Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18/12/2022, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
273KB
-
MD5
67d588981512c4db6508225a1d7b1644
-
SHA1
baaa04249099b2faede5550e4410a82651f64d46
-
SHA256
90ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
-
SHA512
fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
SSDEEP
6144:329dkLiUR5PW5BRGhSPLETPNCxZWT4x6hng3CDNLU0V6:329i28e5fVPLELzT4whgS54O
Malware Config
Extracted
amadey
3.50
31.41.244.237/jg94cVd30f/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x00060000000142d7-95.dat amadey_cred_module behavioral1/files/0x00060000000142d7-102.dat amadey_cred_module behavioral1/files/0x00060000000142d7-101.dat amadey_cred_module behavioral1/files/0x00060000000142d7-100.dat amadey_cred_module behavioral1/files/0x00060000000142d7-99.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 1584 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1420 gntuud.exe 1752 linda5.exe 1608 gntuud.exe 336 gntuud.exe -
Loads dropped DLL 8 IoCs
pid Process 1640 file.exe 1640 file.exe 1420 gntuud.exe 908 msiexec.exe 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\linda5.exe" gntuud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe 1584 rundll32.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1420 1640 file.exe 28 PID 1640 wrote to memory of 1420 1640 file.exe 28 PID 1640 wrote to memory of 1420 1640 file.exe 28 PID 1640 wrote to memory of 1420 1640 file.exe 28 PID 1420 wrote to memory of 788 1420 gntuud.exe 29 PID 1420 wrote to memory of 788 1420 gntuud.exe 29 PID 1420 wrote to memory of 788 1420 gntuud.exe 29 PID 1420 wrote to memory of 788 1420 gntuud.exe 29 PID 1420 wrote to memory of 472 1420 gntuud.exe 31 PID 1420 wrote to memory of 472 1420 gntuud.exe 31 PID 1420 wrote to memory of 472 1420 gntuud.exe 31 PID 1420 wrote to memory of 472 1420 gntuud.exe 31 PID 472 wrote to memory of 1680 472 cmd.exe 33 PID 472 wrote to memory of 1680 472 cmd.exe 33 PID 472 wrote to memory of 1680 472 cmd.exe 33 PID 472 wrote to memory of 1680 472 cmd.exe 33 PID 472 wrote to memory of 336 472 cmd.exe 34 PID 472 wrote to memory of 336 472 cmd.exe 34 PID 472 wrote to memory of 336 472 cmd.exe 34 PID 472 wrote to memory of 336 472 cmd.exe 34 PID 472 wrote to memory of 668 472 cmd.exe 35 PID 472 wrote to memory of 668 472 cmd.exe 35 PID 472 wrote to memory of 668 472 cmd.exe 35 PID 472 wrote to memory of 668 472 cmd.exe 35 PID 472 wrote to memory of 1244 472 cmd.exe 36 PID 472 wrote to memory of 1244 472 cmd.exe 36 PID 472 wrote to memory of 1244 472 cmd.exe 36 PID 472 wrote to memory of 1244 472 cmd.exe 36 PID 472 wrote to memory of 540 472 cmd.exe 37 PID 472 wrote to memory of 540 472 cmd.exe 37 PID 472 wrote to memory of 540 472 cmd.exe 37 PID 472 wrote to memory of 540 472 cmd.exe 37 PID 472 wrote to memory of 876 472 cmd.exe 38 PID 472 wrote to memory of 876 472 cmd.exe 38 PID 472 wrote to memory of 876 472 cmd.exe 38 PID 472 wrote to memory of 876 472 cmd.exe 38 PID 1420 wrote to memory of 1752 1420 gntuud.exe 41 PID 1420 wrote to memory of 1752 1420 gntuud.exe 41 PID 1420 wrote to memory of 1752 1420 gntuud.exe 41 PID 1420 wrote to memory of 1752 1420 gntuud.exe 41 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 1752 wrote to memory of 908 1752 linda5.exe 42 PID 2016 wrote to memory of 1608 2016 taskeng.exe 44 PID 2016 wrote to memory of 1608 2016 taskeng.exe 44 PID 2016 wrote to memory of 1608 2016 taskeng.exe 44 PID 2016 wrote to memory of 1608 2016 taskeng.exe 44 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 1420 wrote to memory of 1584 1420 gntuud.exe 45 PID 2016 wrote to memory of 336 2016 taskeng.exe 46 PID 2016 wrote to memory of 336 2016 taskeng.exe 46 PID 2016 wrote to memory of 336 2016 taskeng.exe 46 PID 2016 wrote to memory of 336 2016 taskeng.exe 46 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\9c69749b54" /P "Admin:N"&&CACLS "..\9c69749b54" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵PID:336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵PID:668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9c69749b54" /P "Admin:N"4⤵PID:540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9c69749b54" /P "Admin:R" /E4⤵PID:876
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\linda5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /y .\JKXD.TK4⤵
- Loads dropped DLL
PID:908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\85f469ce401df1\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1584
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AFF1AE73-8908-4E36-881D-F07DED213F13} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe2⤵
- Executes dropped EXE
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exeC:\Users\Admin\AppData\Local\Temp\9c69749b54\gntuud.exe2⤵
- Executes dropped EXE
PID:336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD53a4e11c08616a3ff092252247319fc69
SHA15f2c09aee73a06de21712bc3c500cd79bac372ee
SHA2565a9cbf6ce9beaa771b9c59a76573c1954ebcdf02aa31ecf161081a27302eee4a
SHA5129c0b098190614c2896d43530551c3853dbfd9d7ad075c00840b046ad1effc87af556bdd1b84f1083da95171d98f787acdb3dd1a998043196bf1e6a36adb8efa0
-
Filesize
1.6MB
MD53a4e11c08616a3ff092252247319fc69
SHA15f2c09aee73a06de21712bc3c500cd79bac372ee
SHA2565a9cbf6ce9beaa771b9c59a76573c1954ebcdf02aa31ecf161081a27302eee4a
SHA5129c0b098190614c2896d43530551c3853dbfd9d7ad075c00840b046ad1effc87af556bdd1b84f1083da95171d98f787acdb3dd1a998043196bf1e6a36adb8efa0
-
Filesize
273KB
MD567d588981512c4db6508225a1d7b1644
SHA1baaa04249099b2faede5550e4410a82651f64d46
SHA25690ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
SHA512fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
Filesize
273KB
MD567d588981512c4db6508225a1d7b1644
SHA1baaa04249099b2faede5550e4410a82651f64d46
SHA25690ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
SHA512fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
Filesize
273KB
MD567d588981512c4db6508225a1d7b1644
SHA1baaa04249099b2faede5550e4410a82651f64d46
SHA25690ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
SHA512fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
Filesize
273KB
MD567d588981512c4db6508225a1d7b1644
SHA1baaa04249099b2faede5550e4410a82651f64d46
SHA25690ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
SHA512fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
Filesize
1.5MB
MD591f53769ce7683539c24dbee102808b1
SHA14a6e5916446476ec8e8aeab14cd9b8bae252f981
SHA2563e1a99a3db505aff6d1bd9e7d38016b0b5b8db4170b6e3c8b7876c9f67552ebe
SHA512e043c23ed30d3c0bf2fccda4ee4a8f5f5c58535b072c3f030e64e8bec851e3ce47b5af2cee5e3e33cc364bb80ca84e33cbfa47c49cd337920369734a0ec772a7
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
1.6MB
MD53a4e11c08616a3ff092252247319fc69
SHA15f2c09aee73a06de21712bc3c500cd79bac372ee
SHA2565a9cbf6ce9beaa771b9c59a76573c1954ebcdf02aa31ecf161081a27302eee4a
SHA5129c0b098190614c2896d43530551c3853dbfd9d7ad075c00840b046ad1effc87af556bdd1b84f1083da95171d98f787acdb3dd1a998043196bf1e6a36adb8efa0
-
Filesize
273KB
MD567d588981512c4db6508225a1d7b1644
SHA1baaa04249099b2faede5550e4410a82651f64d46
SHA25690ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
SHA512fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
Filesize
273KB
MD567d588981512c4db6508225a1d7b1644
SHA1baaa04249099b2faede5550e4410a82651f64d46
SHA25690ef4449f93dcfbec1e10bd8495f39a241cec7e98a4595c4e94dfc0b490dc334
SHA512fa9e721f52355e5e74aeb363a21dd9f1baac7877488bd724940c607aba8dac621d311edc5db4032cec9a7261e8ef0b55fff6f3ae6511ba1c56f60b82826ccb7b
-
Filesize
1.5MB
MD591f53769ce7683539c24dbee102808b1
SHA14a6e5916446476ec8e8aeab14cd9b8bae252f981
SHA2563e1a99a3db505aff6d1bd9e7d38016b0b5b8db4170b6e3c8b7876c9f67552ebe
SHA512e043c23ed30d3c0bf2fccda4ee4a8f5f5c58535b072c3f030e64e8bec851e3ce47b5af2cee5e3e33cc364bb80ca84e33cbfa47c49cd337920369734a0ec772a7
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9
-
Filesize
126KB
MD5c0fd0167e213b6148333351bd16ed1fb
SHA11cfb2b42686557656dead53e02d1db3f2a848026
SHA256c7d804e8fb096769b0e199102bdf8efa97dfae1a9b57a479819971146877368b
SHA512d514f35e62a5380b4ad96a3e0cddf82b53b1cf273e5ac542f040f30a75efd3c246fa2194e4bb273572cd2436a435a608e2b919f6df9fa4ebbf452b0d297b0cf9