Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 07:42

General

  • Target

    71ed30f56f8c3cfd5ff046b4ccf00168f845314b47e3e1c8179f730cd940d0ab.exe

  • Size

    1.1MB

  • MD5

    6de45bbf2e4e0556a10c4ddeecdd636d

  • SHA1

    f7c90d6ab9e56b67d8272f971500f282bf30f939

  • SHA256

    71ed30f56f8c3cfd5ff046b4ccf00168f845314b47e3e1c8179f730cd940d0ab

  • SHA512

    43e9bd660b1ae6ad283ce8a20098e6be1c0cf587533aa208951340380859f655e8f7fddfde10526aedc5d85739ea75049a802290afbd6a64853afcbaf371a9fc

  • SSDEEP

    24576:/yMh87NqYk8wBHpTVO0u7hNyW1HIcuxDkEy0EVfq/+DI:KMm9krBVO0uNpOcS7nEVf

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

jang

C2

77.91.124.82:19071

Attributes
  • auth_value

    662102010afcbe9e22b13116b1c1a088

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71ed30f56f8c3cfd5ff046b4ccf00168f845314b47e3e1c8179f730cd940d0ab.exe
    "C:\Users\Admin\AppData\Local\Temp\71ed30f56f8c3cfd5ff046b4ccf00168f845314b47e3e1c8179f730cd940d0ab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7926264.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7926264.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9832424.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9832424.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1027905.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1027905.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1396
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\x0350172.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\x0350172.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\g0268534.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\g0268534.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2420
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\h3276333.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\h3276333.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3472
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1520
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:4696
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5060
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:4612
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:2888
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:3336
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:3736
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:4588
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:4308
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                              8⤵
                              • Loads dropped DLL
                              PID:3108
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i5763533.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i5763533.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4056
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4168
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:992

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7926264.exe

                Filesize

                1017KB

                MD5

                853e0b02534fe797ebf230f29e859355

                SHA1

                ccff60b2cc732ed24d3df07c8c81eded7225bb78

                SHA256

                a9392dc8c5709310a6d5946f986b3be65c501caa26a126de4b1bd92389a9dc67

                SHA512

                4cb464f7f8c6100c94068df725ccc1ce7fb5d2092d71de57c30378d782ad1a28289decec8fbc17e930037c97735e8dc3c37db90c0ef3d31a2438ee22147fb96a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7926264.exe

                Filesize

                1017KB

                MD5

                853e0b02534fe797ebf230f29e859355

                SHA1

                ccff60b2cc732ed24d3df07c8c81eded7225bb78

                SHA256

                a9392dc8c5709310a6d5946f986b3be65c501caa26a126de4b1bd92389a9dc67

                SHA512

                4cb464f7f8c6100c94068df725ccc1ce7fb5d2092d71de57c30378d782ad1a28289decec8fbc17e930037c97735e8dc3c37db90c0ef3d31a2438ee22147fb96a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9832424.exe

                Filesize

                599KB

                MD5

                e993e1dd613a9a317aac3e4af8d265b0

                SHA1

                19a9618b58ccb60366af2942ce4fdebeb2364108

                SHA256

                b12facd3ea9e86ea6bbbec868f1764ddb00755df01449c510b9f264ae890b40c

                SHA512

                5dd1aff709b51399c722099d7a3b4d87e6778fbfd3010091a9ef06530ec7036e672f326fb1fe331465639f7892c231352f564d248c1758ba3fb973a08a8051c5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9832424.exe

                Filesize

                599KB

                MD5

                e993e1dd613a9a317aac3e4af8d265b0

                SHA1

                19a9618b58ccb60366af2942ce4fdebeb2364108

                SHA256

                b12facd3ea9e86ea6bbbec868f1764ddb00755df01449c510b9f264ae890b40c

                SHA512

                5dd1aff709b51399c722099d7a3b4d87e6778fbfd3010091a9ef06530ec7036e672f326fb1fe331465639f7892c231352f564d248c1758ba3fb973a08a8051c5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1027905.exe

                Filesize

                433KB

                MD5

                6de4bfa2aa67973d937060ba3a669145

                SHA1

                611d639f585df1e749be965b9344410f7ac36800

                SHA256

                3bfdfe7eeee03d9b58a1f992933e625fbd1ec7f43f7ee4ed9f344cdb03c869b6

                SHA512

                2bf5d41b22211a694e405b2b48b82d1379ff37c068d46d8685996a3dd47fcf17e45c485fbfb6e14188089208f5590314b5101a4a3ef247efcf795d8e0470e2d4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1027905.exe

                Filesize

                433KB

                MD5

                6de4bfa2aa67973d937060ba3a669145

                SHA1

                611d639f585df1e749be965b9344410f7ac36800

                SHA256

                3bfdfe7eeee03d9b58a1f992933e625fbd1ec7f43f7ee4ed9f344cdb03c869b6

                SHA512

                2bf5d41b22211a694e405b2b48b82d1379ff37c068d46d8685996a3dd47fcf17e45c485fbfb6e14188089208f5590314b5101a4a3ef247efcf795d8e0470e2d4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i5763533.exe

                Filesize

                174KB

                MD5

                b5b9b73981bea23d10323396bfda6d6b

                SHA1

                4bccb10476a65da4a4cbab3a3fe028cd3047cf62

                SHA256

                e58b939b401f3bfb0becbfd9ce7dd9f2ba0a7a0a4c886b403bfd729b9fefc1b8

                SHA512

                8e14f1ac1ab9df98948a8aa3080ec62ffd6b0ca66220f88b15016d360a4c57fa54e89904d4d72645970d1dd1f0eba587fe15877bb88a940aad6a983bf7fe624b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i5763533.exe

                Filesize

                174KB

                MD5

                b5b9b73981bea23d10323396bfda6d6b

                SHA1

                4bccb10476a65da4a4cbab3a3fe028cd3047cf62

                SHA256

                e58b939b401f3bfb0becbfd9ce7dd9f2ba0a7a0a4c886b403bfd729b9fefc1b8

                SHA512

                8e14f1ac1ab9df98948a8aa3080ec62ffd6b0ca66220f88b15016d360a4c57fa54e89904d4d72645970d1dd1f0eba587fe15877bb88a940aad6a983bf7fe624b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\x0350172.exe

                Filesize

                277KB

                MD5

                efa7620ac1ae83c243a035d0ca61ea79

                SHA1

                dbce9b2be072f2c2a015953f2aafc12b5ec95ef9

                SHA256

                cd656565844386c3dfec9d80efbd7576658a7965c59d1a0b842f74e68e0300cc

                SHA512

                7e4af31e091a7a2483117339834dbae46dbbe75ed03ca9ec3ce18484eaacf9cd2e5d3b7b062b2bd40189423bd44ea82c35c7676c52a8f6aa212adf7b885de453

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\x0350172.exe

                Filesize

                277KB

                MD5

                efa7620ac1ae83c243a035d0ca61ea79

                SHA1

                dbce9b2be072f2c2a015953f2aafc12b5ec95ef9

                SHA256

                cd656565844386c3dfec9d80efbd7576658a7965c59d1a0b842f74e68e0300cc

                SHA512

                7e4af31e091a7a2483117339834dbae46dbbe75ed03ca9ec3ce18484eaacf9cd2e5d3b7b062b2bd40189423bd44ea82c35c7676c52a8f6aa212adf7b885de453

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\g0268534.exe

                Filesize

                19KB

                MD5

                8b043fd9bdf1539c33c3a05c2d6ee5ed

                SHA1

                adc00f5753bcb326a2bd99cd6970a038456dee45

                SHA256

                53f61137f2386784eb247347d817c2efb977cb95f6d134e464774331c47226f1

                SHA512

                662494bd16a45840cec06a8e1d5b28f5150a703d78a4ebb2ae5f59cfc72c55fa93283484da2b3482b347845b5fafcab00a0d2f770a202ac551e776b428105994

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\g0268534.exe

                Filesize

                19KB

                MD5

                8b043fd9bdf1539c33c3a05c2d6ee5ed

                SHA1

                adc00f5753bcb326a2bd99cd6970a038456dee45

                SHA256

                53f61137f2386784eb247347d817c2efb977cb95f6d134e464774331c47226f1

                SHA512

                662494bd16a45840cec06a8e1d5b28f5150a703d78a4ebb2ae5f59cfc72c55fa93283484da2b3482b347845b5fafcab00a0d2f770a202ac551e776b428105994

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\h3276333.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\h3276333.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                4b812e55d0ab2956f9ee5d4fd07f3f4e

                SHA1

                0cd26f2b85dc249b4fd46fd5eaf093de384f28ea

                SHA256

                5f6516abeda0a2bb46aef522fcf28fadff491e6870f7c3f77055909ef84cc670

                SHA512

                bc4f5d90589be897358b956aa506bd876159b898dccd495a2190bbabc732589c09aa37a0ef473ef666dfa9496d6ffa6482be0eabc38de56640c9e62744fd3760

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/2420-36-0x00007FFF01C30000-0x00007FFF026F1000-memory.dmp

                Filesize

                10.8MB

              • memory/2420-35-0x0000000000430000-0x000000000043A000-memory.dmp

                Filesize

                40KB

              • memory/2420-38-0x00007FFF01C30000-0x00007FFF026F1000-memory.dmp

                Filesize

                10.8MB

              • memory/4056-58-0x0000000004E20000-0x0000000004E30000-memory.dmp

                Filesize

                64KB

              • memory/4056-61-0x0000000073660000-0x0000000073E10000-memory.dmp

                Filesize

                7.7MB

              • memory/4056-62-0x0000000004E20000-0x0000000004E30000-memory.dmp

                Filesize

                64KB

              • memory/4056-60-0x0000000004F30000-0x0000000004F6C000-memory.dmp

                Filesize

                240KB

              • memory/4056-59-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

                Filesize

                72KB

              • memory/4056-57-0x0000000005040000-0x000000000514A000-memory.dmp

                Filesize

                1.0MB

              • memory/4056-56-0x0000000005550000-0x0000000005B68000-memory.dmp

                Filesize

                6.1MB

              • memory/4056-55-0x0000000073660000-0x0000000073E10000-memory.dmp

                Filesize

                7.7MB

              • memory/4056-54-0x00000000003E0000-0x0000000000410000-memory.dmp

                Filesize

                192KB