Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe
Resource
win10v2004-20240708-en
General
-
Target
d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe
-
Size
2.7MB
-
MD5
7f176e69f1362c0c1337af4149cb751c
-
SHA1
2cf250b2f27cfcb9850ae8b60e43fb2f93822d7f
-
SHA256
d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea
-
SHA512
0786145e68b19b6b1e8ee765bb06b1dbd822e69378296cc18a54aa25d637388fe102f11266a28bd56bf311f5d3a6dc4e0b63ed277b506c5678b91abc55a24e3a
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBF9w4Sx:+R0pI/IQlUoMPdmpSpR4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 adobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3310979990-555183016-1244931625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotJK\\adobloc.exe" d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-3310979990-555183016-1244931625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBTQ\\bodxloc.exe" d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 5012 adobloc.exe 5012 adobloc.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2132 wrote to memory of 5012 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 83 PID 2132 wrote to memory of 5012 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 83 PID 2132 wrote to memory of 5012 2132 d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe"C:\Users\Admin\AppData\Local\Temp\d7c73b050e80094a4b108a31c9dc4904b4dcfa1f04348698fa97e2b349cb13ea.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\UserDotJK\adobloc.exeC:\UserDotJK\adobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD575225b5d71e7c412268384bf7aa533eb
SHA18e87c44b13797b0ae6f51c79c74cf98d74237132
SHA256f0375bd7d0d6d21098a4af8e97224e36ec26b6c41116fb75df489d94ce86304a
SHA51296850b1ea4b4221a866570d06a6098450edebee9430196a072bd180fb81514988fa4330a817c650e06ccd99fc031f7d5236647899fa4489e36501bd48c68dc2b
-
Filesize
2.7MB
MD5c4b068bdcf4ca909ec8ef502b7103a97
SHA1aac47ff498590b17a94fc6f55da94b84366c8ce5
SHA2563673a6e8304a3bd5ba41ea6cd46bde73f5e16a6cf44cb603f887b1eb1549cf08
SHA512a0724344e9da2c1a49b8542a33b3b5f11782236a44ec6fffe1fd723e146033e731b898029f9899b1a3a41cafced8d55d0de5caf7842bfc58a5b4444c4263c663
-
Filesize
203B
MD5c07364e0da9c59c4a24d642fdce9017f
SHA183a9fbb71e3c73682bff3473344832b6cd9cdd40
SHA25680820f9266d93ef50f44e0b2be925f57027d6eac08b5e76b3fc48185e8766148
SHA51208348181f4cb1469945f6b21e075c49477b234c8a288c3ca78d97ec2565d2c535974907b0eaa171d69fa175534749a98183395fe78f3d5fc39acfa500bcda0ec