Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2023, 06:04

General

  • Target

    97ee2d781edd8f7f0962c4e0971e22f1.exe

  • Size

    3.9MB

  • MD5

    97ee2d781edd8f7f0962c4e0971e22f1

  • SHA1

    76101d9fb77f2a982536f0f3cf861ef9cb5d7162

  • SHA256

    340b6e3ddd092332bc5ccf534cbed6908cd5d50b6fd5dced96d3bc1f153ecbb5

  • SHA512

    dcb2a1afc36c4c7f4063eb14c1aba4d467f184383df40fafd1b77572ee2126eecabb874fe4df83b3b4b23b3d076db9aedbf51e502f3ee574c9658a22ef24bc39

  • SSDEEP

    49152:lwvqFij7iSFBuP+gemoVTXgorHYHdaHgIcZwxUoqSL9ZvdP/PXpIMPcaHOYU/Pm3:4wzsVb5pAEvxxpJpIXaLU/Jg

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97ee2d781edd8f7f0962c4e0971e22f1.exe
    "C:\Users\Admin\AppData\Local\Temp\97ee2d781edd8f7f0962c4e0971e22f1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1340022.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1340022.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1500827.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1500827.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
        "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3580
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3660
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rugen.exe" /P "Admin:N"
              5⤵
                PID:4584
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:R" /E
                5⤵
                  PID:4284
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4752
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\200f691d32" /P "Admin:N"
                    5⤵
                      PID:1292
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:R" /E
                      5⤵
                        PID:820
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:412
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:1560
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:3516

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exe

                Filesize

                402KB

                MD5

                ea66ebb629dfdc5a17e9ba52c672d471

                SHA1

                bc086e6b7f884e4b4b11c59cef6a1dd3dff0fbcd

                SHA256

                813a18184d0e5c3af47d0b53d5038175f06325f361a854b7b8531f0b212888e3

                SHA512

                cfee867f8de6130f0d8b65d7fad4dd386743107891a4de87b4fe6b9f5498f618a7b373f91556d2fecda5c3dbf41131555486dab817e3ba65da87813f9f5b043c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exe

                Filesize

                402KB

                MD5

                ea66ebb629dfdc5a17e9ba52c672d471

                SHA1

                bc086e6b7f884e4b4b11c59cef6a1dd3dff0fbcd

                SHA256

                813a18184d0e5c3af47d0b53d5038175f06325f361a854b7b8531f0b212888e3

                SHA512

                cfee867f8de6130f0d8b65d7fad4dd386743107891a4de87b4fe6b9f5498f618a7b373f91556d2fecda5c3dbf41131555486dab817e3ba65da87813f9f5b043c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1340022.exe

                Filesize

                185KB

                MD5

                ca338b54586954a5dbe4bbe285836571

                SHA1

                f4bd3bd2f47ad2f36b774abac3e2a378c4c53604

                SHA256

                f5eefa3b9c8cc01a9ffaceb3583c45c2cb10dc9bcb584772533ada3b6a66ec6e

                SHA512

                03419618bcfca461a7c95638819645263659485d8149330e08cb16c50e45cf397f2030d8f8bf5a5ec2ccdb2d6653dce1609570ce88d318d3dd4b4cf551bc3b10

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1340022.exe

                Filesize

                185KB

                MD5

                ca338b54586954a5dbe4bbe285836571

                SHA1

                f4bd3bd2f47ad2f36b774abac3e2a378c4c53604

                SHA256

                f5eefa3b9c8cc01a9ffaceb3583c45c2cb10dc9bcb584772533ada3b6a66ec6e

                SHA512

                03419618bcfca461a7c95638819645263659485d8149330e08cb16c50e45cf397f2030d8f8bf5a5ec2ccdb2d6653dce1609570ce88d318d3dd4b4cf551bc3b10

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1500827.exe

                Filesize

                1.3MB

                MD5

                7d7506f9a5e142b81b7acb3e3765585c

                SHA1

                b8f388b4ae7f6c942302d17f0e746d1303b7c517

                SHA256

                ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1

                SHA512

                385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1500827.exe

                Filesize

                1.3MB

                MD5

                7d7506f9a5e142b81b7acb3e3765585c

                SHA1

                b8f388b4ae7f6c942302d17f0e746d1303b7c517

                SHA256

                ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1

                SHA512

                385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                04a943771990ab49147e63e8c2fbbed0

                SHA1

                a2bde564bef4f63749716621693a3cfb7bd4d55e

                SHA256

                587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e

                SHA512

                40e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d

              • memory/232-162-0x0000000000620000-0x0000000000650000-memory.dmp

                Filesize

                192KB

              • memory/232-168-0x000000000A6E0000-0x000000000A7EA000-memory.dmp

                Filesize

                1.0MB

              • memory/232-177-0x000000000B780000-0x000000000B942000-memory.dmp

                Filesize

                1.8MB

              • memory/232-178-0x000000000B960000-0x000000000BE8C000-memory.dmp

                Filesize

                5.2MB

              • memory/232-179-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/232-175-0x000000000B120000-0x000000000B186000-memory.dmp

                Filesize

                408KB

              • memory/232-174-0x000000000AA30000-0x000000000AFD4000-memory.dmp

                Filesize

                5.6MB

              • memory/232-173-0x000000000A990000-0x000000000AA22000-memory.dmp

                Filesize

                584KB

              • memory/232-172-0x000000000A910000-0x000000000A986000-memory.dmp

                Filesize

                472KB

              • memory/232-167-0x0000000009F20000-0x000000000A538000-memory.dmp

                Filesize

                6.1MB

              • memory/232-171-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/232-170-0x000000000A620000-0x000000000A65C000-memory.dmp

                Filesize

                240KB

              • memory/232-169-0x000000000A600000-0x000000000A612000-memory.dmp

                Filesize

                72KB

              • memory/232-176-0x000000000B610000-0x000000000B660000-memory.dmp

                Filesize

                320KB

              • memory/3808-153-0x00000000001F0000-0x00000000001FA000-memory.dmp

                Filesize

                40KB

              • memory/4968-194-0x00000000009F0000-0x0000000000A7F000-memory.dmp

                Filesize

                572KB

              • memory/4968-133-0x00000000009F0000-0x0000000000A7F000-memory.dmp

                Filesize

                572KB