Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/02/2023, 07:04

General

  • Target

    687e0533b04edaedd054b0563d6a2393fbd781824f5c464f616f1d6b942618c1.exe

  • Size

    633KB

  • MD5

    4fe10b9a65172625b605aaecb88345b7

  • SHA1

    41334080dbd88d9ef8ace07a76d2e36bddb7e391

  • SHA256

    687e0533b04edaedd054b0563d6a2393fbd781824f5c464f616f1d6b942618c1

  • SHA512

    18fcb7b0fef828e028be1734a3ec0f92313f46cfa575d04f5c37d1803fa23ae6ce5e433a57f5b7ff6a04526361bd694b1150c45894c3c6961a208e8f0c76cabb

  • SSDEEP

    12288:7MrMy90WdcSJxnmU0vSqLmN5/uUGu+437msedIrLX0HjRjI:DyvxmUgyHhG343kdoYD2

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\687e0533b04edaedd054b0563d6a2393fbd781824f5c464f616f1d6b942618c1.exe
    "C:\Users\Admin\AppData\Local\Temp\687e0533b04edaedd054b0563d6a2393fbd781824f5c464f616f1d6b942618c1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rocku.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rocku.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ayvz.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ayvz.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 1388
          4⤵
          • Program crash
          PID:3888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
        "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3412
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1004
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "mnolyk.exe" /P "Admin:N"
              5⤵
                PID:4000
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "mnolyk.exe" /P "Admin:R" /E
                5⤵
                  PID:4088
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3204
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5eb6b96734" /P "Admin:N"
                    5⤵
                      PID:4224
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5eb6b96734" /P "Admin:R" /E
                      5⤵
                        PID:3372
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:1644
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1688 -ip 1688
                1⤵
                  PID:3232
                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:448
                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4852

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  fde8915d251fada3a37530421eb29dcf

                  SHA1

                  44386a8947ddfab993409945dae05a772a13e047

                  SHA256

                  6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                  SHA512

                  ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  fde8915d251fada3a37530421eb29dcf

                  SHA1

                  44386a8947ddfab993409945dae05a772a13e047

                  SHA256

                  6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                  SHA512

                  ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  fde8915d251fada3a37530421eb29dcf

                  SHA1

                  44386a8947ddfab993409945dae05a772a13e047

                  SHA256

                  6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                  SHA512

                  ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  fde8915d251fada3a37530421eb29dcf

                  SHA1

                  44386a8947ddfab993409945dae05a772a13e047

                  SHA256

                  6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                  SHA512

                  ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rocku.exe

                  Filesize

                  445KB

                  MD5

                  eae5a25e333eb96a9ccf89bd75f6e4ec

                  SHA1

                  1ccab4ae4c151cee4a956538e3bf9b8e8255c5d9

                  SHA256

                  f506165e9161b60698369c88cca60ef65cf7a07aeb33d5f96e3824e775fe4eb5

                  SHA512

                  61dedb2adf90fe4e86b8994e6798067288fd5e9c996b94ad9e19e5ca51182e92e8baf8f937864846b4ce552416a627ae52d0d32f2cf571ca1c1e622053904010

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rocku.exe

                  Filesize

                  445KB

                  MD5

                  eae5a25e333eb96a9ccf89bd75f6e4ec

                  SHA1

                  1ccab4ae4c151cee4a956538e3bf9b8e8255c5d9

                  SHA256

                  f506165e9161b60698369c88cca60ef65cf7a07aeb33d5f96e3824e775fe4eb5

                  SHA512

                  61dedb2adf90fe4e86b8994e6798067288fd5e9c996b94ad9e19e5ca51182e92e8baf8f937864846b4ce552416a627ae52d0d32f2cf571ca1c1e622053904010

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe

                  Filesize

                  236KB

                  MD5

                  fde8915d251fada3a37530421eb29dcf

                  SHA1

                  44386a8947ddfab993409945dae05a772a13e047

                  SHA256

                  6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                  SHA512

                  ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe

                  Filesize

                  236KB

                  MD5

                  fde8915d251fada3a37530421eb29dcf

                  SHA1

                  44386a8947ddfab993409945dae05a772a13e047

                  SHA256

                  6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                  SHA512

                  ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ayvz.exe

                  Filesize

                  405KB

                  MD5

                  c9c91acc3e6618593907c630d5c51999

                  SHA1

                  6901a733413f460e07e6739e1c2f3d254455436a

                  SHA256

                  b4a71d8d5546fd62864ecfbc015089a6aa00617bfc2ba1e957fe54aa90d5926c

                  SHA512

                  8d36248bba676177585cd7ef6c7f198e75fcc5355c0959b00a87fa1ce15232648a296eca1ac4f9e9b7ec6a085ada08b10241e4bc6f1b5e8c8a8f99b25714e012

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ayvz.exe

                  Filesize

                  405KB

                  MD5

                  c9c91acc3e6618593907c630d5c51999

                  SHA1

                  6901a733413f460e07e6739e1c2f3d254455436a

                  SHA256

                  b4a71d8d5546fd62864ecfbc015089a6aa00617bfc2ba1e957fe54aa90d5926c

                  SHA512

                  8d36248bba676177585cd7ef6c7f198e75fcc5355c0959b00a87fa1ce15232648a296eca1ac4f9e9b7ec6a085ada08b10241e4bc6f1b5e8c8a8f99b25714e012

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  9221a421a3e777eb7d4ce55e474bcc4a

                  SHA1

                  c96d7bd7ccbf9352d50527bff472595b3dc5298e

                  SHA256

                  10ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8

                  SHA512

                  63ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  9221a421a3e777eb7d4ce55e474bcc4a

                  SHA1

                  c96d7bd7ccbf9352d50527bff472595b3dc5298e

                  SHA256

                  10ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8

                  SHA512

                  63ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3

                • memory/1368-158-0x00007FF9C6020000-0x00007FF9C6AE1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1368-157-0x00007FF9C6020000-0x00007FF9C6AE1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1368-156-0x0000000000930000-0x000000000093A000-memory.dmp

                  Filesize

                  40KB

                • memory/1688-143-0x00000000058D0000-0x00000000059DA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1688-147-0x0000000006100000-0x0000000006166000-memory.dmp

                  Filesize

                  408KB

                • memory/1688-151-0x00000000082D0000-0x0000000008320000-memory.dmp

                  Filesize

                  320KB

                • memory/1688-150-0x0000000008240000-0x00000000082B6000-memory.dmp

                  Filesize

                  472KB

                • memory/1688-149-0x0000000007C60000-0x000000000818C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1688-148-0x0000000007A90000-0x0000000007C52000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1688-141-0x0000000000400000-0x0000000000480000-memory.dmp

                  Filesize

                  512KB

                • memory/1688-146-0x0000000006060000-0x00000000060F2000-memory.dmp

                  Filesize

                  584KB

                • memory/1688-145-0x00000000059E0000-0x0000000005A1C000-memory.dmp

                  Filesize

                  240KB

                • memory/1688-144-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

                  Filesize

                  72KB

                • memory/1688-138-0x0000000004D00000-0x00000000052A4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1688-139-0x00000000005A4000-0x00000000005D2000-memory.dmp

                  Filesize

                  184KB

                • memory/1688-152-0x0000000000400000-0x0000000000480000-memory.dmp

                  Filesize

                  512KB

                • memory/1688-142-0x00000000052B0000-0x00000000058C8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/1688-140-0x0000000002130000-0x000000000217B000-memory.dmp

                  Filesize

                  300KB