Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 06:56
Behavioral task
behavioral1
Sample
ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe
Resource
win7-20230831-en
General
-
Target
ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe
-
Size
241KB
-
MD5
043b940dbf7132aa4bcf9d910fbc8987
-
SHA1
57b3f509983705e27fbe72eea3623541570b8b6e
-
SHA256
ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5
-
SHA512
1f708ed54a8463ca282e86e3b7034dc6028699b91b448286626e85a4481a55b59820a5d9929edd4241499d8ebb06d40c4b1e8eb589f6695dfdd54bbd3ed9594a
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 explonde.exe -
Loads dropped DLL 1 IoCs
pid Process 640 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4924 4160 ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe 89 PID 4160 wrote to memory of 4924 4160 ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe 89 PID 4160 wrote to memory of 4924 4160 ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe 89 PID 4924 wrote to memory of 4912 4924 explonde.exe 90 PID 4924 wrote to memory of 4912 4924 explonde.exe 90 PID 4924 wrote to memory of 4912 4924 explonde.exe 90 PID 4924 wrote to memory of 3780 4924 explonde.exe 92 PID 4924 wrote to memory of 3780 4924 explonde.exe 92 PID 4924 wrote to memory of 3780 4924 explonde.exe 92 PID 3780 wrote to memory of 4988 3780 cmd.exe 94 PID 3780 wrote to memory of 4988 3780 cmd.exe 94 PID 3780 wrote to memory of 4988 3780 cmd.exe 94 PID 3780 wrote to memory of 1828 3780 cmd.exe 95 PID 3780 wrote to memory of 1828 3780 cmd.exe 95 PID 3780 wrote to memory of 1828 3780 cmd.exe 95 PID 3780 wrote to memory of 2232 3780 cmd.exe 96 PID 3780 wrote to memory of 2232 3780 cmd.exe 96 PID 3780 wrote to memory of 2232 3780 cmd.exe 96 PID 3780 wrote to memory of 2420 3780 cmd.exe 98 PID 3780 wrote to memory of 2420 3780 cmd.exe 98 PID 3780 wrote to memory of 2420 3780 cmd.exe 98 PID 3780 wrote to memory of 4192 3780 cmd.exe 97 PID 3780 wrote to memory of 4192 3780 cmd.exe 97 PID 3780 wrote to memory of 4192 3780 cmd.exe 97 PID 3780 wrote to memory of 5076 3780 cmd.exe 99 PID 3780 wrote to memory of 5076 3780 cmd.exe 99 PID 3780 wrote to memory of 5076 3780 cmd.exe 99 PID 4924 wrote to memory of 640 4924 explonde.exe 109 PID 4924 wrote to memory of 640 4924 explonde.exe 109 PID 4924 wrote to memory of 640 4924 explonde.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe"C:\Users\Admin\AppData\Local\Temp\ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:1828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:2232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:4192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:5076
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5043b940dbf7132aa4bcf9d910fbc8987
SHA157b3f509983705e27fbe72eea3623541570b8b6e
SHA256ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5
SHA5121f708ed54a8463ca282e86e3b7034dc6028699b91b448286626e85a4481a55b59820a5d9929edd4241499d8ebb06d40c4b1e8eb589f6695dfdd54bbd3ed9594a
-
Filesize
241KB
MD5043b940dbf7132aa4bcf9d910fbc8987
SHA157b3f509983705e27fbe72eea3623541570b8b6e
SHA256ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5
SHA5121f708ed54a8463ca282e86e3b7034dc6028699b91b448286626e85a4481a55b59820a5d9929edd4241499d8ebb06d40c4b1e8eb589f6695dfdd54bbd3ed9594a
-
Filesize
241KB
MD5043b940dbf7132aa4bcf9d910fbc8987
SHA157b3f509983705e27fbe72eea3623541570b8b6e
SHA256ca96a4afc00cc09ed722ca3d18a244ca1aa63a3d949fdc7af53e9dd9d6e971a5
SHA5121f708ed54a8463ca282e86e3b7034dc6028699b91b448286626e85a4481a55b59820a5d9929edd4241499d8ebb06d40c4b1e8eb589f6695dfdd54bbd3ed9594a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d