Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 08:51

General

  • Target

    b24cd81963b57556ae1bd102ca8ee22a.exe

  • Size

    482KB

  • MD5

    b24cd81963b57556ae1bd102ca8ee22a

  • SHA1

    e8c36efb9a650fe745dda09415d2a5d0813a7619

  • SHA256

    252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8

  • SHA512

    59198a8493f01a61d58eadfec5a96d97b96e0bb78e9a0776638fd02a53b7671e47d53254f2751801c548af65bfdceb7b6928da104ab3a53e35585ec36e5fb158

  • SSDEEP

    12288:FC5b6bew+1WDhTk4qFLrcZfk585i5Q9pJfKPV:Q5BwuEZk40cpk585iwpJf

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.14

C2

http://anfesq.com

http://cbinr.com

http://rimakc.ru

Attributes
  • install_dir

    68fd3d7ade

  • install_file

    Utsysc.exe

  • strings_key

    27ec7fd6f50f63b8af0c1d3deefcc8fe

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b24cd81963b57556ae1bd102ca8ee22a.exe
    "C:\Users\Admin\AppData\Local\Temp\b24cd81963b57556ae1bd102ca8ee22a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2592
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
          4⤵
            PID:1696
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1544
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
            4⤵
              PID:1652
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:432
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
              4⤵
                PID:1260
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {5D675DE1-94F9-40F1-A9C2-27E2A00F6E68} S-1-5-21-1603059206-2004189698-4139800220-1000:AILVMYUM\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1108
          • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
            C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
            2⤵
            • Executes dropped EXE
            PID:584
          • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
            C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
            2⤵
            • Executes dropped EXE
            PID:2800

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\603059206200

          Filesize

          68KB

          MD5

          9acc816f35570eb90e89793c44e8c3c2

          SHA1

          ab48f77f42db57f0d7195ebdf8dc1547729a091c

          SHA256

          b1013ba96beefc0c960d009fbe2ae6275b926202472d929055d412d9e452df9b

          SHA512

          20caba6a3fb25988f05f856e291412611ffbb1ad87b693506299b8dc6e572a86a2535730b8dcf34cfe22f07bbae4e1053a12e036c1ee6dc2c3f76f9169585535

        • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          482KB

          MD5

          b24cd81963b57556ae1bd102ca8ee22a

          SHA1

          e8c36efb9a650fe745dda09415d2a5d0813a7619

          SHA256

          252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8

          SHA512

          59198a8493f01a61d58eadfec5a96d97b96e0bb78e9a0776638fd02a53b7671e47d53254f2751801c548af65bfdceb7b6928da104ab3a53e35585ec36e5fb158

        • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          295KB

          MD5

          140f1b8714120332855be65514d4f155

          SHA1

          24a0ffa209fc76a485025784a8ad2ea4d31050a2

          SHA256

          a1b3fd00e3652c30c30d49c3054ff71e113a6d62e4b0e6f7fadc2b8d5e40410b

          SHA512

          f47d6ae5e04825d7ad901593807e311b37fd1a6a9fd0f9e7b2f2506812acd47531d2e72f7692cbe802689459d192ca8c2d023863a94d30c8a43dda49473b0cfa

        • C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll

          Filesize

          400KB

          MD5

          ef69695087bd182678db21b230b33754

          SHA1

          48fcb6bbae316b839e7f5f409b0748fcbd8e88c2

          SHA256

          5c04ee3746397451fc77706a7c3b4b1f8b8bb57d20136555be4dae218dffe341

          SHA512

          7a4332c23128889693e10d4e43178de0cac7736e5a0ab1f25053f57d3b5d846b97804b74d6d86ca932398e37127bba7b655951509a226452cd4eb198c2e90aab

        • memory/584-45-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/584-46-0x00000000008E0000-0x00000000009E0000-memory.dmp

          Filesize

          1024KB

        • memory/2424-18-0x00000000002F0000-0x000000000035F000-memory.dmp

          Filesize

          444KB

        • memory/2424-4-0x0000000000530000-0x0000000000531000-memory.dmp

          Filesize

          4KB

        • memory/2424-2-0x00000000002F0000-0x000000000035F000-memory.dmp

          Filesize

          444KB

        • memory/2424-3-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2424-17-0x0000000000540000-0x0000000000640000-memory.dmp

          Filesize

          1024KB

        • memory/2424-1-0x0000000000540000-0x0000000000640000-memory.dmp

          Filesize

          1024KB

        • memory/2424-16-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2460-27-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2460-40-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2460-39-0x0000000000530000-0x0000000000630000-memory.dmp

          Filesize

          1024KB

        • memory/2460-21-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2460-20-0x0000000000530000-0x0000000000630000-memory.dmp

          Filesize

          1024KB

        • memory/2460-67-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2460-68-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2460-70-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2800-65-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2800-66-0x0000000000600000-0x0000000000700000-memory.dmp

          Filesize

          1024KB

        • memory/2800-69-0x0000000000600000-0x0000000000700000-memory.dmp

          Filesize

          1024KB