Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe
Resource
win10v2004-20220901-en
General
-
Target
c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe
-
Size
574KB
-
MD5
b0e5bea1ea56060bb9454b35000bc409
-
SHA1
2822231e4eaa6d194361489a26df5f5a05e81242
-
SHA256
c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a
-
SHA512
dd7dff4e84c060d67bfd4a7ef7a0f1dd4fc2fa0022e8cc62073ceaf491514677ba457151e639d1eca62fa361734acaf3a1e31ac014b3ee0d2e2018a283b586c9
-
SSDEEP
12288:BMrhy90OEgCLyxHR4OMBtO/0ltHFz9N0n/tXMeTeMA:4yGgM+HqRCslrH0n/NMTMA
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" nika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" nika.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation xriv.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 7 IoCs
pid Process 4584 bgbg.exe 3496 agbf.exe 3816 nika.exe 3768 xriv.exe 4264 mnolyk.exe 1852 mnolyk.exe 904 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4100 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" nika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features agbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" agbf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bgbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bgbg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4580 3496 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3496 agbf.exe 3496 agbf.exe 3816 nika.exe 3816 nika.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3496 agbf.exe Token: SeDebugPrivilege 3816 nika.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4584 4972 c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe 82 PID 4972 wrote to memory of 4584 4972 c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe 82 PID 4972 wrote to memory of 4584 4972 c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe 82 PID 4584 wrote to memory of 3496 4584 bgbg.exe 83 PID 4584 wrote to memory of 3496 4584 bgbg.exe 83 PID 4584 wrote to memory of 3496 4584 bgbg.exe 83 PID 4584 wrote to memory of 3816 4584 bgbg.exe 90 PID 4584 wrote to memory of 3816 4584 bgbg.exe 90 PID 4972 wrote to memory of 3768 4972 c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe 94 PID 4972 wrote to memory of 3768 4972 c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe 94 PID 4972 wrote to memory of 3768 4972 c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe 94 PID 3768 wrote to memory of 4264 3768 xriv.exe 96 PID 3768 wrote to memory of 4264 3768 xriv.exe 96 PID 3768 wrote to memory of 4264 3768 xriv.exe 96 PID 4264 wrote to memory of 1404 4264 mnolyk.exe 97 PID 4264 wrote to memory of 1404 4264 mnolyk.exe 97 PID 4264 wrote to memory of 1404 4264 mnolyk.exe 97 PID 4264 wrote to memory of 1420 4264 mnolyk.exe 99 PID 4264 wrote to memory of 1420 4264 mnolyk.exe 99 PID 4264 wrote to memory of 1420 4264 mnolyk.exe 99 PID 1420 wrote to memory of 4852 1420 cmd.exe 101 PID 1420 wrote to memory of 4852 1420 cmd.exe 101 PID 1420 wrote to memory of 4852 1420 cmd.exe 101 PID 1420 wrote to memory of 4328 1420 cmd.exe 102 PID 1420 wrote to memory of 4328 1420 cmd.exe 102 PID 1420 wrote to memory of 4328 1420 cmd.exe 102 PID 1420 wrote to memory of 4372 1420 cmd.exe 103 PID 1420 wrote to memory of 4372 1420 cmd.exe 103 PID 1420 wrote to memory of 4372 1420 cmd.exe 103 PID 1420 wrote to memory of 4608 1420 cmd.exe 104 PID 1420 wrote to memory of 4608 1420 cmd.exe 104 PID 1420 wrote to memory of 4608 1420 cmd.exe 104 PID 1420 wrote to memory of 2756 1420 cmd.exe 105 PID 1420 wrote to memory of 2756 1420 cmd.exe 105 PID 1420 wrote to memory of 2756 1420 cmd.exe 105 PID 1420 wrote to memory of 4612 1420 cmd.exe 106 PID 1420 wrote to memory of 4612 1420 cmd.exe 106 PID 1420 wrote to memory of 4612 1420 cmd.exe 106 PID 4264 wrote to memory of 4100 4264 mnolyk.exe 108 PID 4264 wrote to memory of 4100 4264 mnolyk.exe 108 PID 4264 wrote to memory of 4100 4264 mnolyk.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe"C:\Users\Admin\AppData\Local\Temp\c9f8d594f138d8e16774416b6c85b38471e0a97da6af0a4bf5010e842537ae3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bgbg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bgbg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\agbf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\agbf.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 10804⤵
- Program crash
PID:4580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:1404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:4328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"5⤵PID:2756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E5⤵PID:4612
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3496 -ip 34961⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
386KB
MD5a3814c635c11ca9ae303afa74e405a99
SHA1b15075d3379f02516a9718ea898f1b60641fee97
SHA256ba48723f8674969497b2673b2c7af6a3e937c76b39fc5da40c7275bd4a74f097
SHA512c871242de1e9799decc3abbfe88fd72ef53333e4a73eba309db4d198688e74a32940a0aa4d713990eee7599d3b609bda3af4f5ee74304713b9d0e0a99c16ad1a
-
Filesize
386KB
MD5a3814c635c11ca9ae303afa74e405a99
SHA1b15075d3379f02516a9718ea898f1b60641fee97
SHA256ba48723f8674969497b2673b2c7af6a3e937c76b39fc5da40c7275bd4a74f097
SHA512c871242de1e9799decc3abbfe88fd72ef53333e4a73eba309db4d198688e74a32940a0aa4d713990eee7599d3b609bda3af4f5ee74304713b9d0e0a99c16ad1a
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
363KB
MD501bc3df99ab67babcdc1577241e3ee87
SHA1c11c6465d4de6b6588b565c577a9eaad80d409d4
SHA256778bd7b213d42773deeb1df58089f30fc9310555a97a9654a90afb63208bbc9a
SHA512107ca576ed9599a079f9c2e90ede1f60313a59c0c46b99272665a5d8b56166dc7af422b9e8cd65c20fd7f878d03c64a06ed0af943b95967e92b8ccb4aabc6a95
-
Filesize
363KB
MD501bc3df99ab67babcdc1577241e3ee87
SHA1c11c6465d4de6b6588b565c577a9eaad80d409d4
SHA256778bd7b213d42773deeb1df58089f30fc9310555a97a9654a90afb63208bbc9a
SHA512107ca576ed9599a079f9c2e90ede1f60313a59c0c46b99272665a5d8b56166dc7af422b9e8cd65c20fd7f878d03c64a06ed0af943b95967e92b8ccb4aabc6a95
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba