Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 05:01

General

  • Target

    e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe

  • Size

    704KB

  • MD5

    73337423e405c3c0b71629c63c6f6cfd

  • SHA1

    539742b03de3ff3740a3d8d743ec9714904cd047

  • SHA256

    e538197b7b5154f17ffc93b45cfbc82b7065ed16e27679d52b4c23bff5457297

  • SHA512

    08c84adacd15ba0172eef4096ef71d79666c2fae999ed76c6fc010c7ddf8cfa2cba19a0dc50f6ee989838509afd0ee5e67242696b8315b4e6be450ccd839a47a

  • SSDEEP

    12288:hMrHy90j/L2EvY/JCfPeltFzHxjSGFJ7CnJYrHT9UmdcHtJj+nVPGK3R9dwuUP:myoL2EvYRC3elPrZzenJYrKmdcHTGRYP

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe
    "C:\Users\Admin\AppData\Local\Temp\e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1570722.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1570722.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8068816.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8068816.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106096.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106096.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:712
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2355548.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2355548.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4472
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2529814.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2529814.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4784
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4512
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1304
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:116
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4776
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4300
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4828
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1432
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:2956
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4188
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3800
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0273536.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0273536.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4212
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1556
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4716

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1570722.exe

                Filesize

                598KB

                MD5

                b7063840af93ff5607f2f43d165ea027

                SHA1

                e966488fc2b91297cbc23d805c5131674eec4f26

                SHA256

                f7ee624ae8048c37c7cfab5556222efa1400f469c3e27231119fc6614842c99b

                SHA512

                508fc23310e67e54c546a41bc31d2f8509e6ccea2bb60d8192934dbdbd521304ad188c8b8b9060791167fc114bd8b757fd2fa5500b27bcafac68ce9ef9f89b43

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1570722.exe

                Filesize

                598KB

                MD5

                b7063840af93ff5607f2f43d165ea027

                SHA1

                e966488fc2b91297cbc23d805c5131674eec4f26

                SHA256

                f7ee624ae8048c37c7cfab5556222efa1400f469c3e27231119fc6614842c99b

                SHA512

                508fc23310e67e54c546a41bc31d2f8509e6ccea2bb60d8192934dbdbd521304ad188c8b8b9060791167fc114bd8b757fd2fa5500b27bcafac68ce9ef9f89b43

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8068816.exe

                Filesize

                433KB

                MD5

                a4a923092857289c50b0c70acc57ac54

                SHA1

                4f008927745512c1ee0106882227a7a1eae55ce4

                SHA256

                c4b6ce0f5743e77c2fbabd67f5a90c1bf32f03626e4f28a0c3abb2dc009fa7c4

                SHA512

                f826a96361f752b95e63437c485bf5d2e9b9c78eeb29bece8d1a32b1da3d1fd552e7b273e9faf453529966245734a2b06bcbf199e93da24e5ab9a4c2c2267644

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8068816.exe

                Filesize

                433KB

                MD5

                a4a923092857289c50b0c70acc57ac54

                SHA1

                4f008927745512c1ee0106882227a7a1eae55ce4

                SHA256

                c4b6ce0f5743e77c2fbabd67f5a90c1bf32f03626e4f28a0c3abb2dc009fa7c4

                SHA512

                f826a96361f752b95e63437c485bf5d2e9b9c78eeb29bece8d1a32b1da3d1fd552e7b273e9faf453529966245734a2b06bcbf199e93da24e5ab9a4c2c2267644

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0273536.exe

                Filesize

                173KB

                MD5

                641f5fcb00cd79a329511b6c51612f17

                SHA1

                ff7f9b1b70cecc9c80182a79f7bdcabf144d3666

                SHA256

                e622e0c83658e8919f117b3d1a6a9c4fa17f6ee6b0cac61841a5d4f4ca8038c7

                SHA512

                e29237cefe33b7cd69804cf0596ce277311b28a2381d02f225a7eb5bb62890f9b56af26c817a1ede264f8fd6f43d980b7e093d4ab8f4e3f79de5b393d66b1f3a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0273536.exe

                Filesize

                173KB

                MD5

                641f5fcb00cd79a329511b6c51612f17

                SHA1

                ff7f9b1b70cecc9c80182a79f7bdcabf144d3666

                SHA256

                e622e0c83658e8919f117b3d1a6a9c4fa17f6ee6b0cac61841a5d4f4ca8038c7

                SHA512

                e29237cefe33b7cd69804cf0596ce277311b28a2381d02f225a7eb5bb62890f9b56af26c817a1ede264f8fd6f43d980b7e093d4ab8f4e3f79de5b393d66b1f3a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106096.exe

                Filesize

                277KB

                MD5

                5b9888994f6bc29fa5edbd9a9c3fbba6

                SHA1

                398aeaa539226d833e1a500a3c992ad47b4663f4

                SHA256

                fbe3464af200e6458c601373827c8ec413fd0e27d483d3bb0cdd0388532a3720

                SHA512

                b9445e0ffb16993063e391cc2e717c349467b00ad14e723627abc827907cf25aa6d364824eefe93eae4069bce4e138206b36cf43fa6baf892ac9ff67e4309a0e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106096.exe

                Filesize

                277KB

                MD5

                5b9888994f6bc29fa5edbd9a9c3fbba6

                SHA1

                398aeaa539226d833e1a500a3c992ad47b4663f4

                SHA256

                fbe3464af200e6458c601373827c8ec413fd0e27d483d3bb0cdd0388532a3720

                SHA512

                b9445e0ffb16993063e391cc2e717c349467b00ad14e723627abc827907cf25aa6d364824eefe93eae4069bce4e138206b36cf43fa6baf892ac9ff67e4309a0e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2355548.exe

                Filesize

                15KB

                MD5

                d491578fa930de6b5fc3c70e1996a744

                SHA1

                5d511ebf41b44e4468860a7d1d53ace5e73d04ac

                SHA256

                bbb4a5460599100ce4f85246294ff2aa8f77addaca01eeeb29cc6e4d57b66fa4

                SHA512

                a469c5179ebafdd06f910f906f6f0514334584a884298a01377bfeb9c3c0fd75d33f71503811b7d889b9faf38fc7e62b6df3dccd4835258055c1e5728490cabc

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2355548.exe

                Filesize

                15KB

                MD5

                d491578fa930de6b5fc3c70e1996a744

                SHA1

                5d511ebf41b44e4468860a7d1d53ace5e73d04ac

                SHA256

                bbb4a5460599100ce4f85246294ff2aa8f77addaca01eeeb29cc6e4d57b66fa4

                SHA512

                a469c5179ebafdd06f910f906f6f0514334584a884298a01377bfeb9c3c0fd75d33f71503811b7d889b9faf38fc7e62b6df3dccd4835258055c1e5728490cabc

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2529814.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2529814.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                321KB

                MD5

                2e6170cdac8b94db0bf67cfe98b2cb8d

                SHA1

                2344eb42b149f8989653d2ba949c8793d3b05237

                SHA256

                8d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6

                SHA512

                7287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/4212-53-0x0000000005610000-0x000000000564C000-memory.dmp

                Filesize

                240KB

              • memory/4212-51-0x00000000054C0000-0x00000000054D0000-memory.dmp

                Filesize

                64KB

              • memory/4212-52-0x00000000054A0000-0x00000000054B2000-memory.dmp

                Filesize

                72KB

              • memory/4212-50-0x00000000056E0000-0x00000000057EA000-memory.dmp

                Filesize

                1.0MB

              • memory/4212-54-0x0000000072F40000-0x00000000736F0000-memory.dmp

                Filesize

                7.7MB

              • memory/4212-55-0x00000000054C0000-0x00000000054D0000-memory.dmp

                Filesize

                64KB

              • memory/4212-49-0x0000000005BF0000-0x0000000006208000-memory.dmp

                Filesize

                6.1MB

              • memory/4212-48-0x0000000072F40000-0x00000000736F0000-memory.dmp

                Filesize

                7.7MB

              • memory/4212-47-0x0000000000AE0000-0x0000000000B10000-memory.dmp

                Filesize

                192KB

              • memory/4472-31-0x00007FFAE7EC0000-0x00007FFAE8981000-memory.dmp

                Filesize

                10.8MB

              • memory/4472-29-0x00007FFAE7EC0000-0x00007FFAE8981000-memory.dmp

                Filesize

                10.8MB

              • memory/4472-28-0x0000000000F20000-0x0000000000F2A000-memory.dmp

                Filesize

                40KB