Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 18:23
Behavioral task
behavioral1
Sample
5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe
Resource
win7-20230712-en
General
-
Target
5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe
-
Size
6.9MB
-
MD5
57794b001e1e8c4917aaa864268fec36
-
SHA1
825e7a4c79f47d61df14a140398c2770ab22fb65
-
SHA256
5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
-
SHA512
5854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
SSDEEP
196608:gbJEeOGZPuknu4TNAzGx2tXuqIg1YJwPj:gbaElhDSus1YJwPj
Malware Config
Extracted
amadey
3.85
45.9.74.166/b7djSDcPcZ/index.php
45.9.74.141/b7djSDcPcZ/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4828 bstyoops.exe 1008 bstyoops.exe 736 bstyoops.exe -
resource yara_rule behavioral2/memory/4820-133-0x00000000002A0000-0x0000000000F36000-memory.dmp vmprotect behavioral2/memory/4820-138-0x00000000002A0000-0x0000000000F36000-memory.dmp vmprotect behavioral2/files/0x000300000001e6d8-144.dat vmprotect behavioral2/files/0x000300000001e6d8-151.dat vmprotect behavioral2/files/0x000300000001e6d8-152.dat vmprotect behavioral2/memory/4828-153-0x0000000000F20000-0x0000000001BB6000-memory.dmp vmprotect behavioral2/memory/4828-158-0x0000000000F20000-0x0000000001BB6000-memory.dmp vmprotect behavioral2/files/0x000300000001e6d8-160.dat vmprotect behavioral2/memory/1008-161-0x0000000000F20000-0x0000000001BB6000-memory.dmp vmprotect behavioral2/memory/1008-166-0x0000000000F20000-0x0000000001BB6000-memory.dmp vmprotect behavioral2/files/0x000300000001e6d8-168.dat vmprotect behavioral2/memory/736-169-0x0000000000F20000-0x0000000001BB6000-memory.dmp vmprotect behavioral2/memory/736-174-0x0000000000F20000-0x0000000001BB6000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4772 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4820 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4828 4820 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 86 PID 4820 wrote to memory of 4828 4820 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 86 PID 4820 wrote to memory of 4828 4820 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 86 PID 4828 wrote to memory of 4772 4828 bstyoops.exe 89 PID 4828 wrote to memory of 4772 4828 bstyoops.exe 89 PID 4828 wrote to memory of 4772 4828 bstyoops.exe 89 PID 4828 wrote to memory of 1364 4828 bstyoops.exe 91 PID 4828 wrote to memory of 1364 4828 bstyoops.exe 91 PID 4828 wrote to memory of 1364 4828 bstyoops.exe 91 PID 1364 wrote to memory of 4220 1364 cmd.exe 93 PID 1364 wrote to memory of 4220 1364 cmd.exe 93 PID 1364 wrote to memory of 4220 1364 cmd.exe 93 PID 1364 wrote to memory of 3516 1364 cmd.exe 94 PID 1364 wrote to memory of 3516 1364 cmd.exe 94 PID 1364 wrote to memory of 3516 1364 cmd.exe 94 PID 1364 wrote to memory of 2840 1364 cmd.exe 95 PID 1364 wrote to memory of 2840 1364 cmd.exe 95 PID 1364 wrote to memory of 2840 1364 cmd.exe 95 PID 1364 wrote to memory of 2844 1364 cmd.exe 96 PID 1364 wrote to memory of 2844 1364 cmd.exe 96 PID 1364 wrote to memory of 2844 1364 cmd.exe 96 PID 1364 wrote to memory of 3088 1364 cmd.exe 97 PID 1364 wrote to memory of 3088 1364 cmd.exe 97 PID 1364 wrote to memory of 3088 1364 cmd.exe 97 PID 1364 wrote to memory of 3576 1364 cmd.exe 98 PID 1364 wrote to memory of 3576 1364 cmd.exe 98 PID 1364 wrote to memory of 3576 1364 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F3⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:N"4⤵PID:3516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:R" /E4⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:N"4⤵PID:3088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:R" /E4⤵PID:3576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe1⤵
- Executes dropped EXE
PID:1008
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe1⤵
- Executes dropped EXE
PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2