Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2023, 16:41

General

  • Target

    073db9dd3afed95074f803158e654828bee357b15c802a5b37cb42f9e64aa31b.exe

  • Size

    636KB

  • MD5

    018508afdf772e24d572b4bb0552f449

  • SHA1

    860baef2a1e5366f4fa327dd660cc7c368a13e53

  • SHA256

    073db9dd3afed95074f803158e654828bee357b15c802a5b37cb42f9e64aa31b

  • SHA512

    daafee0487b31472f548e66de664266d8b06740539431c3b1ec2ccb9951f7e772de7a0cae53477a1c9f4c7c5655f4a398ef3ee0789bde666069e1c948c0e0d05

  • SSDEEP

    12288:CMrzy90MRV+uvUmihtXJ8s/z9T0Zxy55772sReSHun7Gq/Mu/STVEWR:ZyXr+uvQht5lp4yXSKcLNSF

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\073db9dd3afed95074f803158e654828bee357b15c802a5b37cb42f9e64aa31b.exe
    "C:\Users\Admin\AppData\Local\Temp\073db9dd3afed95074f803158e654828bee357b15c802a5b37cb42f9e64aa31b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5556841.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5556841.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1122618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1122618.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3416492.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3416492.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4496
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0454447.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0454447.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:796
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4593619.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4593619.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2272
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4784
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2176
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3204
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:912
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:2104
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3640
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:2984
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:5068
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:1760
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5093927.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5093927.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:4916
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8411124.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8411124.exe
                    3⤵
                    • Executes dropped EXE
                    PID:3876
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3364
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4552

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5556841.exe

                Filesize

                515KB

                MD5

                be1cb914eb5c9c6e4787711277277d55

                SHA1

                1ade539812972409af40f1a9737300afa40deaf9

                SHA256

                22a2b368268a1fdc8910e150d53bfc1e61cde9d4549732d30c5473d83d46e69b

                SHA512

                24d347df14375b12620d24cdbfd2cf34690ace167281aab992fb6bfdc4a377e96667ccdcd45d5dc8ce0af5f91de5cd2d5ee537e1b558d83d106357c136754830

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5556841.exe

                Filesize

                515KB

                MD5

                be1cb914eb5c9c6e4787711277277d55

                SHA1

                1ade539812972409af40f1a9737300afa40deaf9

                SHA256

                22a2b368268a1fdc8910e150d53bfc1e61cde9d4549732d30c5473d83d46e69b

                SHA512

                24d347df14375b12620d24cdbfd2cf34690ace167281aab992fb6bfdc4a377e96667ccdcd45d5dc8ce0af5f91de5cd2d5ee537e1b558d83d106357c136754830

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8411124.exe

                Filesize

                174KB

                MD5

                c710c7776fb8b0d30b89edc35c4b21ce

                SHA1

                dbd6663d9149c33e58d5dec20c6ff12607903e3f

                SHA256

                1e7ed7cf8f0659e577355b0691188856e887f687683a3ad1e3f99fe85e56da4b

                SHA512

                06c00ae5ddd4e2c7144096aafa00f8503be1065285ee8198385c41deaa73beee8a65af75c5f34a9cfbda8d8e5bdae03159dea31afb127f2e8516ee6f3c44cf03

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8411124.exe

                Filesize

                174KB

                MD5

                c710c7776fb8b0d30b89edc35c4b21ce

                SHA1

                dbd6663d9149c33e58d5dec20c6ff12607903e3f

                SHA256

                1e7ed7cf8f0659e577355b0691188856e887f687683a3ad1e3f99fe85e56da4b

                SHA512

                06c00ae5ddd4e2c7144096aafa00f8503be1065285ee8198385c41deaa73beee8a65af75c5f34a9cfbda8d8e5bdae03159dea31afb127f2e8516ee6f3c44cf03

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1122618.exe

                Filesize

                359KB

                MD5

                4d8005a77682b9bb8d99a790b24ad7ea

                SHA1

                3064ecccbe9b84eb1fa99488dd575875f143ee35

                SHA256

                6845d21d3214fa609d8802f40a08e14744b584377a3f74f1c578c82128616a35

                SHA512

                3a38a0f1ebd3d7f44b5b9040288f228661dd41150e66d0488946336b333d6afddb9122bd2aae5f1cc00577429e06418b667c9941fc1d242b49935ea240c02748

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1122618.exe

                Filesize

                359KB

                MD5

                4d8005a77682b9bb8d99a790b24ad7ea

                SHA1

                3064ecccbe9b84eb1fa99488dd575875f143ee35

                SHA256

                6845d21d3214fa609d8802f40a08e14744b584377a3f74f1c578c82128616a35

                SHA512

                3a38a0f1ebd3d7f44b5b9040288f228661dd41150e66d0488946336b333d6afddb9122bd2aae5f1cc00577429e06418b667c9941fc1d242b49935ea240c02748

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5093927.exe

                Filesize

                39KB

                MD5

                813639ed54f5f277f438b599ff345367

                SHA1

                95ea4eeb1fbe04c03349609af9d6013319b7eca9

                SHA256

                7ad54b01482e7d1828a7509aa706ccea286619a8a2097efbdcec92b1a6eb69ab

                SHA512

                ccc5586729c53b51da778832ab43fa4f9ddaa3ed5ef8008d6180954be446b4bebe81569b8ba2a75723d2b79cdd5e050d059461fb7c46cd3a30bc5e897baa88dc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5093927.exe

                Filesize

                39KB

                MD5

                813639ed54f5f277f438b599ff345367

                SHA1

                95ea4eeb1fbe04c03349609af9d6013319b7eca9

                SHA256

                7ad54b01482e7d1828a7509aa706ccea286619a8a2097efbdcec92b1a6eb69ab

                SHA512

                ccc5586729c53b51da778832ab43fa4f9ddaa3ed5ef8008d6180954be446b4bebe81569b8ba2a75723d2b79cdd5e050d059461fb7c46cd3a30bc5e897baa88dc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3416492.exe

                Filesize

                234KB

                MD5

                82a18dbc423ca8b0c69b032f9ee9346a

                SHA1

                a0e6ebdc79a6d00bb933c30466592f3abea4e8e5

                SHA256

                32abf4bfad8b130a1e67ca7d10c5df6614d31c881b636b456f0cfb837c525fcf

                SHA512

                8ff0ec6c178cd28ffe2677d3b1e38d5184e23c7e035a69096fe440c40b25cc6fea2ca22c5be83ae7ea00275fb1b88c87b9b7b70a7667772babfabb801916b3bd

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3416492.exe

                Filesize

                234KB

                MD5

                82a18dbc423ca8b0c69b032f9ee9346a

                SHA1

                a0e6ebdc79a6d00bb933c30466592f3abea4e8e5

                SHA256

                32abf4bfad8b130a1e67ca7d10c5df6614d31c881b636b456f0cfb837c525fcf

                SHA512

                8ff0ec6c178cd28ffe2677d3b1e38d5184e23c7e035a69096fe440c40b25cc6fea2ca22c5be83ae7ea00275fb1b88c87b9b7b70a7667772babfabb801916b3bd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0454447.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0454447.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4593619.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4593619.exe

                Filesize

                230KB

                MD5

                852782f1b45285223f03ece55033e40d

                SHA1

                d640beefdd6ccb672366c1c09b5f66881827424b

                SHA256

                9ac51bb657b8395f8e8822e3f7a6976d6991cf8989c3311b5f9d16a0e83861e7

                SHA512

                47d1b6d330b364bd8127cca12584b48d9b44d983f5e0da27c567b6c8b67cb7f0a5ae03b7c5921696e265a9a50cdc040ea70984e2372ff7cadef0e875fc9955d4

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/796-165-0x00007FF8ED1A0000-0x00007FF8EDC61000-memory.dmp

                Filesize

                10.8MB

              • memory/796-163-0x00007FF8ED1A0000-0x00007FF8EDC61000-memory.dmp

                Filesize

                10.8MB

              • memory/796-162-0x00007FF8ED1A0000-0x00007FF8EDC61000-memory.dmp

                Filesize

                10.8MB

              • memory/796-161-0x0000000000A00000-0x0000000000A0A000-memory.dmp

                Filesize

                40KB

              • memory/1020-183-0x0000000003290000-0x00000000032A6000-memory.dmp

                Filesize

                88KB

              • memory/3876-193-0x00000000050A0000-0x00000000051AA000-memory.dmp

                Filesize

                1.0MB

              • memory/3876-195-0x0000000004F90000-0x0000000004FA2000-memory.dmp

                Filesize

                72KB

              • memory/3876-196-0x0000000004FF0000-0x000000000502C000-memory.dmp

                Filesize

                240KB

              • memory/3876-197-0x0000000072800000-0x0000000072FB0000-memory.dmp

                Filesize

                7.7MB

              • memory/3876-198-0x0000000004F80000-0x0000000004F90000-memory.dmp

                Filesize

                64KB

              • memory/3876-194-0x0000000004F80000-0x0000000004F90000-memory.dmp

                Filesize

                64KB

              • memory/3876-192-0x00000000055B0000-0x0000000005BC8000-memory.dmp

                Filesize

                6.1MB

              • memory/3876-191-0x0000000072800000-0x0000000072FB0000-memory.dmp

                Filesize

                7.7MB

              • memory/3876-190-0x0000000000600000-0x0000000000630000-memory.dmp

                Filesize

                192KB

              • memory/4916-184-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4916-182-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB