Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 11:28

General

  • Target

    00ad5304c186001d365d8fa95bb11d0e564fb2c3f9cbf83de1ba2e1ccf4d9654.exe

  • Size

    470KB

  • MD5

    4ace07145854a92831c064a173100383

  • SHA1

    dea1676e2b6d7033686333948ff6f810d12e3793

  • SHA256

    00ad5304c186001d365d8fa95bb11d0e564fb2c3f9cbf83de1ba2e1ccf4d9654

  • SHA512

    2bfa8b49b4113f1b22017a9a56b2fe22875dabb384e2b49e4b388f051630a47b4cb6c895e1ee75e836ffb9eecebb2cdb31e32f298bfed905a4a9ef92aa46a2f4

  • SSDEEP

    6144:J10iMdXq004Q3kLnfJKASLdDw6g5VSJKRa5FvJiAIhWXqAEIOubTi:ZkXD04DLnfyDIrRwJiuqH/8

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.19

Botnet

8fc809

C2

http://nudump.com

http://otyt.ru

http://selltix.org

Attributes
  • install_dir

    b739b37d80

  • install_file

    Dctooux.exe

  • strings_key

    65bac8d4c26069c29f1fd276f7af33f3

  • url_paths

    /forum/index.php

    /forum2/index.php

    /forum3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ad5304c186001d365d8fa95bb11d0e564fb2c3f9cbf83de1ba2e1ccf4d9654.exe
    "C:\Users\Admin\AppData\Local\Temp\00ad5304c186001d365d8fa95bb11d0e564fb2c3f9cbf83de1ba2e1ccf4d9654.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 756
      2⤵
      • Program crash
      PID:3188
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 800
      2⤵
      • Program crash
      PID:1216
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 820
      2⤵
      • Program crash
      PID:3712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 904
      2⤵
      • Program crash
      PID:1980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 832
      2⤵
      • Program crash
      PID:4868
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 832
      2⤵
      • Program crash
      PID:3972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 1128
      2⤵
      • Program crash
      PID:772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 1140
      2⤵
      • Program crash
      PID:2460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 1240
      2⤵
      • Program crash
      PID:1148
    • C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      PID:3796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 560
        3⤵
        • Program crash
        PID:1472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 580
        3⤵
        • Program crash
        PID:2972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 584
        3⤵
        • Program crash
        PID:1008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 580
        3⤵
        • Program crash
        PID:1236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 580
        3⤵
        • Program crash
        PID:1980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 700
        3⤵
        • Program crash
        PID:1240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 888
        3⤵
        • Program crash
        PID:1412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 912
        3⤵
        • Program crash
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 904
        3⤵
        • Program crash
        PID:4276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 904
        3⤵
        • Program crash
        PID:1628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 936
        3⤵
        • Program crash
        PID:216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 996
        3⤵
        • Program crash
        PID:1716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1188
        3⤵
        • Program crash
        PID:4616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1188
        3⤵
        • Program crash
        PID:1652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1280
        3⤵
        • Program crash
        PID:400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1432
        3⤵
        • Program crash
        PID:1152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1472
        3⤵
        • Program crash
        PID:1008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 1348
      2⤵
      • Program crash
      PID:2376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4108 -ip 4108
    1⤵
      PID:4256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4108 -ip 4108
      1⤵
        PID:4788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4108 -ip 4108
        1⤵
          PID:1304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4108 -ip 4108
          1⤵
            PID:3988
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4108 -ip 4108
            1⤵
              PID:2880
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4108 -ip 4108
              1⤵
                PID:2444
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4108 -ip 4108
                1⤵
                  PID:1208
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4108 -ip 4108
                  1⤵
                    PID:1700
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4108 -ip 4108
                    1⤵
                      PID:4884
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4108 -ip 4108
                      1⤵
                        PID:708
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3796 -ip 3796
                        1⤵
                          PID:3028
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3796 -ip 3796
                          1⤵
                            PID:3128
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3796 -ip 3796
                            1⤵
                              PID:864
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3796 -ip 3796
                              1⤵
                                PID:1352
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3796 -ip 3796
                                1⤵
                                  PID:2024
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3796 -ip 3796
                                  1⤵
                                    PID:4332
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3796 -ip 3796
                                    1⤵
                                      PID:2248
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3796 -ip 3796
                                      1⤵
                                        PID:2284
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3796 -ip 3796
                                        1⤵
                                          PID:2404
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3796 -ip 3796
                                          1⤵
                                            PID:4428
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3796 -ip 3796
                                            1⤵
                                              PID:4600
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3796 -ip 3796
                                              1⤵
                                                PID:4836
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3796 -ip 3796
                                                1⤵
                                                  PID:1592
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3796 -ip 3796
                                                  1⤵
                                                    PID:2984
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3796 -ip 3796
                                                    1⤵
                                                      PID:228
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3796 -ip 3796
                                                      1⤵
                                                        PID:5068
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3796 -ip 3796
                                                        1⤵
                                                          PID:1420
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
                                                          1⤵
                                                            PID:5112
                                                          • C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
                                                            C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:3692
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 448
                                                              2⤵
                                                              • Program crash
                                                              PID:1828
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3692 -ip 3692
                                                            1⤵
                                                              PID:4848
                                                            • C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
                                                              C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:3304
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 448
                                                                2⤵
                                                                • Program crash
                                                                PID:1308
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3304 -ip 3304
                                                              1⤵
                                                                PID:4160

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Temp\808065738166

                                                                Filesize

                                                                81KB

                                                                MD5

                                                                d039f123fa46969a6de7e3052891110e

                                                                SHA1

                                                                47cda00f757e79f45f2b45f6157ad6302efbbea1

                                                                SHA256

                                                                608a5f639cb2af5e112a5529e0bb4c0316600742b077bdbae3d1088a9b1b1b97

                                                                SHA512

                                                                fdda2c1ed3cc1b5bfea5478c75afc462a5af87859c44b507777c964130101b7e8b0dc1511e86de2f197d9a410308a5251e08f648e286ea7c23816a8670489a98

                                                              • C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

                                                                Filesize

                                                                470KB

                                                                MD5

                                                                4ace07145854a92831c064a173100383

                                                                SHA1

                                                                dea1676e2b6d7033686333948ff6f810d12e3793

                                                                SHA256

                                                                00ad5304c186001d365d8fa95bb11d0e564fb2c3f9cbf83de1ba2e1ccf4d9654

                                                                SHA512

                                                                2bfa8b49b4113f1b22017a9a56b2fe22875dabb384e2b49e4b388f051630a47b4cb6c895e1ee75e836ffb9eecebb2cdb31e32f298bfed905a4a9ef92aa46a2f4

                                                              • memory/3304-60-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3692-51-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3692-50-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3692-49-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3692-48-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3796-24-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3796-32-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3796-25-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3796-44-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3796-26-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/3796-28-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/4108-22-0x0000000000400000-0x0000000000472000-memory.dmp

                                                                Filesize

                                                                456KB

                                                              • memory/4108-21-0x0000000000610000-0x000000000067F000-memory.dmp

                                                                Filesize

                                                                444KB

                                                              • memory/4108-1-0x00000000006A0000-0x00000000007A0000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/4108-20-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/4108-9-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/4108-5-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                Filesize

                                                                536KB

                                                              • memory/4108-3-0x0000000000400000-0x0000000000472000-memory.dmp

                                                                Filesize

                                                                456KB

                                                              • memory/4108-2-0x0000000000610000-0x000000000067F000-memory.dmp

                                                                Filesize

                                                                444KB