Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
d1e36bec5b6893a77f788eff5293ff50N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1e36bec5b6893a77f788eff5293ff50N.exe
Resource
win10v2004-20240709-en
General
-
Target
d1e36bec5b6893a77f788eff5293ff50N.exe
-
Size
2.6MB
-
MD5
d1e36bec5b6893a77f788eff5293ff50
-
SHA1
4f620d7513e6a2a44dfee5e5c090a5054a553bf6
-
SHA256
2377e5c7fb9deeae097ceeeef8d168fcc9db1018cddc1f2f2172b8d60efef539
-
SHA512
80ebb5f6b5459239f1ad773ae5ae7f34296d10f9b7b7c87de8c34d783133a5a507daa2383d65ae866f474295433c58ddb2ef04c7a49dacad0caf0ef84fc9d78e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB6B/bS:sxX7QnxrloE5dpUpRb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe d1e36bec5b6893a77f788eff5293ff50N.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 sysxopti.exe 828 adobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 2092 d1e36bec5b6893a77f788eff5293ff50N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc0T\\adobsys.exe" d1e36bec5b6893a77f788eff5293ff50N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB46\\optixec.exe" d1e36bec5b6893a77f788eff5293ff50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1e36bec5b6893a77f788eff5293ff50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe 3008 sysxopti.exe 828 adobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3008 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 30 PID 2092 wrote to memory of 3008 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 30 PID 2092 wrote to memory of 3008 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 30 PID 2092 wrote to memory of 3008 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 30 PID 2092 wrote to memory of 828 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 31 PID 2092 wrote to memory of 828 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 31 PID 2092 wrote to memory of 828 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 31 PID 2092 wrote to memory of 828 2092 d1e36bec5b6893a77f788eff5293ff50N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1e36bec5b6893a77f788eff5293ff50N.exe"C:\Users\Admin\AppData\Local\Temp\d1e36bec5b6893a77f788eff5293ff50N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Intelproc0T\adobsys.exeC:\Intelproc0T\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57d339ca07a65d05a0dbd86b2dbea0e1c
SHA1d63278b297c31960eb2d2c2f76c52931e80d61bc
SHA256b51518dc97f403b5cf97aef16b27a2c9aae9e4937922bb54b4d24bb6ef7cc912
SHA512f1819ee289bc7c673bd558a928366936b7f3cd26f240b6e33494bffd89985870de469d526fbd13950ba5fea58c3280d63e130412b82019c523e78b80aeb426ee
-
Filesize
2.6MB
MD5c95fa1743612583238ec1eafcf76ad19
SHA113fe3852b2857866acbd17687a49330f85245fda
SHA2569fe9c1f7bae32affbb0ffab5f98ae5a6d989fcf5742b4024228db044cc079d53
SHA51245626b6ec7aa3e45d452091919e4d94aa08d43479bf8d1688c5b1192e99ac4a4f79d0a99ef332ce87169f4335b0bc1749339edb6999d2650076c5ea5265c9aac
-
Filesize
2.6MB
MD57ed48c9f518f501a44793778e3441190
SHA1b14db446c867e98aacfdbefe7911c91c3c7201e1
SHA256741d85475d0ef43d05a34b5f71abd886930507cc5c69d08855c799d6623ea4cb
SHA512f172f9bff37105aa76e4128656b06c463d9f6c68de7052ade9cc64f55573051fd32d2e040f5328536b01699d4c0899bb69aef72aae743cc80c5a29299d798073
-
Filesize
173B
MD519f0129513a1265b21330ac030355a14
SHA17fa7fb1229f874ff0327c2233d4dc4534755a64b
SHA25631311b180c0180568e67ce3f177672f1d3030987edc1d19d7dcb53dda0f331fa
SHA5123380ec0cb8d5334dfd9edb5720ec1e82a89845ae8dc4488e6806d7214740153239e34fef0601020f66fa3f0fcbab311e6566090a71c9814d3b584ae28fa145de
-
Filesize
205B
MD54b785fcc6576b3fcc6cd066596ef9c4f
SHA195a36e3d1c3d5bf090e4a0279bdbc9b12a1ef88e
SHA2561dbd345a4c4a4304e4b920f10a4950649968ca644008e8858d6a3791da2cb0ea
SHA51267faded3d594b85601db86a77352fdef12f144ff1fde62c9ebef324b75e94c561bdda62b3872c379000f0894b0e4621f5298114ec4281ad958bcd9384b4d6e9a
-
Filesize
2.6MB
MD5fbb7d2219c16394310ccc62040a86576
SHA1cfbe634f186d89a9a78994789ab7707d03e76528
SHA2564d82dd071990e5e03c400c17f67ad6607d179d0829c9b1b3024de7670184d349
SHA512c5ae212e06c237adb91b21e5b0e2514df3ee1bc849488dcb3fb35a58d0524f6a9b1a557ca63c97778988fd61d606075b05e899c4eff875000a43c0baa23d7a3f