Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 14:02

General

  • Target

    be724bb7e6c721dadbd90aaa868d0d5a674b9027b0539d612b03d792d27af99a.exe

  • Size

    1.7MB

  • MD5

    34713911d53a2b05bbd6515b9368c71b

  • SHA1

    bdcb6b879c2ef16102cc1635360f4230d48acd6a

  • SHA256

    be724bb7e6c721dadbd90aaa868d0d5a674b9027b0539d612b03d792d27af99a

  • SHA512

    7ae41740a67c80e60f5c09fa7a3eb3881685fd67db74c59ae2245e6228423ea5db50e34448e32874884c51c2a8e4e883cd6c4512df4dfc844699c1ae21f2abfb

  • SSDEEP

    49152:FKA8pCpuVe2axsqfWtk/JhUvq2lTarh9Eo5yQGWY:18Mc42Asqutk7Uvq2lTarh9E

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be724bb7e6c721dadbd90aaa868d0d5a674b9027b0539d612b03d792d27af99a.exe
    "C:\Users\Admin\AppData\Local\Temp\be724bb7e6c721dadbd90aaa868d0d5a674b9027b0539d612b03d792d27af99a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gm980993.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gm980993.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cg529800.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cg529800.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kb017318.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kb017318.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3372
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aQ604297.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aQ604297.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a43068021.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a43068021.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1328
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5740
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b06891269.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b06891269.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:5288
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 1256
                7⤵
                • Program crash
                PID:3872
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c37965266.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c37965266.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5792
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:6132
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:5528
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5768
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3952
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4084
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2320
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2144
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2100
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d49492268.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d49492268.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2316
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 1220
            5⤵
            • Program crash
            PID:6984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f03270045.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f03270045.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:7016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5288 -ip 5288
    1⤵
      PID:2368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2316 -ip 2316
      1⤵
        PID:6964
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:4360
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5384
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:796
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:2452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gm980993.exe

        Filesize

        1.4MB

        MD5

        f0e34ef6ee36ed438a5dc26a50980ff6

        SHA1

        a2c1e5ded11540852e373396451bf8ef6be38307

        SHA256

        8ec221d685ea21f02d3fb5c140c5ef51deee7396e31f46128bc5fa534cbc6e88

        SHA512

        f91fffc2215d09b531e877a52317c8fd414d6f4a8fcc172e868f9956306ce8d14247ba163a1ff10c82955221e106cd4b6d1dc71115f30c24080bad7333521360

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cg529800.exe

        Filesize

        1.3MB

        MD5

        01534d85d72a90202083ffad9011bff2

        SHA1

        39befc0118ad77a4c187f4ce948df3d8bd24dd4f

        SHA256

        deba7559531f668c6183b4177b0ec4211c9a3496c0af4e3ecf10204baee291bb

        SHA512

        d4d50f41ddab81fed891e678b9698472c2fcf72e40e8f985379e21b86f523ad29707059c392fdc9d484ee83a7163edabfc457e562928d8a1053122a37a4ef94b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f03270045.exe

        Filesize

        169KB

        MD5

        b71b422558d635a0595d84a108ca6758

        SHA1

        c5bc998b6e25b929fbd279579cedcb4fd3d7e2b3

        SHA256

        d3ce77dc9580c64d8c821aa7afb5e4c7ceade02393adcd0a06e12d68ca01160c

        SHA512

        fc94da9aada8581ed3a69efea773d5432869c96c1c375caa3bf4962d9257f635a56ae2a425d4b62a33c07806fcb1a4eae2f359c196ccf2c28e259ac655b31068

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d49492268.exe

        Filesize

        582KB

        MD5

        febd7135f661c487afac15cab00f2bf3

        SHA1

        85ce3830b5c03a958b77155a71335f89b7183cbf

        SHA256

        7681e11ae5cca297ca6f9c74a85fe3f8768044231cc48aa44d87aab8eba1d095

        SHA512

        dc9245a2bf55b3ffde4ab5bcad9c4a81ff56867f52a7129276e0efca6a016f26258891cfd1427d555829fc2931a656cb7301a56c86901007a512bf88c89937ce

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kb017318.exe

        Filesize

        851KB

        MD5

        5745b2c159d6be0a744ed8631da429eb

        SHA1

        f30381c4589611011682fb6a5f623c5476aa4b50

        SHA256

        a7be713a062156d35d68d2ab7ed9d4b91b15295a2d00fcc6ad9018ad88008ce2

        SHA512

        cb1974f4a5c60a46371b559f0c1317454357d61f70a44dc17f34c347d27da42fe9fdcdce4e1cefba5176252e38d4a2bae5b0c341e1bfb6ba3a8795bb61f92dda

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aQ604297.exe

        Filesize

        679KB

        MD5

        e78084d76e624a95c2de8c0f7a32058b

        SHA1

        3c19f9da4d8d1b1caac1f39996f10dd30e4103ed

        SHA256

        068686971355ce3d595b82d76aee3e061ad609d85425749130cc16a404a60a6c

        SHA512

        ea62f49a9fe0a7823a250497fdca94d46e41cba9a58127cb1413485957da11fde17ef075e39b1e6f24f183c3862c9d01e3a1ca71a41005da2c24a4f9050fc20c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c37965266.exe

        Filesize

        205KB

        MD5

        8f6009cf16c7629101e2e3f5dd003cca

        SHA1

        b2476a2de651fa9cdd92a03dd9efb48c5fbcb018

        SHA256

        ffe0ee3d725268c610fb2c5c0756b5f9543f7b8a480c1e9385ec11ec4ea6f1e8

        SHA512

        25657c1d8ffb1dc46768925a030a6c4c27c9586ee85ce6674b2a1d868f99dbb8caa9de0eea1952faf229f20c9d4b6974165a2f16ed216e44077ede2873195350

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a43068021.exe

        Filesize

        302KB

        MD5

        ba7d558c755af24099f1a81d2e5e755f

        SHA1

        33d37969db11931d91b458332b6b1e3f6131bc22

        SHA256

        4dcdf8e4e6babae9a378cdc5e1c1bd62b9f27e92d5453b7a81e16e028f923c1e

        SHA512

        a2b66b56e3dce0bd0c30575e41e666d1af754be23fa48789234d6c5332e0ba04ce78c45b72641ed5b1b77f635c74b10b0081bc86c43101a46ff2efb7d6f3aa40

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b06891269.exe

        Filesize

        521KB

        MD5

        91691a23085b9c24033e9375b917f09c

        SHA1

        5923329bd6180c17de2d6a55eab716be9f0262f0

        SHA256

        4281b083c3a9c14ac739312c3a33388519ab9c3d7fc3da23af9fdae40e2f74a7

        SHA512

        6f92be64c0bcb1f41bd7cfb6add5ff368b927bffc8551e793fd9a05910427e234aad3a6e52f1b86461312aff29727f3257b833b68fd4c00ae69e7192ba1e236e

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/1328-59-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-41-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-97-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-95-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-94-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-92-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-89-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-87-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-85-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-81-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-79-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-77-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-75-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-73-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-71-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-67-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-65-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-61-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-101-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-58-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-53-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-51-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-49-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-47-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-45-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-99-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-83-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-69-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-63-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-39-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-38-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-2166-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

        Filesize

        40KB

      • memory/1328-55-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-35-0x0000000004A10000-0x0000000004A68000-memory.dmp

        Filesize

        352KB

      • memory/1328-43-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/1328-36-0x0000000004C00000-0x00000000051A4000-memory.dmp

        Filesize

        5.6MB

      • memory/1328-37-0x0000000004B20000-0x0000000004B76000-memory.dmp

        Filesize

        344KB

      • memory/2316-4333-0x0000000005540000-0x00000000055A6000-memory.dmp

        Filesize

        408KB

      • memory/2316-4332-0x0000000004D70000-0x0000000004DD8000-memory.dmp

        Filesize

        416KB

      • memory/2316-6480-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/5288-4312-0x0000000005760000-0x00000000057F2000-memory.dmp

        Filesize

        584KB

      • memory/5740-2179-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

        Filesize

        40KB

      • memory/7016-6486-0x00000000003B0000-0x00000000003E0000-memory.dmp

        Filesize

        192KB

      • memory/7016-6487-0x0000000004BD0000-0x0000000004BD6000-memory.dmp

        Filesize

        24KB

      • memory/7016-6488-0x000000000A840000-0x000000000AE58000-memory.dmp

        Filesize

        6.1MB

      • memory/7016-6489-0x000000000A360000-0x000000000A46A000-memory.dmp

        Filesize

        1.0MB

      • memory/7016-6490-0x000000000A290000-0x000000000A2A2000-memory.dmp

        Filesize

        72KB

      • memory/7016-6491-0x000000000A2F0000-0x000000000A32C000-memory.dmp

        Filesize

        240KB

      • memory/7016-6493-0x0000000002420000-0x000000000246C000-memory.dmp

        Filesize

        304KB