Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
1589949448e34351d5d4c4e5ef32b2d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1589949448e34351d5d4c4e5ef32b2d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1589949448e34351d5d4c4e5ef32b2d0N.exe
-
Size
2.7MB
-
MD5
1589949448e34351d5d4c4e5ef32b2d0
-
SHA1
eba74eada380f8e45fa30d645d8b7a7d3308b8e3
-
SHA256
5a0f2afdc89d63b364f9137f3537f07818e4d4090511b5369c64ced04fa1ae2a
-
SHA512
07d9e42aa9eccbd1f614c4b183ab089547235226e8cbde5fa12406c387bcf5d6e2a2bdb9ef4f7c7697438a0c3895d8fb4a74e984b1d3d23e7f692c46d6796965
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBD9w4Sx:+R0pI/IQlUoMPdmpSpP4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZO9\\dobxec.exe" 1589949448e34351d5d4c4e5ef32b2d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeK8\\xdobloc.exe" 1589949448e34351d5d4c4e5ef32b2d0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 2760 xdobloc.exe 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2760 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 30 PID 2276 wrote to memory of 2760 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 30 PID 2276 wrote to memory of 2760 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 30 PID 2276 wrote to memory of 2760 2276 1589949448e34351d5d4c4e5ef32b2d0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1589949448e34351d5d4c4e5ef32b2d0N.exe"C:\Users\Admin\AppData\Local\Temp\1589949448e34351d5d4c4e5ef32b2d0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\AdobeK8\xdobloc.exeC:\AdobeK8\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD558c449228dc7751ce63c489cd4033842
SHA1dcc5351fadc9e54bb2af2bb79a3e775f6b66f664
SHA256cc6b8142e99ad5b2ea49d20f53995334e676cd4c1207cc026ccb47ec08915e0c
SHA512744c66c8a029d1b910f47a8a4e034c5eeb9af10885f713cdb466b444ab5d6ff97cfced3f6863d8be2b1d12fce0691a842e1fcad49d8d7ec05d42fefe2551ef4f
-
Filesize
199B
MD57a2fc684b1b4cc1638ac87ebe1a7bc44
SHA16cd1307cbbbaffe174f69af51f076c830e8b37b2
SHA25608c3fc9b5890a73c34d8097560a3215d5f2154a3a1ef75f23557026a18672376
SHA512c11dc40ae10580200b53f95f2b1d363eac3f5e1c5b01fe3e60078d8d2a157ee879c63339c5481cff15cf5b10572276b45607060b1a61f18ca05ea5725f6acc02
-
Filesize
2.7MB
MD5009f7a1192bb4e5b2763f8fa713f07bf
SHA18f100396874fa7887e3a5e00ca79c339adc7e32d
SHA25642e88f2a93a974b064f5d6ea7449a6b9fb3fc1dde309122c53e004aa269b2d89
SHA512d729348492ff73a93ca12e7169a6d79f131ec79f632e48e6d8eda7cf5522d010fc6857a704d7f835c3827cb4cc6ed149f01800e0e4bcaf9f7f76e7c15cdac730