-88.dat amadey_cred_module behavioral1/files/0x0008000000012300-89.dat amadey_cred_module behavioral1/files/0x0008000000012300-90.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1136 rundll32.exe -
Executes dropped EXE 3 IoCs
pid Process 536 gntuud.exe 768 gntuud.exe 1092 gntuud.exe -
Loads dropped DLL 6 IoCs
pid Process 1112 file.exe 1112 file.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe 1136 rundll32.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1112 wrote to memory of 536 1112 file.exe 28 PID 1112 wrote to memory of 536 1112 file.exe 28 PID 1112 wrote to memory of 536 1112 file.exe 28 PID 1112 wrote to memory of 536 1112 file.exe 28 PID 536 wrote to memory of 1140 536 gntuud.exe 29 PID 536 wrote to memory of 1140 536 gntuud.exe 29 PID 536 wrote to memory of 1140 536 gntuud.exe 29 PID 536 wrote to memory of 1140 536 gntuud.exe 29 PID 536 wrote to memory of 2036 536 gntuud.exe 31 PID 536 wrote to memory of 2036 536 gntuud.exe 31 PID 536 wrote to memory of 2036 536 gntuud.exe 31 PID 536 wrote to memory of 2036 536 gntuud.exe 31 PID 2036 wrote to memory of 1988 2036 cmd.exe 33 PID 2036 wrote to memory of 1988 2036 cmd.exe 33 PID 2036 wrote to memory of 1988 2036 cmd.exe 33 PID 2036 wrote to memory of 1988 2036 cmd.exe 33 PID 2036 wrote to memory of 1492 2036 cmd.exe 34 PID 2036 wrote to memory of 1492 2036 cmd.exe 34 PID 2036 wrote to memory of 1492 2036 cmd.exe 34 PID 2036 wrote to memory of 1492 2036 cmd.exe 34 PID 2036 wrote to memory of 1000 2036 cmd.exe 35 PID 2036 wrote to memory of 1000 2036 cmd.exe 35 PID 2036 wrote to memory of 1000 2036 cmd.exe 35 PID 2036 wrote to memory of 1000 2036 cmd.exe 35 PID 2036 wrote to memory of 524 2036 cmd.exe 36 PID 2036 wrote to memory of 524 2036 cmd.exe 36 PID 2036 wrote to memory of 524 2036 cmd.exe 36 PID 2036 wrote to memory of 524 2036 cmd.exe 36 PID 2036 wrote to memory of 840 2036 cmd.exe 37 PID 2036 wrote to memory of 840 2036 cmd.exe 37 PID 2036 wrote to memory of 840 2036 cmd.exe 37 PID 2036 wrote to memory of 840 2036 cmd.exe 37 PID 2036 wrote to memory of 1416 2036 cmd.exe 38 PID 2036 wrote to memory of 1416 2036 cmd.exe 38 PID 2036 wrote to memory of 1416 2036 cmd.exe 38 PID 2036 wrote to memory of 1416 2036 cmd.exe 38 PID 1168 wrote to memory of 768 1168 taskeng.exe 42 PID 1168 wrote to memory of 768 1168 taskeng.exe 42 PID 1168 wrote to memory of 768 1168 taskeng.exe 42 PID 1168 wrote to memory of 768 1168 taskeng.exe 42 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 536 wrote to memory of 1136 536 gntuud.exe 43 PID 1168 wrote to memory of 1092 1168 taskeng.exe 44 PID 1168 wrote to memory of 1092 1168 taskeng.exe 44 PID 1168 wrote to memory of 1092 1168 taskeng.exe 44 PID 1168 wrote to memory of 1092 1168 taskeng.exe 44 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:1140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\2c33368f7d" /P "Admin:N"&&CACLS "..\2c33368f7d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:1492
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:1000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:N"4⤵PID:840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\2c33368f7d" /P "Admin:R" /E4⤵PID:1416
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1136
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {658D99E5-001F-4E4F-A434-9BD13F12DD8D} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\2c33368f7d\gntuud.exe2⤵
- Executes dropped EXE
PID:1092
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
287KB
MD51a97c4406f348d25ead8d0602ad4bc76
SHA122e5a1098ab941bd29ccc584535db7e70dea21d7
SHA256d8f86de2df70991a48c9833e906bf0d39d731335e3055ecc1a32b150a5296709
SHA5122588e5c8b1e69f3d26e08abc19f4de8baa647afca3766ac0b6587ef1dc7830350d0e4246230d5a5a10fd8049af65d0cca394aad2df6f4b9a31a1bf1d400d12a6
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda
-
Filesize
126KB
MD59995abf2f401e4945a7d2930a3727619
SHA17715e14ad6e4adf609c62c5812419800343fbd4f
SHA256d35b5dd18d91dbfe3dc89cb75b6a26757777b5c52a33cd8fcf6e5ed45a946f1a
SHA51242726fb602958594914b5bc936aff36833823f9f9da9bc80a46579d96cec12c7df070c174ec9dd82c21f2fe44f1e9a4a2e50d9944fea6379dbdec666727a7eda