Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
0ac20821e984c36079a3b59799e14f40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0ac20821e984c36079a3b59799e14f40N.exe
Resource
win10v2004-20240709-en
General
-
Target
0ac20821e984c36079a3b59799e14f40N.exe
-
Size
2.7MB
-
MD5
0ac20821e984c36079a3b59799e14f40
-
SHA1
26bff7b911da4ab212d87c2ea0e3c9275d4d624a
-
SHA256
4663d4eac037aacc78bf47a5aca7ef3eea303f1c9ed08c77f36ed4b1d6867a61
-
SHA512
45229bfac56a99ea5bfa4b63f6f817fe236da1113e833a28eb631652ac90589921773e83c70d8ffd2cb64eb860a98f3eaae859eda97e84382ba2c71d4c4d87fb
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBo9w4Sx:+R0pI/IQlUoMPdmpSpO4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 aoptisys.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 0ac20821e984c36079a3b59799e14f40N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc58\\aoptisys.exe" 0ac20821e984c36079a3b59799e14f40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxQW\\bodaloc.exe" 0ac20821e984c36079a3b59799e14f40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ac20821e984c36079a3b59799e14f40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 0ac20821e984c36079a3b59799e14f40N.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe 3052 aoptisys.exe 1688 0ac20821e984c36079a3b59799e14f40N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3052 1688 0ac20821e984c36079a3b59799e14f40N.exe 30 PID 1688 wrote to memory of 3052 1688 0ac20821e984c36079a3b59799e14f40N.exe 30 PID 1688 wrote to memory of 3052 1688 0ac20821e984c36079a3b59799e14f40N.exe 30 PID 1688 wrote to memory of 3052 1688 0ac20821e984c36079a3b59799e14f40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac20821e984c36079a3b59799e14f40N.exe"C:\Users\Admin\AppData\Local\Temp\0ac20821e984c36079a3b59799e14f40N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Intelproc58\aoptisys.exeC:\Intelproc58\aoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59085f16ddb3e39876df13be37b31a28f
SHA11631dcc0418eaf379fd57262be4ab94907ba7808
SHA256771a4dbc95f4fdefd6fc3655f7f12919a5a309342499ddf0d83ffa14c76ce4d1
SHA512a501e521cfe163be46dbeb38fb9b0503c4a9d0c6ccf9346dcb90b735c384d3d1ebadbe8631f7e18341c1c46e52453e2180bc9ea2f548d2efe86cd69ed1867ef4
-
Filesize
206B
MD56403bb69e7baeb309f175fbf555d4ead
SHA194e3de4178bd9575bb8a95c181d6bc5e6bebb3f9
SHA25690f7314c4b6c29ef39d3b0ce4a816080645d08380f279a5de716af8125faa64d
SHA512238095a708f8da80aa6cd984207fc3bb65657f91b336c5163889adf223d9889be86fdf29495226f26234f9dfddccb5789f7d399169e16fbd69ae917365620eff
-
Filesize
2.7MB
MD580eaf87574cd4b3b74c0dec5f1e85e54
SHA10d2a69a3bb3abed14f60390f87f6d83b7525b21b
SHA256b8a717bd19cc784a45ea90572222a2b02e8337274e7fa2e2951ac74d7201a7f1
SHA512dd7c5061c23fa3824aebe96fc65635e131bc51c42844780ca892f08dec4e5be1817c9e830d21debe397282fa1f7a684edd21c2a3ac74050ce29c242b8a1d97a7