Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    63s
  • max time network
    72s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 03:29

Errors

Reason
Machine shutdown

General

  • Target

    4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97.exe

  • Size

    1.0MB

  • MD5

    0750baf6c545d259d79fd912c87b1177

  • SHA1

    21678bc0d0d85b78861ef0d47e68f91d18682d1e

  • SHA256

    4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97

  • SHA512

    12b0e81c5730744b74e08e7eacf598f0e0b2360c1e4b49bae3531168774a545688b40085c17042ad308582ce68cbb3f5fe5dd158ea4c1b2954e1213bd3791c86

  • SSDEEP

    12288:DMr8y90pCx7vr7ajY55K4VLZv+NTkSJIfc+LjvWQMqO4zeD26xn1fHMSwaB/7HzS:fy3jzvgxmLjvli4zeD2OC/KHdUBxYWj

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97.exe
    "C:\Users\Admin\AppData\Local\Temp\4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1796
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3536
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2104
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4932
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:4852
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 540
                    8⤵
                    • Program crash
                    PID:1900
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 552
                  7⤵
                  • Program crash
                  PID:3748
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3459872.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3459872.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:5092
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:4052
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 552
                  6⤵
                  • Program crash
                  PID:4076
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0276525.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0276525.exe
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3520
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k shutdown -s -t 0
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1596
                • C:\Windows\SysWOW64\shutdown.exe
                  shutdown -s -t 0
                  6⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4932 -ip 4932
        1⤵
          PID:2136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4852 -ip 4852
          1⤵
            PID:1492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5092 -ip 5092
            1⤵
              PID:1984
            • C:\Windows\system32\LogonUI.exe
              "LogonUI.exe" /flags:0x4 /state0:0xa39b4855 /state1:0x41c64e6d
              1⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              PID:2196

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe

              Filesize

              967KB

              MD5

              970cbd047873b7441b91af31eaa64588

              SHA1

              600fa38705e336d34f33b642a0feab7caf6955b9

              SHA256

              3c5cf5f2b9e5d37daafd586cd27eae2473293fcabcb560dca6004ca7bae39aff

              SHA512

              400e06ab766729742f8d92182a0620315a34b8ef7f2f8cdce3dfefbe7649fa93d1ba97c14d27e274118b0ddda99860896f08eab5f9f853ecdf76848e35b54636

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe

              Filesize

              967KB

              MD5

              970cbd047873b7441b91af31eaa64588

              SHA1

              600fa38705e336d34f33b642a0feab7caf6955b9

              SHA256

              3c5cf5f2b9e5d37daafd586cd27eae2473293fcabcb560dca6004ca7bae39aff

              SHA512

              400e06ab766729742f8d92182a0620315a34b8ef7f2f8cdce3dfefbe7649fa93d1ba97c14d27e274118b0ddda99860896f08eab5f9f853ecdf76848e35b54636

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe

              Filesize

              787KB

              MD5

              9ff65fe045ef6d686590f66bf8e2d472

              SHA1

              e3c664978b2542fb0060f118262b496fa171948a

              SHA256

              8a69e91161e7d10c4b93f0210b2f6d4e05024761effe0b0d05d149dc21f7fe72

              SHA512

              3dc06df0f58d8193a85627bc9282e0acff78c9c0d55bff12e57f8069dedd6b60b4ea8b7845c4be837473238f23d35c154419880ffd9020672ca742aab9f5732d

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe

              Filesize

              787KB

              MD5

              9ff65fe045ef6d686590f66bf8e2d472

              SHA1

              e3c664978b2542fb0060f118262b496fa171948a

              SHA256

              8a69e91161e7d10c4b93f0210b2f6d4e05024761effe0b0d05d149dc21f7fe72

              SHA512

              3dc06df0f58d8193a85627bc9282e0acff78c9c0d55bff12e57f8069dedd6b60b4ea8b7845c4be837473238f23d35c154419880ffd9020672ca742aab9f5732d

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0276525.exe

              Filesize

              219KB

              MD5

              c256a814d3f9d02d73029580dfe882b3

              SHA1

              e11e9ea937183139753f3b0d5e71c8301d000896

              SHA256

              53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

              SHA512

              1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0276525.exe

              Filesize

              219KB

              MD5

              c256a814d3f9d02d73029580dfe882b3

              SHA1

              e11e9ea937183139753f3b0d5e71c8301d000896

              SHA256

              53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

              SHA512

              1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe

              Filesize

              604KB

              MD5

              4d0e3f87d9336562529914d5748e221a

              SHA1

              3a69697feb26c02a8cb30d3b3e044189ee0409cf

              SHA256

              5a96743df8bd37c26b18206c11d16e57548952fae3cf40a3af5e7805f47626ab

              SHA512

              ada587dc3fe6af01af562044fad494b0faa8480f95a0d7dafb54920859e0c3c5797a3ded15ca74d80cb88e9597d94545d7413c4e152ef87134e505dcebd41f39

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe

              Filesize

              604KB

              MD5

              4d0e3f87d9336562529914d5748e221a

              SHA1

              3a69697feb26c02a8cb30d3b3e044189ee0409cf

              SHA256

              5a96743df8bd37c26b18206c11d16e57548952fae3cf40a3af5e7805f47626ab

              SHA512

              ada587dc3fe6af01af562044fad494b0faa8480f95a0d7dafb54920859e0c3c5797a3ded15ca74d80cb88e9597d94545d7413c4e152ef87134e505dcebd41f39

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3459872.exe

              Filesize

              384KB

              MD5

              6d98475a7aaebcd0c106a7dd5713f569

              SHA1

              43bf4e20fdc44983b078068f65c70444e9ffaccf

              SHA256

              5fc378652ecdd51e4d8358b3fbfc782d05a4ec797dc8e35200aac8c6449eb206

              SHA512

              a2a0af1865d6157439331a6f1083635998f1ba0c27a3b8621e5a768a4aa2eda86295cfd58a1b083012adcdde4a3c49673dbc190b8bbb4d5bbd7a65189e20dc90

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3459872.exe

              Filesize

              384KB

              MD5

              6d98475a7aaebcd0c106a7dd5713f569

              SHA1

              43bf4e20fdc44983b078068f65c70444e9ffaccf

              SHA256

              5fc378652ecdd51e4d8358b3fbfc782d05a4ec797dc8e35200aac8c6449eb206

              SHA512

              a2a0af1865d6157439331a6f1083635998f1ba0c27a3b8621e5a768a4aa2eda86295cfd58a1b083012adcdde4a3c49673dbc190b8bbb4d5bbd7a65189e20dc90

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe

              Filesize

              339KB

              MD5

              f817e9bb61fba7052fbca6d45087b47e

              SHA1

              fd02eec013a86793c0aff86c1ac405edcae9390d

              SHA256

              f0ab43e45b92954965e97fb1051a6276caf570f4070d7268ef0c2c662c0c6456

              SHA512

              f25751c8477c351b2060c0edce1f58de9b44fbbf58342ff668866fac898da5e174215de314f8c14dde6fb93969ab7a72cd97fcfb8f3580ad1915f794f1bb1398

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe

              Filesize

              339KB

              MD5

              f817e9bb61fba7052fbca6d45087b47e

              SHA1

              fd02eec013a86793c0aff86c1ac405edcae9390d

              SHA256

              f0ab43e45b92954965e97fb1051a6276caf570f4070d7268ef0c2c662c0c6456

              SHA512

              f25751c8477c351b2060c0edce1f58de9b44fbbf58342ff668866fac898da5e174215de314f8c14dde6fb93969ab7a72cd97fcfb8f3580ad1915f794f1bb1398

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe

              Filesize

              12KB

              MD5

              d4b4a7772f6f8f85412c699b77011ccd

              SHA1

              59d21e924091eab299069ae82857bc2b5024f349

              SHA256

              ade5ce5bb4273683eb42b86d71401c35f9be04195a203b0bc5ac56e251a1e250

              SHA512

              5ee245333150f8bffa059609f7c1548540466db8a43cdfa47d118bdc1d667acfb6712dee5fc166ae6199cc0abc992c0968e7ae4cfbae769e9ee4486bdab10c74

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe

              Filesize

              12KB

              MD5

              d4b4a7772f6f8f85412c699b77011ccd

              SHA1

              59d21e924091eab299069ae82857bc2b5024f349

              SHA256

              ade5ce5bb4273683eb42b86d71401c35f9be04195a203b0bc5ac56e251a1e250

              SHA512

              5ee245333150f8bffa059609f7c1548540466db8a43cdfa47d118bdc1d667acfb6712dee5fc166ae6199cc0abc992c0968e7ae4cfbae769e9ee4486bdab10c74

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

              Filesize

              365KB

              MD5

              e56fcc3fe5142a780463706514125707

              SHA1

              a397a582674625bbe519a037271403d0751273b9

              SHA256

              cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

              SHA512

              17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

              Filesize

              365KB

              MD5

              e56fcc3fe5142a780463706514125707

              SHA1

              a397a582674625bbe519a037271403d0751273b9

              SHA256

              cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

              SHA512

              17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

            • memory/2104-38-0x00007FFE24380000-0x00007FFE24E41000-memory.dmp

              Filesize

              10.8MB

            • memory/2104-35-0x0000000000FE0000-0x0000000000FEA000-memory.dmp

              Filesize

              40KB

            • memory/2104-36-0x00007FFE24380000-0x00007FFE24E41000-memory.dmp

              Filesize

              10.8MB

            • memory/4052-55-0x0000000003020000-0x0000000003026000-memory.dmp

              Filesize

              24KB

            • memory/4052-50-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/4052-51-0x0000000073A90000-0x0000000074240000-memory.dmp

              Filesize

              7.7MB

            • memory/4052-56-0x0000000005E40000-0x0000000006458000-memory.dmp

              Filesize

              6.1MB

            • memory/4052-57-0x0000000005930000-0x0000000005A3A000-memory.dmp

              Filesize

              1.0MB

            • memory/4052-58-0x0000000005810000-0x0000000005820000-memory.dmp

              Filesize

              64KB

            • memory/4052-59-0x00000000057C0000-0x00000000057D2000-memory.dmp

              Filesize

              72KB

            • memory/4052-60-0x0000000073A90000-0x0000000074240000-memory.dmp

              Filesize

              7.7MB

            • memory/4852-42-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/4852-46-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/4852-44-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/4852-43-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB