Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    296s
  • max time network
    289s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/06/2024, 05:37

General

  • Target

    9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe

  • Size

    1.8MB

  • MD5

    c7f6fb7822a4e281ba6ad23313d79c92

  • SHA1

    2a6a9e04a5f9419c3742cbe5f44cba2e02bbddec

  • SHA256

    9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4

  • SHA512

    57ebdf7507f18b5f9bf04248fad1397862d638f77152f683c941e71b7f6fad2116a48cffcf4a78793d8267b4113114934289111b2f846a3b2bea0e48bfb83790

  • SSDEEP

    49152:MhmFyCGytJt9uczgZWzQdX1ASJ4YXs2JWaUuFS:MUNbucSoQx9PsatUu

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe
    "C:\Users\Admin\AppData\Local\Temp\9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:4360
        • C:\Users\Admin\AppData\Local\Temp\1000016001\0f149c3688.exe
          "C:\Users\Admin\AppData\Local\Temp\1000016001\0f149c3688.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:2932
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:428
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2360
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4248
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2692
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1000016001\0f149c3688.exe

      Filesize

      2.3MB

      MD5

      7cfeaeccbe1e171218a5b4ea49bff0d6

      SHA1

      5f357caf7bffba938a455639915269b2ac05e395

      SHA256

      041c058f3cbacbf7627fed950268e8720b5e7e44ce1558bac2c2d6e0a117af9c

      SHA512

      eb3366bd543d956e6d71dc3f4590b017fbc7d5cb8a99973edbc3c4ecf0ada0ea3f26fb03a612c0e0a333468e5e504f9ba6063f849635d632040c04a975033ec7

    • C:\Users\Admin\AppData\Local\Temp\1000017001\f16c4e9cb9.exe

      Filesize

      1.9MB

      MD5

      25433a6f6d376aac1e835826e99b29f9

      SHA1

      343c8403aee7707f99021bef5169ad735ff607c0

      SHA256

      57d7e19bb6a898b52da0384506d31f6961233752bf5d827b70b9f28fd7547dc8

      SHA512

      d66776bc3ab3f01c3519ee4f1de49180b6c91a7b922551d9b163f11571982b1173ba5f4c211a8c65b2ba90b62c1e5500a5599c650a7012aa5e5e8469d0152ce7

    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

      Filesize

      1.8MB

      MD5

      c7f6fb7822a4e281ba6ad23313d79c92

      SHA1

      2a6a9e04a5f9419c3742cbe5f44cba2e02bbddec

      SHA256

      9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4

      SHA512

      57ebdf7507f18b5f9bf04248fad1397862d638f77152f683c941e71b7f6fad2116a48cffcf4a78793d8267b4113114934289111b2f846a3b2bea0e48bfb83790

    • memory/428-22-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/428-21-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/2360-33-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/2692-68-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/2932-84-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-86-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-102-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-100-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-98-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-58-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-96-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-64-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-66-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-90-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-88-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-70-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-62-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-72-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/2932-60-0x0000000001270000-0x0000000001862000-memory.dmp

      Filesize

      5.9MB

    • memory/3288-92-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/3288-94-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/3816-5-0x00000000013E0000-0x00000000018A9000-memory.dmp

      Filesize

      4.8MB

    • memory/3816-0-0x00000000013E0000-0x00000000018A9000-memory.dmp

      Filesize

      4.8MB

    • memory/3816-3-0x00000000013E0000-0x00000000018A9000-memory.dmp

      Filesize

      4.8MB

    • memory/3816-2-0x00000000013E1000-0x000000000140F000-memory.dmp

      Filesize

      184KB

    • memory/3816-1-0x0000000077134000-0x0000000077135000-memory.dmp

      Filesize

      4KB

    • memory/3816-13-0x00000000013E0000-0x00000000018A9000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-30-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-61-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-44-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-17-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-59-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-16-0x00000000003C1000-0x00000000003EF000-memory.dmp

      Filesize

      184KB

    • memory/4064-41-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-85-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-63-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-38-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-65-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-37-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-36-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-69-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-35-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-71-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-34-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-45-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-83-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-29-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-28-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-27-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-87-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-26-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-89-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-25-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-24-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-23-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-95-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-14-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-97-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-19-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-99-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-18-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4064-101-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB

    • memory/4248-43-0x00000000003C0000-0x0000000000889000-memory.dmp

      Filesize

      4.8MB