Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 19:48
Behavioral task
behavioral1
Sample
0x0003000000000731-203.exe
Resource
win7-20230220-en
General
-
Target
0x0003000000000731-203.exe
-
Size
206KB
-
MD5
116ba99c9cce91cee7d3b878c8f4ae87
-
SHA1
16cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
-
SHA256
94e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
-
SHA512
a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
SSDEEP
3072:WpxiMVc/oooAUNfLp1zuNW3KG7uON8wAuZA+6jbe83xfbq5kmh:siMV5oofVu432OiuZAlXjq
Malware Config
Extracted
amadey
3.81
95.214.27.98/cronus/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 0x0003000000000731-203.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation legends.exe -
Executes dropped EXE 3 IoCs
pid Process 1104 legends.exe 5024 legends.exe 3988 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1064 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4980 0x0003000000000731-203.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4980 wrote to memory of 1104 4980 0x0003000000000731-203.exe 83 PID 4980 wrote to memory of 1104 4980 0x0003000000000731-203.exe 83 PID 4980 wrote to memory of 1104 4980 0x0003000000000731-203.exe 83 PID 1104 wrote to memory of 1064 1104 legends.exe 84 PID 1104 wrote to memory of 1064 1104 legends.exe 84 PID 1104 wrote to memory of 1064 1104 legends.exe 84 PID 1104 wrote to memory of 2064 1104 legends.exe 86 PID 1104 wrote to memory of 2064 1104 legends.exe 86 PID 1104 wrote to memory of 2064 1104 legends.exe 86 PID 2064 wrote to memory of 1684 2064 cmd.exe 88 PID 2064 wrote to memory of 1684 2064 cmd.exe 88 PID 2064 wrote to memory of 1684 2064 cmd.exe 88 PID 2064 wrote to memory of 3612 2064 cmd.exe 89 PID 2064 wrote to memory of 3612 2064 cmd.exe 89 PID 2064 wrote to memory of 3612 2064 cmd.exe 89 PID 2064 wrote to memory of 1156 2064 cmd.exe 90 PID 2064 wrote to memory of 1156 2064 cmd.exe 90 PID 2064 wrote to memory of 1156 2064 cmd.exe 90 PID 2064 wrote to memory of 4912 2064 cmd.exe 91 PID 2064 wrote to memory of 4912 2064 cmd.exe 91 PID 2064 wrote to memory of 4912 2064 cmd.exe 91 PID 2064 wrote to memory of 1724 2064 cmd.exe 92 PID 2064 wrote to memory of 1724 2064 cmd.exe 92 PID 2064 wrote to memory of 1724 2064 cmd.exe 92 PID 2064 wrote to memory of 3308 2064 cmd.exe 93 PID 2064 wrote to memory of 3308 2064 cmd.exe 93 PID 2064 wrote to memory of 3308 2064 cmd.exe 93 PID 1104 wrote to memory of 2136 1104 legends.exe 102 PID 1104 wrote to memory of 2136 1104 legends.exe 102 PID 1104 wrote to memory of 2136 1104 legends.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-203.exe"C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-203.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F3⤵
- Creates scheduled task(s)
PID:1064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"4⤵PID:3612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E4⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"4⤵PID:1724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E4⤵PID:3308
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
PID:5024
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
PID:3988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5