Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe
Resource
win10v2004-20240709-en
General
-
Target
f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe
-
Size
2.7MB
-
MD5
aaa9a656f2defb56d259463c4213a9b5
-
SHA1
3bc3774fb3866f84983d8a19fc642b3433a80a3d
-
SHA256
f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127
-
SHA512
4b0d3cf4b0bd7ef72bc77ec85e7fc9921d7004d2de5c686dddd7e6fcda43d605629ad47bb3ec4af35d7ab4ffea488168b817f3d7e898ebbda0e6a4d2b82734f6
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB8B/bSq:sxX7QnxrloE5dpUpLbV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe -
Executes dropped EXE 2 IoCs
pid Process 2056 sysdevbod.exe 2192 adobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files5V\\adobloc.exe" f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintSY\\optidevec.exe" f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe 2056 sysdevbod.exe 2192 adobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2056 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 30 PID 1420 wrote to memory of 2056 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 30 PID 1420 wrote to memory of 2056 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 30 PID 1420 wrote to memory of 2056 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 30 PID 1420 wrote to memory of 2192 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 31 PID 1420 wrote to memory of 2192 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 31 PID 1420 wrote to memory of 2192 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 31 PID 1420 wrote to memory of 2192 1420 f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe"C:\Users\Admin\AppData\Local\Temp\f851365670ab23dc1b3e31fdf0d788e745d50b1a57532960e90adbf77571e127.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Files5V\adobloc.exeC:\Files5V\adobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD5cbf9fc0e208d015283a5e29f3fa661dd
SHA16f4a7146423b63ed2b62d07ec92c94208103654d
SHA256a83f33c48e88bdaaf7e5f339c2cc8c1b35696de54a4de396a133f35cfebf097e
SHA5122ca4e61a7940191c9b8557892dd26fa9f5fbf71b92ca8bc2f78c34c4ce69019e59dac0cef0affff4e07f582ad74df34702fb55fad9c92c33735d6ab3051403ff
-
Filesize
2.7MB
MD5f4f5b644d03326b103a643f419ab59af
SHA19d82d5ff2c99acd618c79993fd94b212891fd1ea
SHA256ea4a88a6456b1a91c69ed3bcc05da487bfb1a4f5540e3a65e3fe7b15225c6319
SHA512c013e3969357f9768d0f92beaa58f5c3a7561cef75c9dec65a037bd8ee7357de630d453fc33566cbedccbc061dff20115ca9189d246cf85f69ebd13fe7b23daa
-
Filesize
32KB
MD5b49076433c0bf84919c9872909ac9b4c
SHA162ccebdcdf26aab3095a02caf388459acba54554
SHA256047965653df12ad8344f021b1f08bcf8f2c1d61ab509d61b8d166ad7b0aabb99
SHA51213bf6e46756787aacb11302c4300040db7eb4fcb38e7f33accfd48dab2ec6ed3056a5caf7212b585485fd71396d534800f9bef245d814f3af4489df0ab3f07e7
-
Filesize
1.4MB
MD5e443afea9a4bde65b992194f3fab4e97
SHA138f8418c0e2b77e5477210d50ba3bc6ac516b74a
SHA2567d93f5bdae01df0b1a64cc92a8c0d4ac458714606a54c101a2a2124c7ce151bb
SHA512612382de8cffeabcd09eb9db1348e5794067c266f29a5e9d8000fa9d7c44b2fbe77032ba7af8fce2143d82edd2c8cdb645f31437c384c66a9f5660e95346e19b
-
Filesize
172B
MD51bcbb0052c52864e17d0bc037fb29005
SHA1312b59c6babbab7bef6ee1a8f4fd104d0510163c
SHA256e40a6148da394f7c5d2aa29806f0647ead664af86af959d3fa7fef071b4d3512
SHA5120859c89a5418a7a35438c6887b7677ae36bbfb74886e603745ec472fb2a1d8b319bbfb85b25065a832e4b941b2efcbe1413abac2aea1bdc388873eb24a1b053e
-
Filesize
204B
MD56419df540660af5532df9f8ffafddb76
SHA1baf2654bf5aa6109fb38cbff53dae4faa4376881
SHA2567dda61e313ed170862392c0876a41763b03e0812c443fdf7d0aef11dd5b3c4e9
SHA51238b1c99dd2e90e4dd85842f81eebc72c9aa9b2e8f81da5861031a976e3a889bfad92c8780fcebe772caf1cf478b0af3a6130cd8dd6b579c7f5cafb74cb73e56b
-
Filesize
2.7MB
MD587ab623aaca2f9fb75f38b5dc3669098
SHA1880229f5aa042a237bfe56cbbda317fc8d7febe4
SHA256b988b417f1accc0e5110e25b967917bf9c4eedfd55761413058d0b1e48ff6667
SHA512ed5c7468773f09ab02aacc18bf9ab86cf9ca7d18a43cc864a86a6ee3705f35fa95c5f68c82eaea1347779d69107302a68cca1ee5c0480c10910a9b638a24c287