Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
282s -
max time network
277s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/12/2022, 04:47
Behavioral task
behavioral1
Sample
4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe
Resource
win10-20220812-en
General
-
Target
4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe
-
Size
235KB
-
MD5
5e445faf7b08cf2ffcac7b38c5d70d5d
-
SHA1
877098531fb4049581a7c81353fc3c7d7dd2083a
-
SHA256
4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
-
SHA512
9874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
SSDEEP
6144:IkwjBO99g6779r0psUhmiIuVyD2NgCJgN:1TrOh2uVyCNnS
Malware Config
Extracted
amadey
3.63
62.204.41.91/8kcnjd3da3/index.php
Signatures
-
Detect Amadey credential stealer module 5 IoCs
resource yara_rule behavioral1/files/0x0008000000012302-66.dat amadey_cred_module behavioral1/files/0x0008000000012302-68.dat amadey_cred_module behavioral1/files/0x0008000000012302-70.dat amadey_cred_module behavioral1/files/0x0008000000012302-69.dat amadey_cred_module behavioral1/files/0x0008000000012302-67.dat amadey_cred_module -
Blocklisted process makes network request 1 IoCs
flow pid Process 20 1156 rundll32.exe -
Executes dropped EXE 6 IoCs
pid Process 1628 nbveek.exe 1728 nbveek.exe 1304 nbveek.exe 1416 nbveek.exe 1580 nbveek.exe 1880 nbveek.exe -
Loads dropped DLL 5 IoCs
pid Process 1916 4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe 1156 rundll32.exe 1156 rundll32.exe 1156 rundll32.exe 1156 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1156 rundll32.exe 1156 rundll32.exe 1156 rundll32.exe 1156 rundll32.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1628 1916 4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe 28 PID 1916 wrote to memory of 1628 1916 4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe 28 PID 1916 wrote to memory of 1628 1916 4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe 28 PID 1916 wrote to memory of 1628 1916 4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe 28 PID 1628 wrote to memory of 1528 1628 nbveek.exe 29 PID 1628 wrote to memory of 1528 1628 nbveek.exe 29 PID 1628 wrote to memory of 1528 1628 nbveek.exe 29 PID 1628 wrote to memory of 1528 1628 nbveek.exe 29 PID 932 wrote to memory of 1728 932 taskeng.exe 35 PID 932 wrote to memory of 1728 932 taskeng.exe 35 PID 932 wrote to memory of 1728 932 taskeng.exe 35 PID 932 wrote to memory of 1728 932 taskeng.exe 35 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 1628 wrote to memory of 1156 1628 nbveek.exe 36 PID 932 wrote to memory of 1304 932 taskeng.exe 37 PID 932 wrote to memory of 1304 932 taskeng.exe 37 PID 932 wrote to memory of 1304 932 taskeng.exe 37 PID 932 wrote to memory of 1304 932 taskeng.exe 37 PID 932 wrote to memory of 1416 932 taskeng.exe 38 PID 932 wrote to memory of 1416 932 taskeng.exe 38 PID 932 wrote to memory of 1416 932 taskeng.exe 38 PID 932 wrote to memory of 1416 932 taskeng.exe 38 PID 932 wrote to memory of 1580 932 taskeng.exe 39 PID 932 wrote to memory of 1580 932 taskeng.exe 39 PID 932 wrote to memory of 1580 932 taskeng.exe 39 PID 932 wrote to memory of 1580 932 taskeng.exe 39 PID 932 wrote to memory of 1880 932 taskeng.exe 40 PID 932 wrote to memory of 1880 932 taskeng.exe 40 PID 932 wrote to memory of 1880 932 taskeng.exe 40 PID 932 wrote to memory of 1880 932 taskeng.exe 40 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe"C:\Users\Admin\AppData\Local\Temp\4414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:1528
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1156
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0C780630-C74E-4E82-8913-7869D0C0532A} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe2⤵
- Executes dropped EXE
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe2⤵
- Executes dropped EXE
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe2⤵
- Executes dropped EXE
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exeC:\Users\Admin\AppData\Local\Temp\d003af69b2\nbveek.exe2⤵
- Executes dropped EXE
PID:1880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
126KB
MD54a9e02f2913522b55571d2644800e15b
SHA19167a2b50bd7357737cf3b06686260736c318f2a
SHA2564a48124561b1a5c5f3c80fc5f5a71d520dc6961f85c9162bd282b5acf4dd3ecc
SHA512844087e9980860ca957bcd6f7d51b9e26d603f61c4cd49d4bd7a33afe6f4f78baf1e483dcef775d908e6a12e43204874a011da44f9ff059edfb44ede541e562b
-
Filesize
235KB
MD55e445faf7b08cf2ffcac7b38c5d70d5d
SHA1877098531fb4049581a7c81353fc3c7d7dd2083a
SHA2564414a9ba25d52ac38509ccf072d32e4f938990e3b02ca3c2d11fbd5cba433ab4
SHA5129874b8605aafcf7bd46754c2aa0bfbd3e7c14ad0b0791b9d016d828666c4183bc9786390697d6aeaf17d13f1cf615b023c78cff20db35f508d525e15e1e3ae31
-
Filesize
126KB
MD54a9e02f2913522b55571d2644800e15b
SHA19167a2b50bd7357737cf3b06686260736c318f2a
SHA2564a48124561b1a5c5f3c80fc5f5a71d520dc6961f85c9162bd282b5acf4dd3ecc
SHA512844087e9980860ca957bcd6f7d51b9e26d603f61c4cd49d4bd7a33afe6f4f78baf1e483dcef775d908e6a12e43204874a011da44f9ff059edfb44ede541e562b
-
Filesize
126KB
MD54a9e02f2913522b55571d2644800e15b
SHA19167a2b50bd7357737cf3b06686260736c318f2a
SHA2564a48124561b1a5c5f3c80fc5f5a71d520dc6961f85c9162bd282b5acf4dd3ecc
SHA512844087e9980860ca957bcd6f7d51b9e26d603f61c4cd49d4bd7a33afe6f4f78baf1e483dcef775d908e6a12e43204874a011da44f9ff059edfb44ede541e562b
-
Filesize
126KB
MD54a9e02f2913522b55571d2644800e15b
SHA19167a2b50bd7357737cf3b06686260736c318f2a
SHA2564a48124561b1a5c5f3c80fc5f5a71d520dc6961f85c9162bd282b5acf4dd3ecc
SHA512844087e9980860ca957bcd6f7d51b9e26d603f61c4cd49d4bd7a33afe6f4f78baf1e483dcef775d908e6a12e43204874a011da44f9ff059edfb44ede541e562b
-
Filesize
126KB
MD54a9e02f2913522b55571d2644800e15b
SHA19167a2b50bd7357737cf3b06686260736c318f2a
SHA2564a48124561b1a5c5f3c80fc5f5a71d520dc6961f85c9162bd282b5acf4dd3ecc
SHA512844087e9980860ca957bcd6f7d51b9e26d603f61c4cd49d4bd7a33afe6f4f78baf1e483dcef775d908e6a12e43204874a011da44f9ff059edfb44ede541e562b