Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe
Resource
win10v2004-20240709-en
General
-
Target
12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe
-
Size
2.7MB
-
MD5
c998ea9512123a7c0c03e2c0ac76a721
-
SHA1
cce9bd85a330966212e92dced16122ec52694a8c
-
SHA256
12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43
-
SHA512
95e8fce2234a059c7a93a1d8c6d63592673c59b8cbf8b00212490e1651caa332058b15e2df7b23f7348cf1a22961b79743390aca3a409e0eeb9a30974b8e42ea
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBp9w4Sx:+R0pI/IQlUoMPdmpSp54
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1260 abodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax54\\dobasys.exe" 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesUU\\abodec.exe" 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1260 abodec.exe 1260 abodec.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1260 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 89 PID 1480 wrote to memory of 1260 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 89 PID 1480 wrote to memory of 1260 1480 12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe"C:\Users\Admin\AppData\Local\Temp\12c6b40b77a2d376cf6c35a1987c46c16ea0066c1882d5c81afaf2b92d36cb43.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\FilesUU\abodec.exeC:\FilesUU\abodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52ed6aaa580c4cd1925577a859953be9a
SHA1ad54ac1e08ea4e751df1e019184056829aa9b2fa
SHA2565f5b3b79d01fa369b27aa0c115072ad926839e46dd27ad34970f9b3295710b47
SHA51241f2c67f595516fc347b9cfa1701b2e0e2d7548b93103e50165d3405c6100aebedc16df8583285386105283ed92665be49dd1115839136398025ef005a368052
-
Filesize
20KB
MD5b92414c672ba9e2925b6757c19791fc3
SHA1a11b84b2fca34660c4b4d3eef04dbc31b34f40b6
SHA2566d936842e9500ac54f463f0aa28fe02f76bc48a010a4ba7fd4b6882d2b5e599b
SHA512518fb89373465fc5d3855acf15cf212b475a8da5649ccc0b520528f04fedc0294ad911407201f8e00807879a5c14098a17c34e837296d7662ac2b7861814bf4b
-
Filesize
2.7MB
MD5b47979445856f3cf8047b00da36ed56c
SHA16b3df9116e4bda89a87ed084e2a5be84e02424e4
SHA2563099eecd453db661ca588693b4ae1272be52a160b3f5f94f7fe6d07fab4041d6
SHA512ca3b5ef6f953073169c7705850055c18ae76827c101a3023048c91c5348d3b51a6425e72136ed33e338d7ed9ce5c1f093920a5394ef2a995f606ddd11223337a
-
Filesize
199B
MD5faec7dc1be31b79d54ff20fbb0071349
SHA140a3d92ff54426c7ede35ce1a7d4975d58172d30
SHA256366b7da082b936223ced941770c75c7f44b9b1d47307931a213a5d842fb8f004
SHA512450a6b61a10e8c0a1724d696fa82c0034ee9be0f512f88b2507f7c9f5de01117293e1cfbd7da2ed26270798ff06b7a997681eb5cce4aaf7418670670a516e006