Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
236s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 04:38
Behavioral task
behavioral1
Sample
l5952554.exe
Resource
win7-20230824-en
General
-
Target
l5952554.exe
-
Size
319KB
-
MD5
5a6e758df64ee5553fdb304f6f97dfc1
-
SHA1
24f5e539dc1293faf20a69fcb9d5fcedc76e3062
-
SHA256
71eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
-
SHA512
67831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
SSDEEP
6144:SR9eh569+UR6P3zIwkp4p2k/DPaZHwc3eoe6u17MgAOIMs8Bq:Sfm5BB7kpi2k/ae6u17pa8Bq
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1076 saves.exe 3056 saves.exe 612 saves.exe 2112 saves.exe 2420 saves.exe 2000 saves.exe -
Loads dropped DLL 5 IoCs
pid Process 2324 l5952554.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2228 schtasks.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1076 2324 l5952554.exe 30 PID 2324 wrote to memory of 1076 2324 l5952554.exe 30 PID 2324 wrote to memory of 1076 2324 l5952554.exe 30 PID 2324 wrote to memory of 1076 2324 l5952554.exe 30 PID 1076 wrote to memory of 2228 1076 saves.exe 31 PID 1076 wrote to memory of 2228 1076 saves.exe 31 PID 1076 wrote to memory of 2228 1076 saves.exe 31 PID 1076 wrote to memory of 2228 1076 saves.exe 31 PID 1076 wrote to memory of 2860 1076 saves.exe 33 PID 1076 wrote to memory of 2860 1076 saves.exe 33 PID 1076 wrote to memory of 2860 1076 saves.exe 33 PID 1076 wrote to memory of 2860 1076 saves.exe 33 PID 2860 wrote to memory of 2720 2860 cmd.exe 35 PID 2860 wrote to memory of 2720 2860 cmd.exe 35 PID 2860 wrote to memory of 2720 2860 cmd.exe 35 PID 2860 wrote to memory of 2720 2860 cmd.exe 35 PID 2860 wrote to memory of 2724 2860 cmd.exe 36 PID 2860 wrote to memory of 2724 2860 cmd.exe 36 PID 2860 wrote to memory of 2724 2860 cmd.exe 36 PID 2860 wrote to memory of 2724 2860 cmd.exe 36 PID 2860 wrote to memory of 2796 2860 cmd.exe 37 PID 2860 wrote to memory of 2796 2860 cmd.exe 37 PID 2860 wrote to memory of 2796 2860 cmd.exe 37 PID 2860 wrote to memory of 2796 2860 cmd.exe 37 PID 2860 wrote to memory of 2636 2860 cmd.exe 38 PID 2860 wrote to memory of 2636 2860 cmd.exe 38 PID 2860 wrote to memory of 2636 2860 cmd.exe 38 PID 2860 wrote to memory of 2636 2860 cmd.exe 38 PID 2860 wrote to memory of 2604 2860 cmd.exe 39 PID 2860 wrote to memory of 2604 2860 cmd.exe 39 PID 2860 wrote to memory of 2604 2860 cmd.exe 39 PID 2860 wrote to memory of 2604 2860 cmd.exe 39 PID 2860 wrote to memory of 756 2860 cmd.exe 40 PID 2860 wrote to memory of 756 2860 cmd.exe 40 PID 2860 wrote to memory of 756 2860 cmd.exe 40 PID 2860 wrote to memory of 756 2860 cmd.exe 40 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1076 wrote to memory of 2492 1076 saves.exe 42 PID 1532 wrote to memory of 3056 1532 taskeng.exe 44 PID 1532 wrote to memory of 3056 1532 taskeng.exe 44 PID 1532 wrote to memory of 3056 1532 taskeng.exe 44 PID 1532 wrote to memory of 3056 1532 taskeng.exe 44 PID 1532 wrote to memory of 612 1532 taskeng.exe 45 PID 1532 wrote to memory of 612 1532 taskeng.exe 45 PID 1532 wrote to memory of 612 1532 taskeng.exe 45 PID 1532 wrote to memory of 612 1532 taskeng.exe 45 PID 1532 wrote to memory of 2112 1532 taskeng.exe 46 PID 1532 wrote to memory of 2112 1532 taskeng.exe 46 PID 1532 wrote to memory of 2112 1532 taskeng.exe 46 PID 1532 wrote to memory of 2112 1532 taskeng.exe 46 PID 1532 wrote to memory of 2420 1532 taskeng.exe 47 PID 1532 wrote to memory of 2420 1532 taskeng.exe 47 PID 1532 wrote to memory of 2420 1532 taskeng.exe 47 PID 1532 wrote to memory of 2420 1532 taskeng.exe 47 PID 1532 wrote to memory of 2000 1532 taskeng.exe 48 PID 1532 wrote to memory of 2000 1532 taskeng.exe 48 PID 1532 wrote to memory of 2000 1532 taskeng.exe 48 PID 1532 wrote to memory of 2000 1532 taskeng.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\l5952554.exe"C:\Users\Admin\AppData\Local\Temp\l5952554.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F3⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"4⤵PID:2724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E4⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"4⤵PID:2604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E4⤵PID:756
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2492
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EC848F8D-077C-449B-B25A-5C7D71821D88} S-1-5-21-1528014236-771305907-3973026625-1000:DMCOTBQQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:612
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b