Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
108e12d3209a3080919432c34f4428c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
108e12d3209a3080919432c34f4428c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
108e12d3209a3080919432c34f4428c0N.exe
-
Size
2.7MB
-
MD5
108e12d3209a3080919432c34f4428c0
-
SHA1
2f8ec9efd32b54e0ee219e0b155455b2304b9afa
-
SHA256
ecfad2dfffe144d9f5b5e13da46c6709104854e717a6cca0518b5e8e64c0533c
-
SHA512
4bb2d4f698639356ac9188273fb571501b72f7fcec8605481506fa7ba4d616d2f14529bd2371f3830297fa00462c3f140461ad76657a857fe689aff075a8a446
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBI9w4Sx:+R0pI/IQlUoMPdmpSpW4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2456 adobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvH0\\adobsys.exe" 108e12d3209a3080919432c34f4428c0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxW2\\optixec.exe" 108e12d3209a3080919432c34f4428c0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2456 adobsys.exe 2456 adobsys.exe 2652 108e12d3209a3080919432c34f4428c0N.exe 2652 108e12d3209a3080919432c34f4428c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2456 2652 108e12d3209a3080919432c34f4428c0N.exe 86 PID 2652 wrote to memory of 2456 2652 108e12d3209a3080919432c34f4428c0N.exe 86 PID 2652 wrote to memory of 2456 2652 108e12d3209a3080919432c34f4428c0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\108e12d3209a3080919432c34f4428c0N.exe"C:\Users\Admin\AppData\Local\Temp\108e12d3209a3080919432c34f4428c0N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\SysDrvH0\adobsys.exeC:\SysDrvH0\adobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
955KB
MD5bbb13562080f20972bdcc58ace2aa60d
SHA1281ebb7eb177e6e966291e0bb95333076642ea93
SHA25631d109787c54fda3ed1b0430c740cc6d74996a2c3d68ed47ccf7bb21d6bf4606
SHA512600f3f9fc18bc9134e9267dc07ec2a2305b9dd9f8db56886a68efdd966ac6d5198aafa705a39cca115c5515504612b190fa96480261835782c775d21dcc7ac10
-
Filesize
2.7MB
MD52a0a01e50323a65816033f7223e48c34
SHA1a0b1d9f2a9c9053b25c29f4bed0bc986a6d0ae09
SHA2568be9c66875cb3666cda8f93f8580f59bb53335732f7909e64a426455497af143
SHA5122205b916faf17a6b5e43bd4f64cf2e32b2dcf4febd10d6d9dd5013a317f2d70b65071d22d25d3b1e96e214f05487ca8cdc98dec756812bf71cbb3e2adf23132b
-
Filesize
204B
MD5f7bc570c0de8218fd526dc12192aba66
SHA14c21080b75726a8dc988b0d4f3bd8579ace98a72
SHA256e1af73009c5bc4719427528119389fea3124d78904e79f4ac50a503a8244408d
SHA5129b5ed50d8c37106109c3fb128445ff37209bdb6d38f02f7cc0f2d6f8b195f518d2e964a1295f60f8959ed794f7b00fb5d56e103b7a525bd1438ab10398bb6216