Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:52

General

  • Target

    5029188d8e87c44a5ceb87a49fe133b9481e04894197cb1e308d1269871c84d4.exe

  • Size

    941KB

  • MD5

    057bb0a912ca5100b3832a955e79518b

  • SHA1

    6a43ef1621215b9b26aa86db3f5877bebf7cf7d7

  • SHA256

    5029188d8e87c44a5ceb87a49fe133b9481e04894197cb1e308d1269871c84d4

  • SHA512

    93f6dd51a751851d1038127be11a6ed2b2f16116a904cd3f5c1cbf50d318b24c97205cbfdda0000156dfd6b64589eb08ec84d8581cd8b6cb2429a3e92514e619

  • SSDEEP

    12288:Ry90JBURIyoSLa4uSlkZi+xRDAwLiwewhZNZVp3H1arIHoVCaWNxFi13bQKAA+gh:RyOURGuLuOV1abPl0wzRxFi13bQP6h

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5029188d8e87c44a5ceb87a49fe133b9481e04894197cb1e308d1269871c84d4.exe
    "C:\Users\Admin\AppData\Local\Temp\5029188d8e87c44a5ceb87a49fe133b9481e04894197cb1e308d1269871c84d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za899703.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za899703.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za873880.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za873880.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\81824681.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\81824681.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w36Pq00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w36Pq00.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 1080
            5⤵
            • Program crash
            PID:2164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPWGs36.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPWGs36.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3764
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4368
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys901714.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys901714.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4548
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3976 -ip 3976
    1⤵
      PID:752
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4512

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys901714.exe

      Filesize

      340KB

      MD5

      99b0d2d15e62590a7cecc8f543b39e06

      SHA1

      8a2c090dae11ca506ea13e74f51a8db196d54b07

      SHA256

      6b726a398fc97c5015db8e977e4fa8c4a48a6444a5093148891ea7cef4082380

      SHA512

      a2a032289fd6cc14c583b70bec5a88e757d510741a05575be3b0b89aa21b9398463c88e6c0472ebd44a10b39e64c98433ec7636f979b0e0a19e34bd8f99ec09c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys901714.exe

      Filesize

      340KB

      MD5

      99b0d2d15e62590a7cecc8f543b39e06

      SHA1

      8a2c090dae11ca506ea13e74f51a8db196d54b07

      SHA256

      6b726a398fc97c5015db8e977e4fa8c4a48a6444a5093148891ea7cef4082380

      SHA512

      a2a032289fd6cc14c583b70bec5a88e757d510741a05575be3b0b89aa21b9398463c88e6c0472ebd44a10b39e64c98433ec7636f979b0e0a19e34bd8f99ec09c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za899703.exe

      Filesize

      589KB

      MD5

      cb989cd773a2e0d6b84bacf4fc7bf410

      SHA1

      4248b315708fce9ebe4e22f66c5a23dd52c90362

      SHA256

      a0c060c3f6bc5dc20b6170db49a54714da2376f6ced901307588ca1fc50b9b75

      SHA512

      c2ef47e3f94f5c7a35593dff00223b7d6b00fb437b537a6c35c2d54a0f154cdfd32f6e4008e621ac0392af0a31a2e810cc198d1a9afd676b778929b7d2cc158f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za899703.exe

      Filesize

      589KB

      MD5

      cb989cd773a2e0d6b84bacf4fc7bf410

      SHA1

      4248b315708fce9ebe4e22f66c5a23dd52c90362

      SHA256

      a0c060c3f6bc5dc20b6170db49a54714da2376f6ced901307588ca1fc50b9b75

      SHA512

      c2ef47e3f94f5c7a35593dff00223b7d6b00fb437b537a6c35c2d54a0f154cdfd32f6e4008e621ac0392af0a31a2e810cc198d1a9afd676b778929b7d2cc158f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPWGs36.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPWGs36.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za873880.exe

      Filesize

      405KB

      MD5

      48b7a855541ee58a310745f82604b030

      SHA1

      f2bb6b76566708f31f0634e9bcfd4b335d504414

      SHA256

      d1e6d8f88db476238b84dcf2ab07fc286814de791c41bff6fd46ab993cb9d56b

      SHA512

      60036ae5104963d13f722777f76b5d29846ba2f03fb71c020e9ec44914a09148f561e65fe50d25e9ae640bb6313a0fb328272e0b2f6dbdc74674550909fd4a0a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za873880.exe

      Filesize

      405KB

      MD5

      48b7a855541ee58a310745f82604b030

      SHA1

      f2bb6b76566708f31f0634e9bcfd4b335d504414

      SHA256

      d1e6d8f88db476238b84dcf2ab07fc286814de791c41bff6fd46ab993cb9d56b

      SHA512

      60036ae5104963d13f722777f76b5d29846ba2f03fb71c020e9ec44914a09148f561e65fe50d25e9ae640bb6313a0fb328272e0b2f6dbdc74674550909fd4a0a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\81824681.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\81824681.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w36Pq00.exe

      Filesize

      258KB

      MD5

      ed522922cfbf9545862be10be23ba872

      SHA1

      0d39239297f5c1683aa5aaae013daa5b846f093b

      SHA256

      7228ff6740b761d50a3901090afd782df21956219956eb8c4c4b7863af1d98ba

      SHA512

      84219e98c194039f10d8261165f378262e258c7dd7fc69428b8b655a2687ff526ea8391e6292218441d8ea2230d9f1b3db7bd3567411fe409573c706361d252d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w36Pq00.exe

      Filesize

      258KB

      MD5

      ed522922cfbf9545862be10be23ba872

      SHA1

      0d39239297f5c1683aa5aaae013daa5b846f093b

      SHA256

      7228ff6740b761d50a3901090afd782df21956219956eb8c4c4b7863af1d98ba

      SHA512

      84219e98c194039f10d8261165f378262e258c7dd7fc69428b8b655a2687ff526ea8391e6292218441d8ea2230d9f1b3db7bd3567411fe409573c706361d252d

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      162B

      MD5

      1b7c22a214949975556626d7217e9a39

      SHA1

      d01c97e2944166ed23e47e4a62ff471ab8fa031f

      SHA256

      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

      SHA512

      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

    • memory/1896-165-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-171-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-173-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-175-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-179-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-177-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-181-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-183-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-184-0x0000000004A90000-0x0000000004AA0000-memory.dmp

      Filesize

      64KB

    • memory/1896-169-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-167-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-163-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-161-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-159-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-157-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-156-0x0000000005050000-0x0000000005063000-memory.dmp

      Filesize

      76KB

    • memory/1896-155-0x0000000004AA0000-0x0000000005044000-memory.dmp

      Filesize

      5.6MB

    • memory/1896-154-0x0000000004A90000-0x0000000004AA0000-memory.dmp

      Filesize

      64KB

    • memory/3976-219-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/3976-225-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/3976-226-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/3976-227-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/3976-218-0x0000000002DD0000-0x0000000002DFD000-memory.dmp

      Filesize

      180KB

    • memory/3976-220-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/3976-221-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/3976-222-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/3976-224-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/4548-1045-0x000000000A310000-0x000000000A322000-memory.dmp

      Filesize

      72KB

    • memory/4548-1051-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-378-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-1046-0x000000000A330000-0x000000000A43A000-memory.dmp

      Filesize

      1.0MB

    • memory/4548-1047-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-1048-0x000000000A480000-0x000000000A4BC000-memory.dmp

      Filesize

      240KB

    • memory/4548-1050-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-1044-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

      Filesize

      6.1MB

    • memory/4548-1052-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-1053-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-381-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-377-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4548-375-0x0000000002CF0000-0x0000000002D36000-memory.dmp

      Filesize

      280KB

    • memory/4548-249-0x0000000004D80000-0x0000000004DB5000-memory.dmp

      Filesize

      212KB

    • memory/4548-248-0x0000000004D80000-0x0000000004DB5000-memory.dmp

      Filesize

      212KB