Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/06/2023, 06:05

General

  • Target

    73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe

  • Size

    577KB

  • MD5

    9f6a9d4b99a7da968c6f7b118b08c0b7

  • SHA1

    600ac74b54f2b6611ec806f442d7dd9faef3f747

  • SHA256

    73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a

  • SHA512

    e5e5e3098f713b09944910ac315476120a0eae4e7aa0fb866ff38c7f2a66e7fbf7f16d487113c8aa8804603a4d6c280abbdcb30b2d58003ca26aea040a63129b

  • SSDEEP

    12288:bMrUy90doKMNzXA0yDnhVi8YNrTX/0PPOO93oc4bmIqZ:XyQm6n8PX/0x31sqZ

Malware Config

Extracted

Family

redline

Botnet

dana

C2

83.97.73.130:19061

Attributes
  • auth_value

    da2d1691db653e49676d799e1eae2673

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe
    "C:\Users\Admin\AppData\Local\Temp\73cee4a347d8876ff8d0447d33f8b7c4ae442da2661e85215c7e430bed9ddc0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8382874.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8382874.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4537242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4537242.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9730974.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9730974.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9096022.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9096022.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0157674.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0157674.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4204
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4404
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3556
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4316
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:4784
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:2468
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\200f691d32" /P "Admin:N"
                    6⤵
                      PID:2104
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:2476
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:3616
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3852
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2432763.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2432763.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4696
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:3396
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:4892

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2432763.exe

                Filesize

                255KB

                MD5

                2f9b84aa1611bacf2e4922f96ce75677

                SHA1

                59a66bd038b4b46eaf7ddbedf780b263f8b71030

                SHA256

                79f1db4d65ed73583e50d18e475bbd7e0c42dd56a75b56c2a7df2635e762a9c1

                SHA512

                1338e4d22c9d8fd9ea4a518dcda4691325744871ab28a97b50857b8687461ffb336eb83a3cc75a4a19ea6030fbc253aad8ad30fdfb9e7936ce6d3411491b544c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2432763.exe

                Filesize

                255KB

                MD5

                2f9b84aa1611bacf2e4922f96ce75677

                SHA1

                59a66bd038b4b46eaf7ddbedf780b263f8b71030

                SHA256

                79f1db4d65ed73583e50d18e475bbd7e0c42dd56a75b56c2a7df2635e762a9c1

                SHA512

                1338e4d22c9d8fd9ea4a518dcda4691325744871ab28a97b50857b8687461ffb336eb83a3cc75a4a19ea6030fbc253aad8ad30fdfb9e7936ce6d3411491b544c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8382874.exe

                Filesize

                377KB

                MD5

                a80d31451068c677c8eb9a845087f6e2

                SHA1

                aedea096319cae946c37b84ed44f1bce4e2d01bd

                SHA256

                45a73d25069fc5d4468a2ed75f4adc8b25c9363a824735b457943bc8304e5959

                SHA512

                a2d509fba7aa8ff19b57aefa880b0a778edf3d09eccb72c88888ad81aa6ef3131afea17d47593eb686453d3fd340ea39550e69609f44ced654be5c039a407393

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8382874.exe

                Filesize

                377KB

                MD5

                a80d31451068c677c8eb9a845087f6e2

                SHA1

                aedea096319cae946c37b84ed44f1bce4e2d01bd

                SHA256

                45a73d25069fc5d4468a2ed75f4adc8b25c9363a824735b457943bc8304e5959

                SHA512

                a2d509fba7aa8ff19b57aefa880b0a778edf3d09eccb72c88888ad81aa6ef3131afea17d47593eb686453d3fd340ea39550e69609f44ced654be5c039a407393

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0157674.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0157674.exe

                Filesize

                205KB

                MD5

                22dabb4d161985b272cd96785f15c8ef

                SHA1

                23a1a5bf108e721d5d8dcd7d6688d10a2574367f

                SHA256

                407a4764a00914c1c47419d0101ce801295f9be5f48354fb661ac75f2d366a5f

                SHA512

                75e744250fb311b47b060d90d631a2d81eebc70727e4ded83823170e9e6e61a03fd91902e540337ca6fc6e303f84e1a0e0a9915b3dbfe504e77149f75ee8c976

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4537242.exe

                Filesize

                206KB

                MD5

                710c7c0a6e0ae4885a5ea3191e1cdd17

                SHA1

                ba9963ccd7282aa4093e204e935227c8f2415452

                SHA256

                6a576fa060026dade30efcb409eb12a4eec94fe73fff72aa3d9f383c96f00a04

                SHA512

                7025eb8f30998b91c8426f65df3d170c259626ad754142e02e1797e74124b4a503a185bb8f5d6a4ca6d230c4351ecf0f7e3ea6adca9f1bd0ab0430221455dcc3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4537242.exe

                Filesize

                206KB

                MD5

                710c7c0a6e0ae4885a5ea3191e1cdd17

                SHA1

                ba9963ccd7282aa4093e204e935227c8f2415452

                SHA256

                6a576fa060026dade30efcb409eb12a4eec94fe73fff72aa3d9f383c96f00a04

                SHA512

                7025eb8f30998b91c8426f65df3d170c259626ad754142e02e1797e74124b4a503a185bb8f5d6a4ca6d230c4351ecf0f7e3ea6adca9f1bd0ab0430221455dcc3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9730974.exe

                Filesize

                173KB

                MD5

                58648e9695539cdcfc59df1b919454bd

                SHA1

                fa0bdaa45205e93b0bfead521c81c8d8146f491a

                SHA256

                b854c6aa63a373eeea7556e2a5bf8896b2217d45caf03da4e02e3c97905a61e8

                SHA512

                9bae031ff883357ac25b2f012505bf7f50307e7b5d148f138e4170b66648962dc34ea18ef3c75cc8611add056cca5afbd2a3b310c96a5f1bf49ac3416e73ab7f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9730974.exe

                Filesize

                173KB

                MD5

                58648e9695539cdcfc59df1b919454bd

                SHA1

                fa0bdaa45205e93b0bfead521c81c8d8146f491a

                SHA256

                b854c6aa63a373eeea7556e2a5bf8896b2217d45caf03da4e02e3c97905a61e8

                SHA512

                9bae031ff883357ac25b2f012505bf7f50307e7b5d148f138e4170b66648962dc34ea18ef3c75cc8611add056cca5afbd2a3b310c96a5f1bf49ac3416e73ab7f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9096022.exe

                Filesize

                11KB

                MD5

                bbd440498315e029d0707a934d76cb98

                SHA1

                36503d21cccc67be0c8143f51d066f7c0d9ad3b0

                SHA256

                5256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3

                SHA512

                5d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9096022.exe

                Filesize

                11KB

                MD5

                bbd440498315e029d0707a934d76cb98

                SHA1

                36503d21cccc67be0c8143f51d066f7c0d9ad3b0

                SHA256

                5256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3

                SHA512

                5d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • memory/1368-158-0x0000000000820000-0x000000000082A000-memory.dmp

                Filesize

                40KB

              • memory/2092-142-0x00000000054E0000-0x00000000054F2000-memory.dmp

                Filesize

                72KB

              • memory/2092-145-0x0000000005540000-0x000000000558B000-memory.dmp

                Filesize

                300KB

              • memory/2092-152-0x00000000053D0000-0x00000000053E0000-memory.dmp

                Filesize

                64KB

              • memory/2092-151-0x0000000008D90000-0x00000000092BC000-memory.dmp

                Filesize

                5.2MB

              • memory/2092-150-0x00000000069E0000-0x0000000006BA2000-memory.dmp

                Filesize

                1.8MB

              • memory/2092-149-0x0000000006C10000-0x000000000710E000-memory.dmp

                Filesize

                5.0MB

              • memory/2092-148-0x00000000058D0000-0x0000000005936000-memory.dmp

                Filesize

                408KB

              • memory/2092-147-0x0000000005970000-0x0000000005A02000-memory.dmp

                Filesize

                584KB

              • memory/2092-146-0x0000000005850000-0x00000000058C6000-memory.dmp

                Filesize

                472KB

              • memory/2092-153-0x0000000006900000-0x0000000006950000-memory.dmp

                Filesize

                320KB

              • memory/2092-138-0x0000000000BC0000-0x0000000000BF0000-memory.dmp

                Filesize

                192KB

              • memory/2092-139-0x0000000005370000-0x0000000005376000-memory.dmp

                Filesize

                24KB

              • memory/2092-140-0x0000000005AF0000-0x00000000060F6000-memory.dmp

                Filesize

                6.0MB

              • memory/2092-141-0x00000000055F0000-0x00000000056FA000-memory.dmp

                Filesize

                1.0MB

              • memory/2092-144-0x0000000005500000-0x000000000553E000-memory.dmp

                Filesize

                248KB

              • memory/2092-143-0x00000000053D0000-0x00000000053E0000-memory.dmp

                Filesize

                64KB

              • memory/4696-179-0x0000000004A10000-0x0000000004A20000-memory.dmp

                Filesize

                64KB

              • memory/4696-178-0x000000000A680000-0x000000000A6CB000-memory.dmp

                Filesize

                300KB

              • memory/4696-177-0x0000000002300000-0x0000000002306000-memory.dmp

                Filesize

                24KB

              • memory/4696-173-0x00000000001D0000-0x0000000000200000-memory.dmp

                Filesize

                192KB