Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe
Resource
win10v2004-20240704-en
General
-
Target
1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe
-
Size
2.7MB
-
MD5
7a7c0c8e6176e4225a0482e6b7727110
-
SHA1
72e6a9d0ea32ee104e63c7793574bce1428af72d
-
SHA256
1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee
-
SHA512
1badccbcee34798f937a5ca50efc78f1e8afad207dfd877b49507a9b121a6255a41240aaea7e14fe2b267d8acf9d71e370d51652c020d18ae1638103c78cca9c
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBm9w4Sx:+R0pI/IQlUoMPdmpSpc4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 aoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeV8\\aoptisys.exe" 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBFN\\dobxloc.exe" 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 2760 aoptisys.exe 2760 aoptisys.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 2760 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 83 PID 4040 wrote to memory of 2760 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 83 PID 4040 wrote to memory of 2760 4040 1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe"C:\Users\Admin\AppData\Local\Temp\1b3eb09ce2181d1063cf1f1c89ca0a47ce850852f17e9a7f4623e4cd6aa230ee.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\AdobeV8\aoptisys.exeC:\AdobeV8\aoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD55271dc91d35be85cb16ac5ccfb7d2852
SHA17a7554e63a761bad547526b3b74f7663d543ffd5
SHA25667a79b26768d24722b8fa32b75afed9ee98829db4208891f50db680bc15990c4
SHA5123e94804bd2a9d634cd549c129cc1cd0a4b5e5e862c8b63c6e269fdbaf0da444ea073baf8505cfd38a8d84412cb31720f2dfd2a43e1c28086b9cdc7a250a6895d
-
Filesize
341KB
MD52e0ae0c41c18acca50d6b2b2301ac5d9
SHA1695c12079dec0342ae2bb3ef607776b6fb78dede
SHA256bc9d56bc05adb3c6bbd18391745ef20bd878be41c2cefa4f588bc8ac70471c05
SHA512ac9c58a3e46a744c48a2b6989c484a47502e0fe531285b5fff83e27652911b4af1e59b3a2fcf2c7685399965a16d78dd964f24c618324da58bb6a34ff431ca79
-
Filesize
202B
MD548d473dca7aa11dbc791e471f81ce4b6
SHA162c04db6363132936eca81bd68a5029de0e278cf
SHA256ea22555b0c82c5d5e58156a722e242f46821b487c052dc9c3fd32593c1320a06
SHA51227a90cad26f767582f50e075396657531efe0cadbc2bd8babaecb58acbfa7949949f3c37435036db42bc6b000d122f810a053846f1bc6fcad2f13d649579e25c