Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/06/2023, 09:19

General

  • Target

    80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe

  • Size

    583KB

  • MD5

    772bb990f2c31f907080d1b9bd68e914

  • SHA1

    b605e7bf686c3b64ee5e942583c6b85cc28c45db

  • SHA256

    80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1

  • SHA512

    2d341857ea2456d96417c409f539ccd723d5ddcd6b5ab2299fb6221bdea968a5bb91052a861b688080cfbe0e639338a11843ef45070bbc7354fc9589e8a39cb1

  • SSDEEP

    12288:FMr1Gy90uUn4I8dkUPoV3fZGoeJQTVa10Q5Tb2PwkSPedibTO:uGyZQbYIcQZa1fT6PkPoibTO

Malware Config

Extracted

Family

redline

Botnet

dana

C2

83.97.73.130:19061

Attributes
  • auth_value

    da2d1691db653e49676d799e1eae2673

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe
    "C:\Users\Admin\AppData\Local\Temp\80b355093c7fccd8cea7283dd24069c300cdf79da21be01eb8fb3b0739d3eac1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6130092.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6130092.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609364.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609364.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1635046.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1635046.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6634670.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6634670.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0655373.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0655373.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4432
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4408
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3604
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:3360
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:4832
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2784
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:4100
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:2772
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4968
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5376245.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5376245.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3168
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:2752
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:5028

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5376245.exe

                Filesize

                267KB

                MD5

                e5f3651e9983835ee979dd7714d3bc7c

                SHA1

                7b1a18214f81ccc3bdc3985296278d9575f0c85f

                SHA256

                d9ab5e1be0994c88846d7383fa89e99d56ea08a4a23ed353e497c55966f5b2d3

                SHA512

                196d924b2f1d763e08da316d85588e751e9596f6718500b1fd8417e94f2738ca89998310ae71bdf282e7b6f0a41c300bacdb615681a4420b2d5b8ae523a71992

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5376245.exe

                Filesize

                267KB

                MD5

                e5f3651e9983835ee979dd7714d3bc7c

                SHA1

                7b1a18214f81ccc3bdc3985296278d9575f0c85f

                SHA256

                d9ab5e1be0994c88846d7383fa89e99d56ea08a4a23ed353e497c55966f5b2d3

                SHA512

                196d924b2f1d763e08da316d85588e751e9596f6718500b1fd8417e94f2738ca89998310ae71bdf282e7b6f0a41c300bacdb615681a4420b2d5b8ae523a71992

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6130092.exe

                Filesize

                377KB

                MD5

                17472448f0f8bdc8ffe0ba307ea0adc8

                SHA1

                f184457102c345cabeb5f2b72b028b9035a3391f

                SHA256

                c9466f76831d1ad6a907d3e1570437f5b6445ee4f93a6e9fdeeaef04148c9a9d

                SHA512

                624ec52b4524119d5e188cc5bb79c0fb7d4ab63f716d34c0fcb12be1d03787d6774c7a6882233b870a6e2879f0b42151740a3699414676b03294c7dd3bc2e14a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6130092.exe

                Filesize

                377KB

                MD5

                17472448f0f8bdc8ffe0ba307ea0adc8

                SHA1

                f184457102c345cabeb5f2b72b028b9035a3391f

                SHA256

                c9466f76831d1ad6a907d3e1570437f5b6445ee4f93a6e9fdeeaef04148c9a9d

                SHA512

                624ec52b4524119d5e188cc5bb79c0fb7d4ab63f716d34c0fcb12be1d03787d6774c7a6882233b870a6e2879f0b42151740a3699414676b03294c7dd3bc2e14a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0655373.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0655373.exe

                Filesize

                205KB

                MD5

                ea5fd86592cedb5d506c4301b20bab8d

                SHA1

                0b6e1b2b3b7495d41c7c68d6e784422e21bea171

                SHA256

                379cff758e57061da32851f5d1ec8c004c25e9eb791f05b5b0411488fabcb82f

                SHA512

                ed2926714a88ec565bb0563e30f8b68fbf89d37e2fd726be127b2619f02ecfee5a07a6f9f6888ebb1aefc81ffea7a4a237921305e6e1e1a96387d56ecbdff2aa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609364.exe

                Filesize

                206KB

                MD5

                d412e7c0b5f9f501591b25eb7128cfca

                SHA1

                32bb10f0501cd74f3f91f7d75bdec3a1bb105d74

                SHA256

                3ba68505b7871d0d1e184b5cf32c0f5ba4c212fd8838d4dce109bff281a7e126

                SHA512

                f948ab11ad760cfc7bd3a210d45bcf7c6275a5bdfcd2e35657366fa00fcc5fa374bef7f50c4ecf1d6fb5ebbff417de778008fe1fefc6dd257a402e2b38b8d974

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609364.exe

                Filesize

                206KB

                MD5

                d412e7c0b5f9f501591b25eb7128cfca

                SHA1

                32bb10f0501cd74f3f91f7d75bdec3a1bb105d74

                SHA256

                3ba68505b7871d0d1e184b5cf32c0f5ba4c212fd8838d4dce109bff281a7e126

                SHA512

                f948ab11ad760cfc7bd3a210d45bcf7c6275a5bdfcd2e35657366fa00fcc5fa374bef7f50c4ecf1d6fb5ebbff417de778008fe1fefc6dd257a402e2b38b8d974

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1635046.exe

                Filesize

                173KB

                MD5

                98bc69e08cf1909cdd060981dbfb3231

                SHA1

                12f882571a1dacdf99a90fe3248f96db0f9a4cd2

                SHA256

                afe933376246345e22672951efb48705658a3a5e8d4e27ff36359152fe569fc3

                SHA512

                7e110b525453a355d29ac1cc8c843e7a9492d35a65f072a0de0bd0ba75e1105b99abd1b7878d5562ecd4c6f7025f0cc094bd9851e96820e421f05f24e733194b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1635046.exe

                Filesize

                173KB

                MD5

                98bc69e08cf1909cdd060981dbfb3231

                SHA1

                12f882571a1dacdf99a90fe3248f96db0f9a4cd2

                SHA256

                afe933376246345e22672951efb48705658a3a5e8d4e27ff36359152fe569fc3

                SHA512

                7e110b525453a355d29ac1cc8c843e7a9492d35a65f072a0de0bd0ba75e1105b99abd1b7878d5562ecd4c6f7025f0cc094bd9851e96820e421f05f24e733194b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6634670.exe

                Filesize

                11KB

                MD5

                85872877fef37e8c1544b32fc1cbe1ec

                SHA1

                b89f7ed8c926b2b968c34a2aa767634be66ece21

                SHA256

                ca85cf2f5370b634028cfee3e121a5c2453b78f513a0e4198362286d85eb5a66

                SHA512

                8fd87863c4c04b65b6a50eb8c8a0420140ad2c05b02924f85df9f0bb2a360ee44fe8d1b1841f4e6b16e86b5a9de722f7eba74800082973b720a46e98c4005622

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6634670.exe

                Filesize

                11KB

                MD5

                85872877fef37e8c1544b32fc1cbe1ec

                SHA1

                b89f7ed8c926b2b968c34a2aa767634be66ece21

                SHA256

                ca85cf2f5370b634028cfee3e121a5c2453b78f513a0e4198362286d85eb5a66

                SHA512

                8fd87863c4c04b65b6a50eb8c8a0420140ad2c05b02924f85df9f0bb2a360ee44fe8d1b1841f4e6b16e86b5a9de722f7eba74800082973b720a46e98c4005622

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • memory/1484-158-0x0000000000330000-0x000000000033A000-memory.dmp

                Filesize

                40KB

              • memory/3168-173-0x00000000001D0000-0x0000000000200000-memory.dmp

                Filesize

                192KB

              • memory/3168-177-0x00000000021B0000-0x00000000021B6000-memory.dmp

                Filesize

                24KB

              • memory/3168-178-0x0000000005270000-0x00000000052BB000-memory.dmp

                Filesize

                300KB

              • memory/3168-179-0x0000000004950000-0x0000000004960000-memory.dmp

                Filesize

                64KB

              • memory/4468-142-0x0000000004660000-0x0000000004672000-memory.dmp

                Filesize

                72KB

              • memory/4468-153-0x0000000005FD0000-0x0000000006020000-memory.dmp

                Filesize

                320KB

              • memory/4468-152-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                Filesize

                64KB

              • memory/4468-151-0x0000000008080000-0x00000000085AC000-memory.dmp

                Filesize

                5.2MB

              • memory/4468-150-0x0000000006100000-0x00000000062C2000-memory.dmp

                Filesize

                1.8MB

              • memory/4468-149-0x0000000006330000-0x000000000682E000-memory.dmp

                Filesize

                5.0MB

              • memory/4468-148-0x0000000004F20000-0x0000000004F86000-memory.dmp

                Filesize

                408KB

              • memory/4468-147-0x00000000050C0000-0x0000000005152000-memory.dmp

                Filesize

                584KB

              • memory/4468-146-0x0000000004FA0000-0x0000000005016000-memory.dmp

                Filesize

                472KB

              • memory/4468-145-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                Filesize

                64KB

              • memory/4468-144-0x0000000004B50000-0x0000000004B9B000-memory.dmp

                Filesize

                300KB

              • memory/4468-143-0x0000000004B10000-0x0000000004B4E000-memory.dmp

                Filesize

                248KB

              • memory/4468-141-0x0000000004E10000-0x0000000004F1A000-memory.dmp

                Filesize

                1.0MB

              • memory/4468-140-0x0000000005310000-0x0000000005916000-memory.dmp

                Filesize

                6.0MB

              • memory/4468-139-0x0000000000B60000-0x0000000000B66000-memory.dmp

                Filesize

                24KB

              • memory/4468-138-0x00000000002A0000-0x00000000002D0000-memory.dmp

                Filesize

                192KB