Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/08/2023, 10:47

General

  • Target

    d2c503f574c1c896f52ecf76b0e6573901717c5a8ce1a10bb9d33dde6b8a7f9f.exe

  • Size

    1.4MB

  • MD5

    e7e551b9517d62a80f31c7a844b1620d

  • SHA1

    c94f237244f19a3bfae64a45a0fc9dc64fe1772e

  • SHA256

    d2c503f574c1c896f52ecf76b0e6573901717c5a8ce1a10bb9d33dde6b8a7f9f

  • SHA512

    bb1eb1bd08ce22da71b8861613feb4231dc293642dedc2cc8f6cd14b409798d9bc5b95800c2bf75dc783671659f00e840dc348079fcf46bf3b46d045306f8424

  • SSDEEP

    24576:vyxbbpMv2XP5EDH3diEKkD4HJRI28E63OaNFE+58DKn7fp1GvL8ooMmHY18aEJvb:6xnpMv26TdKkD4XiE63Oas7De7fp1mLs

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2c503f574c1c896f52ecf76b0e6573901717c5a8ce1a10bb9d33dde6b8a7f9f.exe
    "C:\Users\Admin\AppData\Local\Temp\d2c503f574c1c896f52ecf76b0e6573901717c5a8ce1a10bb9d33dde6b8a7f9f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0162698.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0162698.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0090802.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0090802.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5084449.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5084449.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1360
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9059731.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9059731.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2352
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:3012
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2692
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2220
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4588
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4964
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4484
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:4848
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4888
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4344
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3263649.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3263649.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4836
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9437374.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9437374.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3108
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4828
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3380

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0162698.exe

                Filesize

                1.3MB

                MD5

                705589634a4cfb791aff05fe7cbcf9d6

                SHA1

                dcab8fb05079a421b07f0444f5d1d2dbd3758b5b

                SHA256

                13c31f334d33af7d488ba06ef37568524ee7323bd21986dd13cad23f309b5fef

                SHA512

                4e2208b15215683066324ebd6cb240a1eb44203d8b3b6c14874b52f18d214bd5f086556ea3e417d125512dc71d7772caaeea8898fd2255eb01ff08fb71af3aca

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0162698.exe

                Filesize

                1.3MB

                MD5

                705589634a4cfb791aff05fe7cbcf9d6

                SHA1

                dcab8fb05079a421b07f0444f5d1d2dbd3758b5b

                SHA256

                13c31f334d33af7d488ba06ef37568524ee7323bd21986dd13cad23f309b5fef

                SHA512

                4e2208b15215683066324ebd6cb240a1eb44203d8b3b6c14874b52f18d214bd5f086556ea3e417d125512dc71d7772caaeea8898fd2255eb01ff08fb71af3aca

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0090802.exe

                Filesize

                475KB

                MD5

                26d1d73dd26f9fdc830fb5a1a9195a65

                SHA1

                e336a0d28c799d298c93e0d7b02acdb19fe0a19e

                SHA256

                6af7497ee7acb00cc0cf20560e963b01f11968d9d48c4f926c989c9c7240d43e

                SHA512

                d5c41b9af8a9a07973723d512ea89174128a7eb07e8f929410d7b8449dd56a2b0d5483ac04981f0cb6566efe7974f6bf807cfe077880342334c5f4a640bc8527

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0090802.exe

                Filesize

                475KB

                MD5

                26d1d73dd26f9fdc830fb5a1a9195a65

                SHA1

                e336a0d28c799d298c93e0d7b02acdb19fe0a19e

                SHA256

                6af7497ee7acb00cc0cf20560e963b01f11968d9d48c4f926c989c9c7240d43e

                SHA512

                d5c41b9af8a9a07973723d512ea89174128a7eb07e8f929410d7b8449dd56a2b0d5483ac04981f0cb6566efe7974f6bf807cfe077880342334c5f4a640bc8527

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9437374.exe

                Filesize

                175KB

                MD5

                f971cffd48e0f8e5c25a5fd6d7266233

                SHA1

                236d54b80525eca647a770b9a6dab702b3b4da70

                SHA256

                facab20a9a644c8a629821a0b931e2854a88ae1dad28ed43f1e5ef95eefdc453

                SHA512

                f7b2d5ace43840d8a5aa36b88140d42ba29ab5cb62367b1ef4e081b5105cd4920bc86bc59f2a9a5b7b315aef32e128eba71015b4cbe3aa9912fd10b13abaeebc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9437374.exe

                Filesize

                175KB

                MD5

                f971cffd48e0f8e5c25a5fd6d7266233

                SHA1

                236d54b80525eca647a770b9a6dab702b3b4da70

                SHA256

                facab20a9a644c8a629821a0b931e2854a88ae1dad28ed43f1e5ef95eefdc453

                SHA512

                f7b2d5ace43840d8a5aa36b88140d42ba29ab5cb62367b1ef4e081b5105cd4920bc86bc59f2a9a5b7b315aef32e128eba71015b4cbe3aa9912fd10b13abaeebc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5084449.exe

                Filesize

                319KB

                MD5

                3cc1506ed336277f918cbd9460e3d261

                SHA1

                ff5f42e03e91488bdfe551cb16f2048d5b916d7a

                SHA256

                7d12f26fe5ace5003df5f1b36d0da177d40f6cebbacd3018769f8cd4b0cd9f7d

                SHA512

                bac7105ea323d4216fbe05f784883d1976c111dc7e83fd2a9fea11ff9ba37c7713c1c7ad35a3d417e248f3aa5982190e9a768f425e4b4622467fba8d0361f4cc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5084449.exe

                Filesize

                319KB

                MD5

                3cc1506ed336277f918cbd9460e3d261

                SHA1

                ff5f42e03e91488bdfe551cb16f2048d5b916d7a

                SHA256

                7d12f26fe5ace5003df5f1b36d0da177d40f6cebbacd3018769f8cd4b0cd9f7d

                SHA512

                bac7105ea323d4216fbe05f784883d1976c111dc7e83fd2a9fea11ff9ba37c7713c1c7ad35a3d417e248f3aa5982190e9a768f425e4b4622467fba8d0361f4cc

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9059731.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9059731.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3263649.exe

                Filesize

                140KB

                MD5

                b622d077d791d1e7f9f5cd4f6926fb19

                SHA1

                d4591889466384064cee0661082fb4b3989685b0

                SHA256

                9f417ac05b97a2286b436006b4fb95b45ebb5fe394405652643a968aef8c6d4e

                SHA512

                bc37831d3c0630cdf6ff993bd7acc2ca790f9e27a37eac86125956e7cb5037450c545d4e3f961ce3e0fd7b848da2c80bd0654e51f542d822c3ac1b7a787a6e8b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3263649.exe

                Filesize

                140KB

                MD5

                b622d077d791d1e7f9f5cd4f6926fb19

                SHA1

                d4591889466384064cee0661082fb4b3989685b0

                SHA256

                9f417ac05b97a2286b436006b4fb95b45ebb5fe394405652643a968aef8c6d4e

                SHA512

                bc37831d3c0630cdf6ff993bd7acc2ca790f9e27a37eac86125956e7cb5037450c545d4e3f961ce3e0fd7b848da2c80bd0654e51f542d822c3ac1b7a787a6e8b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                327KB

                MD5

                8908ca428a5da64a825af21fa572af20

                SHA1

                e856c69b9da935ec29ffd58ab5f6593a7a57e742

                SHA256

                fa08487e12694264c8a966c4cc577dac69b3789d2d6ca32ec05ca008bc41e5ca

                SHA512

                be09fde7f56efd2e4ba8c39fcbe1f4db41c2cfbc668fe137b18499e2c1ba8842681179697966a80b4ad4c7b6ab61913a92b59a24e0bb416c95abe1b80c23b897

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/3108-40-0x0000000000750000-0x0000000000780000-memory.dmp

                Filesize

                192KB

              • memory/3108-47-0x000000000A670000-0x000000000A6BB000-memory.dmp

                Filesize

                300KB

              • memory/3108-48-0x00000000721F0000-0x00000000728DE000-memory.dmp

                Filesize

                6.9MB

              • memory/3108-46-0x000000000A4F0000-0x000000000A52E000-memory.dmp

                Filesize

                248KB

              • memory/3108-45-0x000000000A490000-0x000000000A4A2000-memory.dmp

                Filesize

                72KB

              • memory/3108-44-0x000000000A560000-0x000000000A66A000-memory.dmp

                Filesize

                1.0MB

              • memory/3108-43-0x000000000A9E0000-0x000000000AFE6000-memory.dmp

                Filesize

                6.0MB

              • memory/3108-42-0x00000000028D0000-0x00000000028D6000-memory.dmp

                Filesize

                24KB

              • memory/3108-41-0x00000000721F0000-0x00000000728DE000-memory.dmp

                Filesize

                6.9MB