Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/05/2023, 01:44

General

  • Target

    be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe

  • Size

    490KB

  • MD5

    315430d06269678ae273287171fa1840

  • SHA1

    9bae5247745f246777c702870496c73c09a40e4f

  • SHA256

    be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53

  • SHA512

    1359dd6009e7f4126495fa25663419d5e37d7e7d2f7189836500870b83b9168b12510804b9b4f4cd1170eb154461bdcf5b7bb17dc9e34d85bee973e08231c16c

  • SSDEEP

    12288:BMrEy90qR4x+ZUSJWGiToAc4qavCLQUMmNJoYk2:ZyBTZJneKramHM/Yb

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

217.196.96.101:4132

Attributes
  • auth_value

    8a3e8bc22f2496c7c5339eb332073902

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe
    "C:\Users\Admin\AppData\Local\Temp\be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3751002.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3751002.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2505389.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2505389.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6698265.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6698265.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6209321.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6209321.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4404
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3736
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3540
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:2728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6209321.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6209321.exe

    Filesize

    231KB

    MD5

    6e83cc85886ef7d70d01cf056b20a77f

    SHA1

    6327a7780feecb510112764c96fdc5cc4e3f49ff

    SHA256

    62da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64

    SHA512

    61adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3751002.exe

    Filesize

    307KB

    MD5

    d5ac6dd7379356c70f0447e8eacd0f15

    SHA1

    61697c88c618fc053c1d745f109aa86d0cc36dde

    SHA256

    1dca69fd27abfd511900acd0e1412bb88b9357fdfe3c4d3894031638d5d15c65

    SHA512

    f8365be8ed6d4267497e926387d051d271545eab0317f3079e21bcb3db9ca0af58e0b27c070037f132de675eb56b0cdca38726df00b640719099b68e6d9b6928

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3751002.exe

    Filesize

    307KB

    MD5

    d5ac6dd7379356c70f0447e8eacd0f15

    SHA1

    61697c88c618fc053c1d745f109aa86d0cc36dde

    SHA256

    1dca69fd27abfd511900acd0e1412bb88b9357fdfe3c4d3894031638d5d15c65

    SHA512

    f8365be8ed6d4267497e926387d051d271545eab0317f3079e21bcb3db9ca0af58e0b27c070037f132de675eb56b0cdca38726df00b640719099b68e6d9b6928

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2505389.exe

    Filesize

    180KB

    MD5

    5b12f1112f52005ce41d7b6f4b30a338

    SHA1

    bc3f8930009db6069a558bbe148e312f4bc832c6

    SHA256

    5072171406d138d2ab7ad916d6942015e7d4a283d223a0fc7bdde428c0e3b9ac

    SHA512

    2e9e5d3e65718ec6475c4a2479592f86ba102e5f5c12842e20fc5ae3d38aa006d99a5c1db606ca121eaee34549fb1358176b299dfcd9649caa8819932777c4a8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2505389.exe

    Filesize

    180KB

    MD5

    5b12f1112f52005ce41d7b6f4b30a338

    SHA1

    bc3f8930009db6069a558bbe148e312f4bc832c6

    SHA256

    5072171406d138d2ab7ad916d6942015e7d4a283d223a0fc7bdde428c0e3b9ac

    SHA512

    2e9e5d3e65718ec6475c4a2479592f86ba102e5f5c12842e20fc5ae3d38aa006d99a5c1db606ca121eaee34549fb1358176b299dfcd9649caa8819932777c4a8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6698265.exe

    Filesize

    168KB

    MD5

    77cdcaabd4b85bcddbb86709286b32ad

    SHA1

    650ee94a877b5259e313324066e70295c427800b

    SHA256

    547b80e1414b329deb48e9281e5c38ec6e09d24cebdfb067828d955c4cf20dd4

    SHA512

    74eae74e556c054b4b3948100bcca4462cb9c89353419539dcaa88fd4bf932d378cbb6e8b2a908a3583ebeeef62e730e09ff578b8c97ddc3de23b37e364fc955

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6698265.exe

    Filesize

    168KB

    MD5

    77cdcaabd4b85bcddbb86709286b32ad

    SHA1

    650ee94a877b5259e313324066e70295c427800b

    SHA256

    547b80e1414b329deb48e9281e5c38ec6e09d24cebdfb067828d955c4cf20dd4

    SHA512

    74eae74e556c054b4b3948100bcca4462cb9c89353419539dcaa88fd4bf932d378cbb6e8b2a908a3583ebeeef62e730e09ff578b8c97ddc3de23b37e364fc955

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/1864-184-0x0000000007F80000-0x00000000084AC000-memory.dmp

    Filesize

    5.2MB

  • memory/1864-174-0x0000000005210000-0x0000000005816000-memory.dmp

    Filesize

    6.0MB

  • memory/1864-186-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/1864-185-0x0000000005E90000-0x0000000005EE0000-memory.dmp

    Filesize

    320KB

  • memory/1864-183-0x0000000005F00000-0x00000000060C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1864-182-0x00000000050A0000-0x0000000005106000-memory.dmp

    Filesize

    408KB

  • memory/1864-181-0x0000000005000000-0x0000000005092000-memory.dmp

    Filesize

    584KB

  • memory/1864-180-0x0000000004EE0000-0x0000000004F56000-memory.dmp

    Filesize

    472KB

  • memory/1864-179-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/1864-178-0x0000000004A80000-0x0000000004ACB000-memory.dmp

    Filesize

    300KB

  • memory/1864-177-0x0000000004C00000-0x0000000004C3E000-memory.dmp

    Filesize

    248KB

  • memory/1864-176-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/1864-175-0x0000000004D10000-0x0000000004E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/1864-172-0x0000000000250000-0x000000000027E000-memory.dmp

    Filesize

    184KB

  • memory/1864-173-0x0000000000A30000-0x0000000000A36000-memory.dmp

    Filesize

    24KB

  • memory/3940-167-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/3940-156-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-150-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-152-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-166-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/3940-165-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/3940-164-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-162-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-160-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-158-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-146-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-148-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-154-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-144-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-142-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-140-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-138-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-137-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3940-136-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/3940-135-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/3940-134-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/3940-133-0x0000000004920000-0x0000000004938000-memory.dmp

    Filesize

    96KB

  • memory/3940-132-0x0000000004A50000-0x0000000004F4E000-memory.dmp

    Filesize

    5.0MB

  • memory/3940-131-0x0000000002160000-0x000000000217A000-memory.dmp

    Filesize

    104KB