Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/08/2023, 21:31

General

  • Target

    a4a60f78ae7aa985ba6c2c60394e298f3f5840c31d8892a3ae937b7d6938484f.exe

  • Size

    592KB

  • MD5

    cfe28e53e546392efd95cfb1a621a40d

  • SHA1

    db55474b08ac8745c7a26635051e30a24003d0ec

  • SHA256

    a4a60f78ae7aa985ba6c2c60394e298f3f5840c31d8892a3ae937b7d6938484f

  • SHA512

    f505be90df0b64b96655c22b54abd31f4fbecca311d9620ec7bca656db261a8c82b5d96e7edde41a853dcb0fdf268c76e0f529989516eb2dd04d34e6f151c2e1

  • SSDEEP

    12288:XMrEy90rRpdOHFjpPu7Pax0VpMNkDWWEWW2Dnnu44j1S38:/ygfs/uumnMOyWjn81T

Malware Config

Extracted

Family

amadey

Version

S-%lu-

C2

77.91.68.18/nice/index.php

3.87/nice/index.php

Extracted

Family

redline

Botnet

chang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92b880db64e691d6bb290d1536ce7688

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4a60f78ae7aa985ba6c2c60394e298f3f5840c31d8892a3ae937b7d6938484f.exe
    "C:\Users\Admin\AppData\Local\Temp\a4a60f78ae7aa985ba6c2c60394e298f3f5840c31d8892a3ae937b7d6938484f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6477883.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6477883.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0843882.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0843882.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m7554012.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m7554012.exe
          4⤵
          • Executes dropped EXE
          PID:3404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3332437.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3332437.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
            "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:420
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1576
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:3944
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  7⤵
                    PID:4704
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:R" /E
                    7⤵
                      PID:3080
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\b40d11255d" /P "Admin:N"
                      7⤵
                        PID:3520
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:2464
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:R" /E
                          7⤵
                            PID:3748
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4764
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o8749471.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o8749471.exe
                    3⤵
                    • Executes dropped EXE
                    PID:5000
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:208
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2632

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6477883.exe

                Filesize

                476KB

                MD5

                08fb2df9fd701250ea755af8afdd53b8

                SHA1

                5b7cb57f0a9b31a2353bfcc0ae7849af942f85ca

                SHA256

                c34360dafe45e7fadf106331d4fad4cd14bd8db384c7e124c9d33498dfcb0d82

                SHA512

                d73ad092684775f427207abcaabca4220edbe8706ad8a1434cb7ff6fd302bb057b4f9463d8b57930639d55201ed76ea7a4392ff97fdea0e3a7d38dbca5ffdc40

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6477883.exe

                Filesize

                476KB

                MD5

                08fb2df9fd701250ea755af8afdd53b8

                SHA1

                5b7cb57f0a9b31a2353bfcc0ae7849af942f85ca

                SHA256

                c34360dafe45e7fadf106331d4fad4cd14bd8db384c7e124c9d33498dfcb0d82

                SHA512

                d73ad092684775f427207abcaabca4220edbe8706ad8a1434cb7ff6fd302bb057b4f9463d8b57930639d55201ed76ea7a4392ff97fdea0e3a7d38dbca5ffdc40

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o8749471.exe

                Filesize

                174KB

                MD5

                46891bd6509cceb0eeb1924e64247e03

                SHA1

                e48a123c7c5de6c7baf44a4d70541fbcf30de7d3

                SHA256

                d013b0a1940ee289878498149cc66b7e0ba41a4444fd68a5298bdc2d772911c7

                SHA512

                a7d111634af168759a3a3688cfb7647b337a48b01aecfef7811c95d4b408683b39e9db0e546cbd29de275d6b287db5d7238da2d8565acc1ba2f2467a9c3bbf60

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o8749471.exe

                Filesize

                174KB

                MD5

                46891bd6509cceb0eeb1924e64247e03

                SHA1

                e48a123c7c5de6c7baf44a4d70541fbcf30de7d3

                SHA256

                d013b0a1940ee289878498149cc66b7e0ba41a4444fd68a5298bdc2d772911c7

                SHA512

                a7d111634af168759a3a3688cfb7647b337a48b01aecfef7811c95d4b408683b39e9db0e546cbd29de275d6b287db5d7238da2d8565acc1ba2f2467a9c3bbf60

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0843882.exe

                Filesize

                320KB

                MD5

                e5d97c23c6ed2f4676bdebf096c55558

                SHA1

                635e118abd4c16c09b0812cdaefeb9b240709536

                SHA256

                231e58a08fc11212b06eb660cbc910bcf5221bcbc211ce611c3e94bab8fa41f1

                SHA512

                948b83432e8c8e770114a43bf50bb796106fb678f747ac4f39380cc8e6979f349e1f2e08de3a78f423ec07e5a2952d908200838f9629798daddccc3608fdaf13

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0843882.exe

                Filesize

                320KB

                MD5

                e5d97c23c6ed2f4676bdebf096c55558

                SHA1

                635e118abd4c16c09b0812cdaefeb9b240709536

                SHA256

                231e58a08fc11212b06eb660cbc910bcf5221bcbc211ce611c3e94bab8fa41f1

                SHA512

                948b83432e8c8e770114a43bf50bb796106fb678f747ac4f39380cc8e6979f349e1f2e08de3a78f423ec07e5a2952d908200838f9629798daddccc3608fdaf13

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m7554012.exe

                Filesize

                140KB

                MD5

                5e87c7539cafd4e48d060747fb216683

                SHA1

                ea1629fae5ab37d0cf505811ee41be9a982b575d

                SHA256

                f77443bb0be74a537de97307882c5c142c4af23d965e59cdc97e899db9d97827

                SHA512

                992a3f6337a1ea8fb3fe3dc44495db7044b4b09c0ed6569cf227e77130a3aa9270d7b25e794cee211877f70b31f00949cd97c8ab23309b556c6d3e548d392c2a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m7554012.exe

                Filesize

                140KB

                MD5

                5e87c7539cafd4e48d060747fb216683

                SHA1

                ea1629fae5ab37d0cf505811ee41be9a982b575d

                SHA256

                f77443bb0be74a537de97307882c5c142c4af23d965e59cdc97e899db9d97827

                SHA512

                992a3f6337a1ea8fb3fe3dc44495db7044b4b09c0ed6569cf227e77130a3aa9270d7b25e794cee211877f70b31f00949cd97c8ab23309b556c6d3e548d392c2a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3332437.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3332437.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                d22cf3c686e3cad4e632bfacdd797373

                SHA1

                687bc47aa7ca30261f9d18adeab2067371285c86

                SHA256

                c4ef2c069f995b985a646521f0c36a3ea342f197006e6808f5f7caba95df40fb

                SHA512

                e96168be3b8ebc4fd9f2ba53efc0960de5e780a7922e37e06303f73e03e6d192167874a0c514cec39e499e57e310e1f194248b278cbff12361d187575920c886

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/5000-154-0x000000000A1C0000-0x000000000A2CA000-memory.dmp

                Filesize

                1.0MB

              • memory/5000-157-0x000000000A100000-0x000000000A14B000-memory.dmp

                Filesize

                300KB

              • memory/5000-150-0x0000000000310000-0x0000000000340000-memory.dmp

                Filesize

                192KB

              • memory/5000-159-0x00000000726B0000-0x0000000072D9E000-memory.dmp

                Filesize

                6.9MB

              • memory/5000-156-0x000000000A0B0000-0x000000000A0EE000-memory.dmp

                Filesize

                248KB

              • memory/5000-155-0x0000000004CC0000-0x0000000004CD2000-memory.dmp

                Filesize

                72KB

              • memory/5000-151-0x00000000726B0000-0x0000000072D9E000-memory.dmp

                Filesize

                6.9MB

              • memory/5000-153-0x000000000A6C0000-0x000000000ACC6000-memory.dmp

                Filesize

                6.0MB

              • memory/5000-152-0x0000000002680000-0x0000000002686000-memory.dmp

                Filesize

                24KB