Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe
Resource
win10v2004-20240226-en
General
-
Target
57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe
-
Size
2.7MB
-
MD5
8fe596f81a362abfd41fe74464b8e672
-
SHA1
4b1a892cb73a3b359ad6a4f9e322e33d06202cd7
-
SHA256
57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8
-
SHA512
9b9fcb90297263f01f6daf4de7f926476bd8ec20e022ad1585b3d5927bc71728c75659a3f3ded2649565c4df2cf3dfdfe0ee5505a661b47df444c880c94897b4
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBz9w4Sx:+R0pI/IQlUoMPdmpSpr4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4620 aoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeA5\\aoptisys.exe" 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBS5\\bodxec.exe" 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 4620 aoptisys.exe 4620 aoptisys.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4620 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 91 PID 2184 wrote to memory of 4620 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 91 PID 2184 wrote to memory of 4620 2184 57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe"C:\Users\Admin\AppData\Local\Temp\57d12c6d11971bf8c2c46ec2761b484189fb992989f9a6f25c2b80fc92b232e8.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\AdobeA5\aoptisys.exeC:\AdobeA5\aoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d37fb1f7c2c9294c3c723b89a8ff1a47
SHA12f9d24437ae0904a350cf414dce94dfa5701b367
SHA2561440992dce683d836b18e6abb35570e319e53ea7a1252e2b50fd15047ee3ea64
SHA5120a7bf43b9181479a3411b0359b76d46beac7bdd4d7dee551b6092db6500f4b9529c5ba6d315d5a2346638c3d79273011e093ef365c889a60d374625d038f20e1
-
Filesize
2.7MB
MD575691ba49e691c5d4b81f176bd755666
SHA192b7c9459699a009a0f082657c9c2694b321082a
SHA2562b9ea90eb2bac97aa7eb3554b25553b0a051d98c5e61b88c90b14d20293ef5dc
SHA5121cbee836fb073f6ad9d18fa0204aea9257e3811a6024a077e4db10944ba14eca74d070869a6325317a0b8fa1f5b7c971791509cac7bbfa774e4329f3d0f31755
-
Filesize
200B
MD5212a3048dc47d41b2cb3c8748b9ffd18
SHA18ff881ddd4389fe8de520d19e76c3056d07f2f8c
SHA2567ffab7d76123cef60ec480b7b65922eac95f025ba03e6aec466761c37d37b725
SHA51232f1bf3b4172e39ac81961795b64bf7e5baac96241cdb75b144654582b8abe497101d0eac9f3b5eda1a4188ed900fe126808b7a270ad2f5ddff8f4462d99c024