Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/08/2023, 08:59

General

  • Target

    c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe

  • Size

    704KB

  • MD5

    12cb4ec05f84ee0332c215d165447862

  • SHA1

    c8384294bf7ab24e3cf6ba3a0d811e7a6b18935e

  • SHA256

    c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc

  • SHA512

    d91f2aaa4c16e1920f8de6c6fada5befc236d21ee611b62edff760724b2a06b6c1327264ddc451b27951b18044f377423b41fb733770564ecb257aabba6b50b9

  • SSDEEP

    12288:AMrxy90DoUuHWgvKPwSLvjyC0XM1j3+ErxT64C7mly:hyZYPwsuO13+ErxT6b7ay

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe
    "C:\Users\Admin\AppData\Local\Temp\c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2784966.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2784966.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8104894.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8104894.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4484
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8153109.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8153109.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2080
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1547829.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1547829.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1970890.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1970890.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2164
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1472
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:2576
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:5112
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4720
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4432
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:3300
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:832
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:4880
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:2328
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3292
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2262146.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2262146.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2940
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2376

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2784966.exe

                Filesize

                599KB

                MD5

                ba105993b3b156e7a39c4c281fd58c3e

                SHA1

                dcb27b0676956b5b265e05f3a3f4bc4048db292e

                SHA256

                e95c98c90939cd42c4e4cb710feeb5eead50130edbe5282d9467c44fd130864f

                SHA512

                7ec7aeb84be2158e0aa7283d00b08b1645bb7f4df041e5b7e725ebaff171f3adc6ba38476794b3b78460dbdeb8c7839cef7cc35c869a4896ad1518dc532bf2c7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2784966.exe

                Filesize

                599KB

                MD5

                ba105993b3b156e7a39c4c281fd58c3e

                SHA1

                dcb27b0676956b5b265e05f3a3f4bc4048db292e

                SHA256

                e95c98c90939cd42c4e4cb710feeb5eead50130edbe5282d9467c44fd130864f

                SHA512

                7ec7aeb84be2158e0aa7283d00b08b1645bb7f4df041e5b7e725ebaff171f3adc6ba38476794b3b78460dbdeb8c7839cef7cc35c869a4896ad1518dc532bf2c7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8104894.exe

                Filesize

                433KB

                MD5

                94626c8cc48de98187074e1584936cdb

                SHA1

                6bbfa7c9e4c39ba5db9591ef2ea05ebbb8aac0f7

                SHA256

                d2fa4cb5e2a8bc3fe14e456e7fd8b8d2f3b2e19732fe57bea93d160bbe2e2675

                SHA512

                cde05264239091d21a1bee352946ab27c4ac270332624c0b6f5f0b86310933e99be99c18e63d4b5cebae9df8e0706b7ff07c94b863f6a2dbe12c35e8e321fc98

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8104894.exe

                Filesize

                433KB

                MD5

                94626c8cc48de98187074e1584936cdb

                SHA1

                6bbfa7c9e4c39ba5db9591ef2ea05ebbb8aac0f7

                SHA256

                d2fa4cb5e2a8bc3fe14e456e7fd8b8d2f3b2e19732fe57bea93d160bbe2e2675

                SHA512

                cde05264239091d21a1bee352946ab27c4ac270332624c0b6f5f0b86310933e99be99c18e63d4b5cebae9df8e0706b7ff07c94b863f6a2dbe12c35e8e321fc98

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2262146.exe

                Filesize

                174KB

                MD5

                6852d9e3ef01a22804d519806b12610a

                SHA1

                1c1c75ae2aa076e3c24cbd00b2d3725f0b060d5e

                SHA256

                9ae84df4e6987f10bd57a7fcd1f14e8bc12e961f97e402fca3d862d6d5c021bb

                SHA512

                232923f42ffe6fe3c1a8b94b72eba72fdd1ef11bd3a232f74449cd71def2a53ae863255b9786be70ee8df0c1d728735c28efd3b666ecbff98cf7dd53eccc3c30

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2262146.exe

                Filesize

                174KB

                MD5

                6852d9e3ef01a22804d519806b12610a

                SHA1

                1c1c75ae2aa076e3c24cbd00b2d3725f0b060d5e

                SHA256

                9ae84df4e6987f10bd57a7fcd1f14e8bc12e961f97e402fca3d862d6d5c021bb

                SHA512

                232923f42ffe6fe3c1a8b94b72eba72fdd1ef11bd3a232f74449cd71def2a53ae863255b9786be70ee8df0c1d728735c28efd3b666ecbff98cf7dd53eccc3c30

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8153109.exe

                Filesize

                277KB

                MD5

                ae70f2b6a0f0e68224b4e1fb3564b1f9

                SHA1

                aa1f687fd12c5e399af1ab84be1b3a16c3fb424f

                SHA256

                ff3b51baf07138195074fcabac8ae2a32ce58d3892097ea2e870cfb00a5e3171

                SHA512

                9d9456ef0d95d06182202935f2c06067a779e6605340b714ee625ffa410b2f697b1f14257932a7791e1dfba7c93e9c05b6a6351430cb4f890d5c467f8abd5ac1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8153109.exe

                Filesize

                277KB

                MD5

                ae70f2b6a0f0e68224b4e1fb3564b1f9

                SHA1

                aa1f687fd12c5e399af1ab84be1b3a16c3fb424f

                SHA256

                ff3b51baf07138195074fcabac8ae2a32ce58d3892097ea2e870cfb00a5e3171

                SHA512

                9d9456ef0d95d06182202935f2c06067a779e6605340b714ee625ffa410b2f697b1f14257932a7791e1dfba7c93e9c05b6a6351430cb4f890d5c467f8abd5ac1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1547829.exe

                Filesize

                16KB

                MD5

                e86f09be9fe6f4feb478e2626880cb9b

                SHA1

                b7475390b51fbf7ec8b0f4d757613afdad6a86fa

                SHA256

                8436c59cbbbb7376971612e19b382395838df31bde9e4780eab015ca952cb022

                SHA512

                dd90a7a85407d9769ee723be269689d081c660d316bb878f10f79aaf98334bfdeca1aafa850bc41398a415168f4d5d2243f0efea82865b1f87552dc01f2bf9d4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1547829.exe

                Filesize

                16KB

                MD5

                e86f09be9fe6f4feb478e2626880cb9b

                SHA1

                b7475390b51fbf7ec8b0f4d757613afdad6a86fa

                SHA256

                8436c59cbbbb7376971612e19b382395838df31bde9e4780eab015ca952cb022

                SHA512

                dd90a7a85407d9769ee723be269689d081c660d316bb878f10f79aaf98334bfdeca1aafa850bc41398a415168f4d5d2243f0efea82865b1f87552dc01f2bf9d4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1970890.exe

                Filesize

                323KB

                MD5

                9c781fa3868fae0527650ea690e09af4

                SHA1

                e6d76d64f8972da65dfd312a96c13f76a4ccc8be

                SHA256

                144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36

                SHA512

                f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1970890.exe

                Filesize

                323KB

                MD5

                9c781fa3868fae0527650ea690e09af4

                SHA1

                e6d76d64f8972da65dfd312a96c13f76a4ccc8be

                SHA256

                144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36

                SHA512

                f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                9c781fa3868fae0527650ea690e09af4

                SHA1

                e6d76d64f8972da65dfd312a96c13f76a4ccc8be

                SHA256

                144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36

                SHA512

                f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                9c781fa3868fae0527650ea690e09af4

                SHA1

                e6d76d64f8972da65dfd312a96c13f76a4ccc8be

                SHA256

                144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36

                SHA512

                f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                9c781fa3868fae0527650ea690e09af4

                SHA1

                e6d76d64f8972da65dfd312a96c13f76a4ccc8be

                SHA256

                144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36

                SHA512

                f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                9c781fa3868fae0527650ea690e09af4

                SHA1

                e6d76d64f8972da65dfd312a96c13f76a4ccc8be

                SHA256

                144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36

                SHA512

                f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/2940-50-0x000000000A600000-0x000000000A63E000-memory.dmp

                Filesize

                248KB

              • memory/2940-47-0x000000000AAE0000-0x000000000B0E6000-memory.dmp

                Filesize

                6.0MB

              • memory/2940-48-0x000000000A670000-0x000000000A77A000-memory.dmp

                Filesize

                1.0MB

              • memory/2940-49-0x000000000A5A0000-0x000000000A5B2000-memory.dmp

                Filesize

                72KB

              • memory/2940-46-0x0000000002A90000-0x0000000002A96000-memory.dmp

                Filesize

                24KB

              • memory/2940-51-0x000000000A780000-0x000000000A7CB000-memory.dmp

                Filesize

                300KB

              • memory/2940-52-0x0000000072560000-0x0000000072C4E000-memory.dmp

                Filesize

                6.9MB

              • memory/2940-45-0x0000000072560000-0x0000000072C4E000-memory.dmp

                Filesize

                6.9MB

              • memory/2940-44-0x0000000000860000-0x0000000000890000-memory.dmp

                Filesize

                192KB

              • memory/3812-31-0x00007FF9757C0000-0x00007FF9761AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3812-29-0x00007FF9757C0000-0x00007FF9761AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3812-28-0x0000000000140000-0x000000000014A000-memory.dmp

                Filesize

                40KB