Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 19:13

General

  • Target

    file.exe

  • Size

    481KB

  • MD5

    f9a4f6684d1bf48406a42921aebc1596

  • SHA1

    c9186ff53de4724ede20c6485136b4b2072bb6a6

  • SHA256

    e0a051f93d4c1e81cc142181d14249e246be4c169645d667267134b664e75042

  • SHA512

    67294a47dfef6aba404939497c403f93318841e9c5ee28b706f7506b5dff2630381e28e86f6dcbfdff2427092a515db1dc0a04e334e7f8de8b0b682269ff88fd

  • SSDEEP

    12288:UHdftnB3Zp+52J9+62HHLhJ3er8XSwW0:UNz3ZwwJ9+7HFnXP

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

cd33f9

C2

http://193.176.158.185

Attributes
  • install_dir

    fed0c9a4d3

  • install_file

    Hkbsse.exe

  • strings_key

    a2163aef710017f5548e7e730af53cca

  • url_paths

    /B0kf3CbAbR/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe
      "C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1623b75a3df630\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1623b75a3df630\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2372
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Network Configuration Discovery: Wi-Fi Discovery
            PID:800
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\294248377141_Desktop.zip' -CompressionLevel Optimal
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1996
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\1623b75a3df630\clip64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\294248377141

    Filesize

    51KB

    MD5

    018ebda768257ab5ab742690ef5d1a46

    SHA1

    3918677d27e62ae3f0b70689877cf31cde0fb5bd

    SHA256

    9cf9dd025c49da06adc3bd90afb8a5caa498839e47ad4ea06bee0451cfb2b5c0

    SHA512

    8de2ab8642b70ea12d1e9ba37cfa35d8ecb0f1f1468f3ad61e1af396b832951d3ab0714720a9d1956f4a5f87f2e28c9bf433a14921b0dcc0c9b5dd7fc3a04fa5

  • C:\Users\Admin\AppData\Roaming\1623b75a3df630\clip64.dll

    Filesize

    127KB

    MD5

    427f3072bdd451e710818c7bb747f48c

    SHA1

    548d89b6e63dddcb8e1a4bbc315ae7d51de99c9b

    SHA256

    382101ea8469e7d5d47a794359c2c3a33eb7f13cf3257a178ab083d0937dad47

    SHA512

    14f046cf86db4dfa2bd946c1951b261b0a94cac066f8941f463f319c667aa7b13f157648f3b00377780f67cdcb6db5d901d397ca125d4ae78390709c7b6419c0

  • C:\Users\Admin\AppData\Roaming\1623b75a3df630\cred64.dll

    Filesize

    1.2MB

    MD5

    4c3dae7199f99fae23325df41d16b097

    SHA1

    3e20881f65b43c4a802f674008e380d975687456

    SHA256

    fb7fe89ee4460053c3dc676e97aa1657670d9e41a22db9b7b354995a5c1d4382

    SHA512

    fcbd82a6308b9647d1859b855afe79da2a240abfe845d8ba00b4a56f9fc7d30ff408fb6c684985398fe41515fea81113749f37edfd7ba99c4deb7f6507f93e6d

  • \Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe

    Filesize

    481KB

    MD5

    f9a4f6684d1bf48406a42921aebc1596

    SHA1

    c9186ff53de4724ede20c6485136b4b2072bb6a6

    SHA256

    e0a051f93d4c1e81cc142181d14249e246be4c169645d667267134b664e75042

    SHA512

    67294a47dfef6aba404939497c403f93318841e9c5ee28b706f7506b5dff2630381e28e86f6dcbfdff2427092a515db1dc0a04e334e7f8de8b0b682269ff88fd

  • memory/1996-63-0x00000000022A0000-0x00000000022A8000-memory.dmp

    Filesize

    32KB

  • memory/1996-62-0x000000001B540000-0x000000001B822000-memory.dmp

    Filesize

    2.9MB

  • memory/2140-16-0x0000000000400000-0x0000000002860000-memory.dmp

    Filesize

    36.4MB

  • memory/2140-19-0x0000000003FF0000-0x000000000405E000-memory.dmp

    Filesize

    440KB

  • memory/2140-21-0x0000000000400000-0x0000000002860000-memory.dmp

    Filesize

    36.4MB

  • memory/2140-20-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/2140-18-0x00000000002F0000-0x00000000003F0000-memory.dmp

    Filesize

    1024KB

  • memory/2140-2-0x0000000003FF0000-0x000000000405E000-memory.dmp

    Filesize

    440KB

  • memory/2140-3-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/2140-1-0x00000000002F0000-0x00000000003F0000-memory.dmp

    Filesize

    1024KB

  • memory/3004-33-0x0000000000400000-0x0000000002860000-memory.dmp

    Filesize

    36.4MB

  • memory/3004-34-0x0000000000400000-0x0000000002860000-memory.dmp

    Filesize

    36.4MB

  • memory/3004-69-0x0000000000400000-0x0000000002860000-memory.dmp

    Filesize

    36.4MB

  • memory/3004-83-0x0000000000400000-0x0000000002860000-memory.dmp

    Filesize

    36.4MB