Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
7C5F0FB436E189AD3E8C2074F9F1CC24.exe
Resource
win7-20230705-en
General
-
Target
7C5F0FB436E189AD3E8C2074F9F1CC24.exe
-
Size
1.7MB
-
MD5
7c5f0fb436e189ad3e8c2074f9f1cc24
-
SHA1
1cc2189c2b8d5d8cfe1cbe520770ac523612b792
-
SHA256
a1c3aab7bc661fee2a1b3dea08f827e179d0991a58438efe8c464d22f9d73558
-
SHA512
74cb36646a665a4b6c3b040c8937251e2c30f169d1ae1c50e98430f87b035ad25d8f24292ce0aff09203fec00f2b93964c79eabd82da964acf02ba24cf554533
-
SSDEEP
12288:hsmqGF1MtAY8J0awXVF005vhTlqIKJh7x/iib25QPHUtd:hz/LpY8KawX0YvZsx/iib2Ew
Malware Config
Extracted
amadey
3.85
getupdate.click/8bmeVwqx/index.php
getupdate2.click /8bmeVwqx/index.php
getupdate3.click/8bmeVwqx/index.php
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 7C5F0FB436E189AD3E8C2074F9F1CC24.exe Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation jbruyer.exe -
Executes dropped EXE 1 IoCs
pid Process 432 jbruyer.exe -
Loads dropped DLL 9 IoCs
pid Process 5108 rundll32.exe 5080 rundll32.exe 2272 rundll32.exe 4084 rundll32.exe 4240 rundll32.exe 3756 rundll32.exe 4092 rundll32.exe 4880 rundll32.exe 624 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 220 3756 WerFault.exe 110 2512 4240 WerFault.exe 109 4692 4084 WerFault.exe 108 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1684 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 7C5F0FB436E189AD3E8C2074F9F1CC24.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2804 wrote to memory of 432 2804 7C5F0FB436E189AD3E8C2074F9F1CC24.exe 85 PID 2804 wrote to memory of 432 2804 7C5F0FB436E189AD3E8C2074F9F1CC24.exe 85 PID 2804 wrote to memory of 432 2804 7C5F0FB436E189AD3E8C2074F9F1CC24.exe 85 PID 432 wrote to memory of 1684 432 jbruyer.exe 86 PID 432 wrote to memory of 1684 432 jbruyer.exe 86 PID 432 wrote to memory of 1684 432 jbruyer.exe 86 PID 432 wrote to memory of 4144 432 jbruyer.exe 88 PID 432 wrote to memory of 4144 432 jbruyer.exe 88 PID 432 wrote to memory of 4144 432 jbruyer.exe 88 PID 4144 wrote to memory of 3352 4144 cmd.exe 90 PID 4144 wrote to memory of 3352 4144 cmd.exe 90 PID 4144 wrote to memory of 3352 4144 cmd.exe 90 PID 4144 wrote to memory of 2688 4144 cmd.exe 91 PID 4144 wrote to memory of 2688 4144 cmd.exe 91 PID 4144 wrote to memory of 2688 4144 cmd.exe 91 PID 4144 wrote to memory of 4640 4144 cmd.exe 92 PID 4144 wrote to memory of 4640 4144 cmd.exe 92 PID 4144 wrote to memory of 4640 4144 cmd.exe 92 PID 4144 wrote to memory of 1856 4144 cmd.exe 93 PID 4144 wrote to memory of 1856 4144 cmd.exe 93 PID 4144 wrote to memory of 1856 4144 cmd.exe 93 PID 4144 wrote to memory of 4324 4144 cmd.exe 94 PID 4144 wrote to memory of 4324 4144 cmd.exe 94 PID 4144 wrote to memory of 4324 4144 cmd.exe 94 PID 4144 wrote to memory of 416 4144 cmd.exe 95 PID 4144 wrote to memory of 416 4144 cmd.exe 95 PID 4144 wrote to memory of 416 4144 cmd.exe 95 PID 432 wrote to memory of 2272 432 jbruyer.exe 105 PID 432 wrote to memory of 2272 432 jbruyer.exe 105 PID 432 wrote to memory of 2272 432 jbruyer.exe 105 PID 432 wrote to memory of 5108 432 jbruyer.exe 106 PID 432 wrote to memory of 5108 432 jbruyer.exe 106 PID 432 wrote to memory of 5108 432 jbruyer.exe 106 PID 432 wrote to memory of 5080 432 jbruyer.exe 107 PID 432 wrote to memory of 5080 432 jbruyer.exe 107 PID 432 wrote to memory of 5080 432 jbruyer.exe 107 PID 5080 wrote to memory of 4084 5080 rundll32.exe 108 PID 5080 wrote to memory of 4084 5080 rundll32.exe 108 PID 5108 wrote to memory of 4240 5108 rundll32.exe 109 PID 5108 wrote to memory of 4240 5108 rundll32.exe 109 PID 2272 wrote to memory of 3756 2272 rundll32.exe 110 PID 2272 wrote to memory of 3756 2272 rundll32.exe 110 PID 432 wrote to memory of 4092 432 jbruyer.exe 112 PID 432 wrote to memory of 4092 432 jbruyer.exe 112 PID 432 wrote to memory of 4092 432 jbruyer.exe 112 PID 432 wrote to memory of 4880 432 jbruyer.exe 113 PID 432 wrote to memory of 4880 432 jbruyer.exe 113 PID 432 wrote to memory of 4880 432 jbruyer.exe 113 PID 432 wrote to memory of 624 432 jbruyer.exe 114 PID 432 wrote to memory of 624 432 jbruyer.exe 114 PID 432 wrote to memory of 624 432 jbruyer.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\7C5F0FB436E189AD3E8C2074F9F1CC24.exe"C:\Users\Admin\AppData\Local\Temp\7C5F0FB436E189AD3E8C2074F9F1CC24.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\572327b079\jbruyer.exe"C:\Users\Admin\AppData\Local\Temp\572327b079\jbruyer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN jbruyer.exe /TR "C:\Users\Admin\AppData\Local\Temp\572327b079\jbruyer.exe" /F3⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "jbruyer.exe" /P "Admin:N"&&CACLS "jbruyer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\572327b079" /P "Admin:N"&&CACLS "..\572327b079" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "jbruyer.exe" /P "Admin:N"4⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "jbruyer.exe" /P "Admin:R" /E4⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\572327b079" /P "Admin:N"4⤵PID:4324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\572327b079" /P "Admin:R" /E4⤵PID:416
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\cred64.dll, Main4⤵
- Loads dropped DLL
PID:3756 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3756 -s 6445⤵
- Program crash
PID:220
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4240 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4240 -s 6445⤵
- Program crash
PID:2512
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4084 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4084 -s 6445⤵
- Program crash
PID:4692
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4092
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4880
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f4303a44f01a77\clip64.dll, Main3⤵
- Loads dropped DLL
PID:624
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 436 -p 3756 -ip 37561⤵PID:448
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 4084 -ip 40841⤵PID:3644
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 492 -p 4240 -ip 42401⤵PID:2716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56639dd5d58635122eb44321bbe425aa9
SHA1b5844cfdb61756f38a8d3b803378da7519e5c090
SHA256561207abcbb8b3fbc08bbec6ddbe8af19a18ceffb865bfe063dbd60acb503383
SHA512a384a54c18fedbf3806279cb514a504ba638a13f6537c4e8dd5c39d0b6797cff52221f001306fedce0bd8a77378815ffbb4d982b44b3b721d34bbf3a5e5b2c12
-
Filesize
1.7MB
MD57c5f0fb436e189ad3e8c2074f9f1cc24
SHA11cc2189c2b8d5d8cfe1cbe520770ac523612b792
SHA256a1c3aab7bc661fee2a1b3dea08f827e179d0991a58438efe8c464d22f9d73558
SHA51274cb36646a665a4b6c3b040c8937251e2c30f169d1ae1c50e98430f87b035ad25d8f24292ce0aff09203fec00f2b93964c79eabd82da964acf02ba24cf554533
-
Filesize
1.7MB
MD57c5f0fb436e189ad3e8c2074f9f1cc24
SHA11cc2189c2b8d5d8cfe1cbe520770ac523612b792
SHA256a1c3aab7bc661fee2a1b3dea08f827e179d0991a58438efe8c464d22f9d73558
SHA51274cb36646a665a4b6c3b040c8937251e2c30f169d1ae1c50e98430f87b035ad25d8f24292ce0aff09203fec00f2b93964c79eabd82da964acf02ba24cf554533
-
Filesize
1.7MB
MD57c5f0fb436e189ad3e8c2074f9f1cc24
SHA11cc2189c2b8d5d8cfe1cbe520770ac523612b792
SHA256a1c3aab7bc661fee2a1b3dea08f827e179d0991a58438efe8c464d22f9d73558
SHA51274cb36646a665a4b6c3b040c8937251e2c30f169d1ae1c50e98430f87b035ad25d8f24292ce0aff09203fec00f2b93964c79eabd82da964acf02ba24cf554533
-
Filesize
89KB
MD5da32ba5704b945ff08dc50e17ce1bb5c
SHA12d8c567b3918069a58b58d37d3c604be6506011a
SHA2564d1d9f05d39658ddb56ad061ffaf6a5e831b37d10507a548a170113bc81a4ad3
SHA512965695e8e8c57acac914d35d3977360bfbff6286927586ecc5a0eb0c575ff6db5640fcd0d3b4fedf3164c63ead412375d19bed0ff098d41df9dbc879aa7b0672
-
Filesize
89KB
MD5da32ba5704b945ff08dc50e17ce1bb5c
SHA12d8c567b3918069a58b58d37d3c604be6506011a
SHA2564d1d9f05d39658ddb56ad061ffaf6a5e831b37d10507a548a170113bc81a4ad3
SHA512965695e8e8c57acac914d35d3977360bfbff6286927586ecc5a0eb0c575ff6db5640fcd0d3b4fedf3164c63ead412375d19bed0ff098d41df9dbc879aa7b0672
-
Filesize
89KB
MD5da32ba5704b945ff08dc50e17ce1bb5c
SHA12d8c567b3918069a58b58d37d3c604be6506011a
SHA2564d1d9f05d39658ddb56ad061ffaf6a5e831b37d10507a548a170113bc81a4ad3
SHA512965695e8e8c57acac914d35d3977360bfbff6286927586ecc5a0eb0c575ff6db5640fcd0d3b4fedf3164c63ead412375d19bed0ff098d41df9dbc879aa7b0672
-
Filesize
89KB
MD5da32ba5704b945ff08dc50e17ce1bb5c
SHA12d8c567b3918069a58b58d37d3c604be6506011a
SHA2564d1d9f05d39658ddb56ad061ffaf6a5e831b37d10507a548a170113bc81a4ad3
SHA512965695e8e8c57acac914d35d3977360bfbff6286927586ecc5a0eb0c575ff6db5640fcd0d3b4fedf3164c63ead412375d19bed0ff098d41df9dbc879aa7b0672
-
Filesize
89KB
MD5da32ba5704b945ff08dc50e17ce1bb5c
SHA12d8c567b3918069a58b58d37d3c604be6506011a
SHA2564d1d9f05d39658ddb56ad061ffaf6a5e831b37d10507a548a170113bc81a4ad3
SHA512965695e8e8c57acac914d35d3977360bfbff6286927586ecc5a0eb0c575ff6db5640fcd0d3b4fedf3164c63ead412375d19bed0ff098d41df9dbc879aa7b0672
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367
-
Filesize
1.1MB
MD560cf7bdab887c8e4d3425d94ececd8d0
SHA1a0147334806123358c8051676b55941f6d997fa8
SHA256414cfc196f16fa63ef7d04492d3bc0d061a886c8f5eb78d62ffa7ac238d5b274
SHA5126c8beeac97dec8d9e624a9e0e8622e0c41a1f5dfe997b046f595fac94ba79a5b9684e0bec423ce23535dfa29285cb836d567958ea6304f51bd924ceaf964a367