Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 01:24
Behavioral task
behavioral1
Sample
0x00040000000186dc-59.exe
Resource
win7-20230831-en
General
-
Target
0x00040000000186dc-59.exe
-
Size
219KB
-
MD5
9eb6714332584787b5722a885f590c4a
-
SHA1
ecd3ec2a217b524a451d276bc16a96747a80804a
-
SHA256
55604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
-
SHA512
5593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1980 explonde.exe 2876 explonde.exe 2840 explonde.exe -
Loads dropped DLL 5 IoCs
pid Process 2124 0x00040000000186dc-59.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1980 2124 0x00040000000186dc-59.exe 29 PID 2124 wrote to memory of 1980 2124 0x00040000000186dc-59.exe 29 PID 2124 wrote to memory of 1980 2124 0x00040000000186dc-59.exe 29 PID 2124 wrote to memory of 1980 2124 0x00040000000186dc-59.exe 29 PID 1980 wrote to memory of 2304 1980 explonde.exe 30 PID 1980 wrote to memory of 2304 1980 explonde.exe 30 PID 1980 wrote to memory of 2304 1980 explonde.exe 30 PID 1980 wrote to memory of 2304 1980 explonde.exe 30 PID 1980 wrote to memory of 2672 1980 explonde.exe 32 PID 1980 wrote to memory of 2672 1980 explonde.exe 32 PID 1980 wrote to memory of 2672 1980 explonde.exe 32 PID 1980 wrote to memory of 2672 1980 explonde.exe 32 PID 2672 wrote to memory of 2744 2672 cmd.exe 34 PID 2672 wrote to memory of 2744 2672 cmd.exe 34 PID 2672 wrote to memory of 2744 2672 cmd.exe 34 PID 2672 wrote to memory of 2744 2672 cmd.exe 34 PID 2672 wrote to memory of 2772 2672 cmd.exe 35 PID 2672 wrote to memory of 2772 2672 cmd.exe 35 PID 2672 wrote to memory of 2772 2672 cmd.exe 35 PID 2672 wrote to memory of 2772 2672 cmd.exe 35 PID 2672 wrote to memory of 2536 2672 cmd.exe 36 PID 2672 wrote to memory of 2536 2672 cmd.exe 36 PID 2672 wrote to memory of 2536 2672 cmd.exe 36 PID 2672 wrote to memory of 2536 2672 cmd.exe 36 PID 2672 wrote to memory of 3056 2672 cmd.exe 37 PID 2672 wrote to memory of 3056 2672 cmd.exe 37 PID 2672 wrote to memory of 3056 2672 cmd.exe 37 PID 2672 wrote to memory of 3056 2672 cmd.exe 37 PID 2672 wrote to memory of 2644 2672 cmd.exe 38 PID 2672 wrote to memory of 2644 2672 cmd.exe 38 PID 2672 wrote to memory of 2644 2672 cmd.exe 38 PID 2672 wrote to memory of 2644 2672 cmd.exe 38 PID 2672 wrote to memory of 2780 2672 cmd.exe 39 PID 2672 wrote to memory of 2780 2672 cmd.exe 39 PID 2672 wrote to memory of 2780 2672 cmd.exe 39 PID 2672 wrote to memory of 2780 2672 cmd.exe 39 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1980 wrote to memory of 3036 1980 explonde.exe 44 PID 1508 wrote to memory of 2876 1508 taskeng.exe 45 PID 1508 wrote to memory of 2876 1508 taskeng.exe 45 PID 1508 wrote to memory of 2876 1508 taskeng.exe 45 PID 1508 wrote to memory of 2876 1508 taskeng.exe 45 PID 1508 wrote to memory of 2840 1508 taskeng.exe 46 PID 1508 wrote to memory of 2840 1508 taskeng.exe 46 PID 1508 wrote to memory of 2840 1508 taskeng.exe 46 PID 1508 wrote to memory of 2840 1508 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00040000000186dc-59.exe"C:\Users\Admin\AppData\Local\Temp\0x00040000000186dc-59.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:2304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:2772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:2536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2780
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:3036
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9AAE274D-D2C3-4C9B-BF2F-098FC877E2D8} S-1-5-21-3513876443-2771975297-1923446376-1000:GPFFWLPI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD59eb6714332584787b5722a885f590c4a
SHA1ecd3ec2a217b524a451d276bc16a96747a80804a
SHA25655604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
SHA5125593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
Filesize
219KB
MD59eb6714332584787b5722a885f590c4a
SHA1ecd3ec2a217b524a451d276bc16a96747a80804a
SHA25655604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
SHA5125593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
Filesize
219KB
MD59eb6714332584787b5722a885f590c4a
SHA1ecd3ec2a217b524a451d276bc16a96747a80804a
SHA25655604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
SHA5125593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
Filesize
219KB
MD59eb6714332584787b5722a885f590c4a
SHA1ecd3ec2a217b524a451d276bc16a96747a80804a
SHA25655604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
SHA5125593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
Filesize
219KB
MD59eb6714332584787b5722a885f590c4a
SHA1ecd3ec2a217b524a451d276bc16a96747a80804a
SHA25655604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
SHA5125593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
219KB
MD59eb6714332584787b5722a885f590c4a
SHA1ecd3ec2a217b524a451d276bc16a96747a80804a
SHA25655604d215db0a7ff3c22c56ddc9320c9ea9e0042fcae7bcde80d560c715e02e0
SHA5125593eecbdf5068c67d9bfd200d7a26a8a8702e789a7cc712ef71f9a4bf2cbb7151bddf98c330cf50531f7d0822c8494bc9756dc3c06c1558e95417760d46f922
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6