Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/08/2023, 15:40

General

  • Target

    fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe

  • Size

    704KB

  • MD5

    3d568361be6369007491c815e3a9302d

  • SHA1

    8a5508335f9e6076711ef642863148c9b5effa83

  • SHA256

    fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d

  • SHA512

    a23f60ddf8abc5a0f3b01edfa6840f929d6900044a68bc90d131a777eda4f2984db5c7eee5bd730fcf65a00c4b44731ec7dd6409de76f7d4d84184a7a766e4e6

  • SSDEEP

    12288:nMrny90JFiUlHWrgLL6HxZHdxQqQ7J6ynloOgFyj0XCjcppwhMb:syG4gLLUavJ6YoOMNfwhk

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe
    "C:\Users\Admin\AppData\Local\Temp\fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9672019.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9672019.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8176660.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8176660.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:608
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7453437.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7453437.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4436
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7906377.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7906377.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2092
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9574819.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9574819.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:5112
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:3440
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1472
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2120
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:2688
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4836
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4832
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:3424
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:1384
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4924
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2585162.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2585162.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3040
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:604

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9672019.exe

                Filesize

                599KB

                MD5

                056b26d757b0754d0f8be10cf59a1335

                SHA1

                1cd2e4f55ad44b9503b9f116a219e430fb44c390

                SHA256

                c4d935415fa7c3342fa8e729ac5ff12137df8bb7b0f61a3a55a3719f32bdb293

                SHA512

                6b66d4c49ddc0237d258afd1dd75914534c381f1f567466c69be5494975620cd88bab43c1cee1e2cd6e1a8c90839e3129b3d0ac5f9e38c8a442f38ba437d5279

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9672019.exe

                Filesize

                599KB

                MD5

                056b26d757b0754d0f8be10cf59a1335

                SHA1

                1cd2e4f55ad44b9503b9f116a219e430fb44c390

                SHA256

                c4d935415fa7c3342fa8e729ac5ff12137df8bb7b0f61a3a55a3719f32bdb293

                SHA512

                6b66d4c49ddc0237d258afd1dd75914534c381f1f567466c69be5494975620cd88bab43c1cee1e2cd6e1a8c90839e3129b3d0ac5f9e38c8a442f38ba437d5279

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8176660.exe

                Filesize

                433KB

                MD5

                4318c0ea835f1c6313d866cca8ef44f5

                SHA1

                1b4dcc6652eb70d3fc42675f912644888d5f1549

                SHA256

                48217d812db3500a623607dcdcf76dbfed19442b8670923702ea7a5d6523605d

                SHA512

                a437ce5d3d77479f6155e6cff6dfb59bd4611419018ad1d8d36edce6a4e38810e9cf521845d64bcf4c10d9862aabd4aa74abb84848938a087bd4c30a6bd7f3bf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8176660.exe

                Filesize

                433KB

                MD5

                4318c0ea835f1c6313d866cca8ef44f5

                SHA1

                1b4dcc6652eb70d3fc42675f912644888d5f1549

                SHA256

                48217d812db3500a623607dcdcf76dbfed19442b8670923702ea7a5d6523605d

                SHA512

                a437ce5d3d77479f6155e6cff6dfb59bd4611419018ad1d8d36edce6a4e38810e9cf521845d64bcf4c10d9862aabd4aa74abb84848938a087bd4c30a6bd7f3bf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2585162.exe

                Filesize

                174KB

                MD5

                f589cda96cc5a9fac3ee7ca304bb1f6a

                SHA1

                4c6b988ea412a1b44a3a533cfe1457925bfde2c3

                SHA256

                d119bc6388efc24e694704bbeb071ffd8092d3a24319b82e1e811216e65fc17c

                SHA512

                794bbe957688f09e909363f4cd1a7168c285fd3c1291567be0e28f617ab0ca207ef980e10582a4baffe6217d31ad5da052e98c822d3f0882e59884e84f9ee019

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2585162.exe

                Filesize

                174KB

                MD5

                f589cda96cc5a9fac3ee7ca304bb1f6a

                SHA1

                4c6b988ea412a1b44a3a533cfe1457925bfde2c3

                SHA256

                d119bc6388efc24e694704bbeb071ffd8092d3a24319b82e1e811216e65fc17c

                SHA512

                794bbe957688f09e909363f4cd1a7168c285fd3c1291567be0e28f617ab0ca207ef980e10582a4baffe6217d31ad5da052e98c822d3f0882e59884e84f9ee019

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7453437.exe

                Filesize

                277KB

                MD5

                020734694009d274ac7b6fba97482150

                SHA1

                149e2a7d914f1b6bab8d70146c4ff9c9c897d476

                SHA256

                9cf5afa661c30435d27a48fc2a008f358334662da70e68aa01140016f01481f7

                SHA512

                c3ddf454c716a2c258c8e41f4f83cc28bb6fdad11295d8c031bd93b7fe2425f1be313de49a07521840af6d6875c1b44bc505da6536c9221ca8addcd70e9a2d98

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7453437.exe

                Filesize

                277KB

                MD5

                020734694009d274ac7b6fba97482150

                SHA1

                149e2a7d914f1b6bab8d70146c4ff9c9c897d476

                SHA256

                9cf5afa661c30435d27a48fc2a008f358334662da70e68aa01140016f01481f7

                SHA512

                c3ddf454c716a2c258c8e41f4f83cc28bb6fdad11295d8c031bd93b7fe2425f1be313de49a07521840af6d6875c1b44bc505da6536c9221ca8addcd70e9a2d98

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7906377.exe

                Filesize

                14KB

                MD5

                ce6ee279385d3d44e9ab058972a924f9

                SHA1

                2eaa2e5f24016ddc08e82eb159dbdf07adac0f2b

                SHA256

                9662b61c6fb50263ad238c4383e1900eb2df3e2fd3b8fc6fb46acbeada1cfb37

                SHA512

                bd86ddd2228d0f6b0348c9713ddd8bf2be6069ca406edbe1e488116513bb9f66a7d37c0b034c12803efce39a390ec4f429acdfa99bcefd736853d5d04baa9ba6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7906377.exe

                Filesize

                14KB

                MD5

                ce6ee279385d3d44e9ab058972a924f9

                SHA1

                2eaa2e5f24016ddc08e82eb159dbdf07adac0f2b

                SHA256

                9662b61c6fb50263ad238c4383e1900eb2df3e2fd3b8fc6fb46acbeada1cfb37

                SHA512

                bd86ddd2228d0f6b0348c9713ddd8bf2be6069ca406edbe1e488116513bb9f66a7d37c0b034c12803efce39a390ec4f429acdfa99bcefd736853d5d04baa9ba6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9574819.exe

                Filesize

                320KB

                MD5

                b7f68bfcd272c2b786898da78d96db4a

                SHA1

                f3c6beb345688be66469e4f7a4bca6960091a77e

                SHA256

                5b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b

                SHA512

                a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9574819.exe

                Filesize

                320KB

                MD5

                b7f68bfcd272c2b786898da78d96db4a

                SHA1

                f3c6beb345688be66469e4f7a4bca6960091a77e

                SHA256

                5b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b

                SHA512

                a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                320KB

                MD5

                b7f68bfcd272c2b786898da78d96db4a

                SHA1

                f3c6beb345688be66469e4f7a4bca6960091a77e

                SHA256

                5b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b

                SHA512

                a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                320KB

                MD5

                b7f68bfcd272c2b786898da78d96db4a

                SHA1

                f3c6beb345688be66469e4f7a4bca6960091a77e

                SHA256

                5b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b

                SHA512

                a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                320KB

                MD5

                b7f68bfcd272c2b786898da78d96db4a

                SHA1

                f3c6beb345688be66469e4f7a4bca6960091a77e

                SHA256

                5b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b

                SHA512

                a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                320KB

                MD5

                b7f68bfcd272c2b786898da78d96db4a

                SHA1

                f3c6beb345688be66469e4f7a4bca6960091a77e

                SHA256

                5b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b

                SHA512

                a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/2092-28-0x0000000000B40000-0x0000000000B4A000-memory.dmp

                Filesize

                40KB

              • memory/2092-31-0x00007FFD758F0000-0x00007FFD762DC000-memory.dmp

                Filesize

                9.9MB

              • memory/2092-29-0x00007FFD758F0000-0x00007FFD762DC000-memory.dmp

                Filesize

                9.9MB

              • memory/3040-47-0x000000000A760000-0x000000000AD66000-memory.dmp

                Filesize

                6.0MB

              • memory/3040-48-0x000000000A280000-0x000000000A38A000-memory.dmp

                Filesize

                1.0MB

              • memory/3040-49-0x000000000A1B0000-0x000000000A1C2000-memory.dmp

                Filesize

                72KB

              • memory/3040-50-0x000000000A210000-0x000000000A24E000-memory.dmp

                Filesize

                248KB

              • memory/3040-51-0x000000000A390000-0x000000000A3DB000-memory.dmp

                Filesize

                300KB

              • memory/3040-52-0x0000000072590000-0x0000000072C7E000-memory.dmp

                Filesize

                6.9MB

              • memory/3040-46-0x00000000027E0000-0x00000000027E6000-memory.dmp

                Filesize

                24KB

              • memory/3040-45-0x0000000072590000-0x0000000072C7E000-memory.dmp

                Filesize

                6.9MB

              • memory/3040-44-0x0000000000470000-0x00000000004A0000-memory.dmp

                Filesize

                192KB