Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/08/2023, 08:02

General

  • Target

    5d3d4292e9ac6fdc4cb1e9a279f59978ed08382396602869bbb310c9537af1d1.exe

  • Size

    679KB

  • MD5

    27be76beff89c1c74f9222f681d9aa35

  • SHA1

    865dcbc5d1cf714b95b9ef7bc214c8d3c1b1f3c4

  • SHA256

    5d3d4292e9ac6fdc4cb1e9a279f59978ed08382396602869bbb310c9537af1d1

  • SHA512

    f18057deaf1375aa839b97163b6141210cb09794227deda70ca120a615a7a531b3c215ced0a490e768591f0846b0a9f95d5eb84e0f5b5673a4454c4b6851af5c

  • SSDEEP

    12288:CMr/y90cQl9ulayFgtFD5i+rX7iJpX5IX+QeoYUr72MEOA43a1T9AQOBxfHNr/Yz:RyzQeMcaL6+/Yo7tgNpgpJQyDbJxfIL

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d3d4292e9ac6fdc4cb1e9a279f59978ed08382396602869bbb310c9537af1d1.exe
    "C:\Users\Admin\AppData\Local\Temp\5d3d4292e9ac6fdc4cb1e9a279f59978ed08382396602869bbb310c9537af1d1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6589451.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6589451.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7523735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7523735.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1691646.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1691646.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5772106.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5772106.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1144
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8508326.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8508326.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4128
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1924
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4212
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4184
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3220
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:4852
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:4324
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4388
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:5092
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:3048
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:772
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4342452.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4342452.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:4760
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4993285.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4993285.exe
                    3⤵
                    • Executes dropped EXE
                    PID:3700
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4132

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                77bca46112f0a9e5421d92de580c6f16

                SHA1

                888f453a9635820e16cab2defe7e38ae44403ba6

                SHA256

                a47541d2fa76e5c4ce794a605ece410cd7095e21d48bf3ecf14a616f2ee5cc7a

                SHA512

                19046bbddf4fad33a059417ebd2b6442bfa3e12e09441c9a331df6942dbb877dd9ae3dc8bf7c4efc4a544dc286a303f407f4cac43abc713bc43083fd61468906

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                77bca46112f0a9e5421d92de580c6f16

                SHA1

                888f453a9635820e16cab2defe7e38ae44403ba6

                SHA256

                a47541d2fa76e5c4ce794a605ece410cd7095e21d48bf3ecf14a616f2ee5cc7a

                SHA512

                19046bbddf4fad33a059417ebd2b6442bfa3e12e09441c9a331df6942dbb877dd9ae3dc8bf7c4efc4a544dc286a303f407f4cac43abc713bc43083fd61468906

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                77bca46112f0a9e5421d92de580c6f16

                SHA1

                888f453a9635820e16cab2defe7e38ae44403ba6

                SHA256

                a47541d2fa76e5c4ce794a605ece410cd7095e21d48bf3ecf14a616f2ee5cc7a

                SHA512

                19046bbddf4fad33a059417ebd2b6442bfa3e12e09441c9a331df6942dbb877dd9ae3dc8bf7c4efc4a544dc286a303f407f4cac43abc713bc43083fd61468906

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                77bca46112f0a9e5421d92de580c6f16

                SHA1

                888f453a9635820e16cab2defe7e38ae44403ba6

                SHA256

                a47541d2fa76e5c4ce794a605ece410cd7095e21d48bf3ecf14a616f2ee5cc7a

                SHA512

                19046bbddf4fad33a059417ebd2b6442bfa3e12e09441c9a331df6942dbb877dd9ae3dc8bf7c4efc4a544dc286a303f407f4cac43abc713bc43083fd61468906

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6589451.exe

                Filesize

                514KB

                MD5

                34acd168a53993a719a36cb4cf32912a

                SHA1

                95db54a45f8c9d06846b734fa3e8f2f89cadc0b2

                SHA256

                39a412602bfad679f94298486e3537392937a77b342ca1eab940d59c1e983c8d

                SHA512

                698d3ff0c0f979e3060c2f4f751e491f51d32a16fe169232f865f760dc52746075959ce6dd0d643a509648378fd40326877f55fc7ef938d7309e1aadd6241710

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6589451.exe

                Filesize

                514KB

                MD5

                34acd168a53993a719a36cb4cf32912a

                SHA1

                95db54a45f8c9d06846b734fa3e8f2f89cadc0b2

                SHA256

                39a412602bfad679f94298486e3537392937a77b342ca1eab940d59c1e983c8d

                SHA512

                698d3ff0c0f979e3060c2f4f751e491f51d32a16fe169232f865f760dc52746075959ce6dd0d643a509648378fd40326877f55fc7ef938d7309e1aadd6241710

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4993285.exe

                Filesize

                175KB

                MD5

                93a7d4c8fe0af660d8ba29611fa2d406

                SHA1

                18eab44615c09aa5be09b7df0d769fda34c32395

                SHA256

                bfff44d42a75dbadaa2e397ff46c7e6661f1d98d2b6a9fd6fb35fe5757db2714

                SHA512

                4912b268ceb602154ef496159ed755cc836382a36d47f0da9b74c02578f06181670729e07317b6c622b8df6747a90c45129c1b0501e5881b0f0967046a897cef

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4993285.exe

                Filesize

                175KB

                MD5

                93a7d4c8fe0af660d8ba29611fa2d406

                SHA1

                18eab44615c09aa5be09b7df0d769fda34c32395

                SHA256

                bfff44d42a75dbadaa2e397ff46c7e6661f1d98d2b6a9fd6fb35fe5757db2714

                SHA512

                4912b268ceb602154ef496159ed755cc836382a36d47f0da9b74c02578f06181670729e07317b6c622b8df6747a90c45129c1b0501e5881b0f0967046a897cef

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7523735.exe

                Filesize

                359KB

                MD5

                d729561db107d5e774720aed80cceebb

                SHA1

                b952dd484f0c2141ec03f6f87080d7df45efe0bd

                SHA256

                7432f557e14c8befeaebec44c1305936caea035e4490b6e79059f60a6998baf2

                SHA512

                d73eb1d08f8f517b2326c946de1e6a1647fe22f53446f910f47ad3a5bbf70f0781cb559762d93061293dc0c47f7418ef12bb28de6e00dd72818534b53c942653

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7523735.exe

                Filesize

                359KB

                MD5

                d729561db107d5e774720aed80cceebb

                SHA1

                b952dd484f0c2141ec03f6f87080d7df45efe0bd

                SHA256

                7432f557e14c8befeaebec44c1305936caea035e4490b6e79059f60a6998baf2

                SHA512

                d73eb1d08f8f517b2326c946de1e6a1647fe22f53446f910f47ad3a5bbf70f0781cb559762d93061293dc0c47f7418ef12bb28de6e00dd72818534b53c942653

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4342452.exe

                Filesize

                39KB

                MD5

                3509aa551082c7f8c129a3e4af95d3e0

                SHA1

                3a2c25884653876293b5acda38330f09eeb8d23b

                SHA256

                137a1390d6357975b1ed476dbe4f47f45fb9a4c292d1871a1d06a04e3db29a25

                SHA512

                52b2fd6ee4dad0134f6a17e29e449f7d3c4406e750de4d1e6905f98fc75f9b89196d6775c923d04ed79c2e826b78997333efc1a9be9543832574de44d1e8f0af

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4342452.exe

                Filesize

                39KB

                MD5

                3509aa551082c7f8c129a3e4af95d3e0

                SHA1

                3a2c25884653876293b5acda38330f09eeb8d23b

                SHA256

                137a1390d6357975b1ed476dbe4f47f45fb9a4c292d1871a1d06a04e3db29a25

                SHA512

                52b2fd6ee4dad0134f6a17e29e449f7d3c4406e750de4d1e6905f98fc75f9b89196d6775c923d04ed79c2e826b78997333efc1a9be9543832574de44d1e8f0af

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1691646.exe

                Filesize

                234KB

                MD5

                302e5dc6d7cd8d8f8d8becdea48399a2

                SHA1

                51d5615104f0813f43434caca6afd9832c815ea8

                SHA256

                dba6c704a2af5fa16eb546952be24f343b68e24b30b11070950bca2c806e960e

                SHA512

                3377be6324fd9ede8ee83778e04ee0b4184d921301bf3be6e1091e4cf6a0c5a21febab6a4f89c16366acd53bc348e77407759c8fde8a227feca72e821f2eec68

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1691646.exe

                Filesize

                234KB

                MD5

                302e5dc6d7cd8d8f8d8becdea48399a2

                SHA1

                51d5615104f0813f43434caca6afd9832c815ea8

                SHA256

                dba6c704a2af5fa16eb546952be24f343b68e24b30b11070950bca2c806e960e

                SHA512

                3377be6324fd9ede8ee83778e04ee0b4184d921301bf3be6e1091e4cf6a0c5a21febab6a4f89c16366acd53bc348e77407759c8fde8a227feca72e821f2eec68

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5772106.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5772106.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8508326.exe

                Filesize

                231KB

                MD5

                77bca46112f0a9e5421d92de580c6f16

                SHA1

                888f453a9635820e16cab2defe7e38ae44403ba6

                SHA256

                a47541d2fa76e5c4ce794a605ece410cd7095e21d48bf3ecf14a616f2ee5cc7a

                SHA512

                19046bbddf4fad33a059417ebd2b6442bfa3e12e09441c9a331df6942dbb877dd9ae3dc8bf7c4efc4a544dc286a303f407f4cac43abc713bc43083fd61468906

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8508326.exe

                Filesize

                231KB

                MD5

                77bca46112f0a9e5421d92de580c6f16

                SHA1

                888f453a9635820e16cab2defe7e38ae44403ba6

                SHA256

                a47541d2fa76e5c4ce794a605ece410cd7095e21d48bf3ecf14a616f2ee5cc7a

                SHA512

                19046bbddf4fad33a059417ebd2b6442bfa3e12e09441c9a331df6942dbb877dd9ae3dc8bf7c4efc4a544dc286a303f407f4cac43abc713bc43083fd61468906

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • memory/1144-146-0x00007FFFD4450000-0x00007FFFD4E3C000-memory.dmp

                Filesize

                9.9MB

              • memory/1144-145-0x0000000000E90000-0x0000000000E9A000-memory.dmp

                Filesize

                40KB

              • memory/1144-148-0x00007FFFD4450000-0x00007FFFD4E3C000-memory.dmp

                Filesize

                9.9MB

              • memory/2152-163-0x0000000001520000-0x0000000001536000-memory.dmp

                Filesize

                88KB

              • memory/3700-176-0x0000000005430000-0x000000000546E000-memory.dmp

                Filesize

                248KB

              • memory/3700-174-0x00000000054A0000-0x00000000055AA000-memory.dmp

                Filesize

                1.0MB

              • memory/3700-175-0x00000000053D0000-0x00000000053E2000-memory.dmp

                Filesize

                72KB

              • memory/3700-170-0x0000000000AC0000-0x0000000000AF0000-memory.dmp

                Filesize

                192KB

              • memory/3700-177-0x00000000055B0000-0x00000000055FB000-memory.dmp

                Filesize

                300KB

              • memory/3700-178-0x00000000728E0000-0x0000000072FCE000-memory.dmp

                Filesize

                6.9MB

              • memory/3700-173-0x00000000059A0000-0x0000000005FA6000-memory.dmp

                Filesize

                6.0MB

              • memory/3700-172-0x0000000007710000-0x0000000007716000-memory.dmp

                Filesize

                24KB

              • memory/3700-171-0x00000000728E0000-0x0000000072FCE000-memory.dmp

                Filesize

                6.9MB

              • memory/4760-164-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4760-161-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB