Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    277s
  • max time network
    296s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/08/2023, 04:50

General

  • Target

    x3950412.exe

  • Size

    706KB

  • MD5

    1cf8338e3f149d8139ec88161b591045

  • SHA1

    8d6874c50e201cbf3384461c5e1b01f1197fc622

  • SHA256

    4b73c3674a864ee1a2c341534023f82b7990fe3f5e8cba41819eba74df146b0b

  • SHA512

    5d83c48e7d3a575c1f5336c51597182793e6fc9ad101c00e0abfeebbd05643b8226a69d44e3e180e85a6a5ba0b4d7580b5db2d08c29e2ca1c1ae5556fb0b726b

  • SSDEEP

    12288:NMr2y90bOZu/dVon748KLOf/4DCB+MCLbKdSstrblwr1Ud+SlXnPSG6KFhoK4:3yaV/TvLdCBNCLOdBtwRPSFb6KFeD

Malware Config

Extracted

Family

amadey

Version

S-%lu-

C2

77.91.68.18/nice/index.php

3.87/nice/index.php

Extracted

Family

redline

Botnet

chang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92b880db64e691d6bb290d1536ce7688

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x3950412.exe
    "C:\Users\Admin\AppData\Local\Temp\x3950412.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9939224.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9939224.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2527700.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2527700.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4912
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1565629.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1565629.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h6657429.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h6657429.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
            "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4984
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1588
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2232
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4212
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  7⤵
                    PID:4432
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:R" /E
                    7⤵
                      PID:4104
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:1868
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\b40d11255d" /P "Admin:N"
                        7⤵
                          PID:1152
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:R" /E
                          7⤵
                            PID:3804
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4976
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0467400.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0467400.exe
                    3⤵
                    • Executes dropped EXE
                    PID:2976
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4772

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9939224.exe

                Filesize

                540KB

                MD5

                58c5d3a18bb03c599da54dc5417252d1

                SHA1

                145445304b8b4c81638501f4311aecfc886e5848

                SHA256

                30646796d971085923b24f747647674f1e37fe10e35dbd06e1960fdebb1e4114

                SHA512

                c0e2db7495ed7af4a9ee77d45c928c3de7112c290557bb7986b2c260ca14b1e1fbeb9d0385b7571642167a79e2c408c9acf40365bf40762c4afacc7af9330883

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9939224.exe

                Filesize

                540KB

                MD5

                58c5d3a18bb03c599da54dc5417252d1

                SHA1

                145445304b8b4c81638501f4311aecfc886e5848

                SHA256

                30646796d971085923b24f747647674f1e37fe10e35dbd06e1960fdebb1e4114

                SHA512

                c0e2db7495ed7af4a9ee77d45c928c3de7112c290557bb7986b2c260ca14b1e1fbeb9d0385b7571642167a79e2c408c9acf40365bf40762c4afacc7af9330883

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0467400.exe

                Filesize

                174KB

                MD5

                eb3d4e0d30f611679d1b3d17872d0ee6

                SHA1

                fc84617915778e4c9b6deaecfb2afcf883659c91

                SHA256

                85e4e9afcfba989f08ccacb000740195a32625929436ff39e41450d7fe5bd28f

                SHA512

                98808f9bf79f99296fb495c03b4977953ec25d6e1b2f55e5379bb6b540acd83f8c333a1e59114760f04bc48470e5c7398f93d99c52ef4bdf97d0256a2289efa6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0467400.exe

                Filesize

                174KB

                MD5

                eb3d4e0d30f611679d1b3d17872d0ee6

                SHA1

                fc84617915778e4c9b6deaecfb2afcf883659c91

                SHA256

                85e4e9afcfba989f08ccacb000740195a32625929436ff39e41450d7fe5bd28f

                SHA512

                98808f9bf79f99296fb495c03b4977953ec25d6e1b2f55e5379bb6b540acd83f8c333a1e59114760f04bc48470e5c7398f93d99c52ef4bdf97d0256a2289efa6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2527700.exe

                Filesize

                384KB

                MD5

                714bf1cdbdf141690c3e1e18152d5c8d

                SHA1

                635b0b242716c1a713787cfe8e8428030e296d89

                SHA256

                b6ba3412d739b3c0e9eb2a8c5116e166c80006506b7bf3b615218f597da4f9d6

                SHA512

                057e3bb99cd92c2367cdb2e0eef0234acbc51966734cac1ef36518c3c493b172f00d1e5549c39a11b324c1411aa4780bbba03d4839e781372b54d2e73960808e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2527700.exe

                Filesize

                384KB

                MD5

                714bf1cdbdf141690c3e1e18152d5c8d

                SHA1

                635b0b242716c1a713787cfe8e8428030e296d89

                SHA256

                b6ba3412d739b3c0e9eb2a8c5116e166c80006506b7bf3b615218f597da4f9d6

                SHA512

                057e3bb99cd92c2367cdb2e0eef0234acbc51966734cac1ef36518c3c493b172f00d1e5549c39a11b324c1411aa4780bbba03d4839e781372b54d2e73960808e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1565629.exe

                Filesize

                184KB

                MD5

                d6210c5070f54b34f65cea80fbe9f3a4

                SHA1

                d08d572201da90f23e6677a61317475247d9616c

                SHA256

                70239d8548160c08627151f7e08d7304d35a4c0786072b6565e4d319495e89b7

                SHA512

                25215fa69e28491c990c69d31352bf9221a41beb706196555c70d9172cae942adbb3b270e9b71fe3fca2a380916780eb8a0a168ddfb8620a2dab93d96031d0c9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1565629.exe

                Filesize

                184KB

                MD5

                d6210c5070f54b34f65cea80fbe9f3a4

                SHA1

                d08d572201da90f23e6677a61317475247d9616c

                SHA256

                70239d8548160c08627151f7e08d7304d35a4c0786072b6565e4d319495e89b7

                SHA512

                25215fa69e28491c990c69d31352bf9221a41beb706196555c70d9172cae942adbb3b270e9b71fe3fca2a380916780eb8a0a168ddfb8620a2dab93d96031d0c9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h6657429.exe

                Filesize

                313KB

                MD5

                43885b9b3219be759c28213e0740c199

                SHA1

                f638de502cea27516f404afa1130aa91694a7078

                SHA256

                18fda4048bc379f756cac42e8d5669ee9d958e8edc6a503cd3e64f9ae21b9874

                SHA512

                21c052a35d7c7004cd78dd61cb7538bfbf0564d1380ee0fade607509d321dc7f66178535017a03a6041d3b1c9f9ede62e0f6e9d5ef3bd478808d7627c410c264

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h6657429.exe

                Filesize

                313KB

                MD5

                43885b9b3219be759c28213e0740c199

                SHA1

                f638de502cea27516f404afa1130aa91694a7078

                SHA256

                18fda4048bc379f756cac42e8d5669ee9d958e8edc6a503cd3e64f9ae21b9874

                SHA512

                21c052a35d7c7004cd78dd61cb7538bfbf0564d1380ee0fade607509d321dc7f66178535017a03a6041d3b1c9f9ede62e0f6e9d5ef3bd478808d7627c410c264

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                43885b9b3219be759c28213e0740c199

                SHA1

                f638de502cea27516f404afa1130aa91694a7078

                SHA256

                18fda4048bc379f756cac42e8d5669ee9d958e8edc6a503cd3e64f9ae21b9874

                SHA512

                21c052a35d7c7004cd78dd61cb7538bfbf0564d1380ee0fade607509d321dc7f66178535017a03a6041d3b1c9f9ede62e0f6e9d5ef3bd478808d7627c410c264

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                43885b9b3219be759c28213e0740c199

                SHA1

                f638de502cea27516f404afa1130aa91694a7078

                SHA256

                18fda4048bc379f756cac42e8d5669ee9d958e8edc6a503cd3e64f9ae21b9874

                SHA512

                21c052a35d7c7004cd78dd61cb7538bfbf0564d1380ee0fade607509d321dc7f66178535017a03a6041d3b1c9f9ede62e0f6e9d5ef3bd478808d7627c410c264

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                43885b9b3219be759c28213e0740c199

                SHA1

                f638de502cea27516f404afa1130aa91694a7078

                SHA256

                18fda4048bc379f756cac42e8d5669ee9d958e8edc6a503cd3e64f9ae21b9874

                SHA512

                21c052a35d7c7004cd78dd61cb7538bfbf0564d1380ee0fade607509d321dc7f66178535017a03a6041d3b1c9f9ede62e0f6e9d5ef3bd478808d7627c410c264

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                313KB

                MD5

                43885b9b3219be759c28213e0740c199

                SHA1

                f638de502cea27516f404afa1130aa91694a7078

                SHA256

                18fda4048bc379f756cac42e8d5669ee9d958e8edc6a503cd3e64f9ae21b9874

                SHA512

                21c052a35d7c7004cd78dd61cb7538bfbf0564d1380ee0fade607509d321dc7f66178535017a03a6041d3b1c9f9ede62e0f6e9d5ef3bd478808d7627c410c264

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/2976-188-0x000000000A700000-0x000000000AD06000-memory.dmp

                Filesize

                6.0MB

              • memory/2976-185-0x00000000003F0000-0x0000000000420000-memory.dmp

                Filesize

                192KB

              • memory/2976-186-0x0000000071F50000-0x000000007263E000-memory.dmp

                Filesize

                6.9MB

              • memory/2976-192-0x000000000A310000-0x000000000A35B000-memory.dmp

                Filesize

                300KB

              • memory/2976-193-0x0000000071F50000-0x000000007263E000-memory.dmp

                Filesize

                6.9MB

              • memory/2976-187-0x0000000002500000-0x0000000002506000-memory.dmp

                Filesize

                24KB

              • memory/2976-191-0x000000000A190000-0x000000000A1CE000-memory.dmp

                Filesize

                248KB

              • memory/2976-189-0x000000000A200000-0x000000000A30A000-memory.dmp

                Filesize

                1.0MB

              • memory/2976-190-0x000000000A130000-0x000000000A142000-memory.dmp

                Filesize

                72KB

              • memory/3996-145-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-172-0x0000000072D40000-0x000000007342E000-memory.dmp

                Filesize

                6.9MB

              • memory/3996-170-0x0000000072D40000-0x000000007342E000-memory.dmp

                Filesize

                6.9MB

              • memory/3996-169-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-167-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-165-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-163-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-161-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-159-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-157-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-155-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-153-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-151-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-149-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-147-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-143-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-142-0x0000000004A70000-0x0000000004A86000-memory.dmp

                Filesize

                88KB

              • memory/3996-141-0x0000000004A70000-0x0000000004A8C000-memory.dmp

                Filesize

                112KB

              • memory/3996-140-0x0000000004B00000-0x0000000004FFE000-memory.dmp

                Filesize

                5.0MB

              • memory/3996-139-0x00000000049E0000-0x00000000049FE000-memory.dmp

                Filesize

                120KB

              • memory/3996-138-0x0000000072D40000-0x000000007342E000-memory.dmp

                Filesize

                6.9MB