Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe
Resource
win10v2004-20240730-en
General
-
Target
2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe
-
Size
2.7MB
-
MD5
79e707efb222bb121befbbc316c4852f
-
SHA1
f292ab6753800e4742296087f6f03aaadb215cb8
-
SHA256
2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8
-
SHA512
c861fb2fcf4879d3d2a0389f0e2c99285f842d8a9aeb4498ac2cbb2c798c2a5906db5bfe7158ac1a8b7c354644111282c3be9ffc535fd2f0410aa7ce3ab21cd8
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBg9w4Sx:+R0pI/IQlUoMPdmpSp64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 abodec.exe -
Loads dropped DLL 1 IoCs
pid Process 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeHL\\abodec.exe" 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB83\\dobxsys.exe" 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 2148 abodec.exe 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2148 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 30 PID 808 wrote to memory of 2148 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 30 PID 808 wrote to memory of 2148 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 30 PID 808 wrote to memory of 2148 808 2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe"C:\Users\Admin\AppData\Local\Temp\2720736df549517979625caba8a0a8dd7f23622683e46f3831d10e3d43b0eed8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\AdobeHL\abodec.exeC:\AdobeHL\abodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD568ddbbadaeec1bd8a7d0e92d760cb2e0
SHA164649c8aa61d05d6f92964b2cad098c9977dc6a2
SHA2560d0d843bebe2c2e0ece9f5a1e0566a8f11587abd4388cdc01367211b69fe30c6
SHA512b1ed75358b3fae4d80e329ba70e0aa2c498d4d890af9417d307627de93ef93bc0c62574f8720a9a9a395c8c783bf17eb5091ccfa04d862302e65ffaa9674eec6
-
Filesize
2.7MB
MD5ad996c2a8d37feac0be1889e8e3459bd
SHA12808760d7ac5f2b354541da8eac688fde69932d9
SHA256964924de5fb79badcf6a652cd810feb95803dc97539d1d30648214c80118740e
SHA5120043d539a89a49db658b94f783c3fe6ba34d986f28e652610ba43ad7c04149ecfc6d6ca54a1236f91952928f66b0bf6668ad46b1d11df71f77d3d5890010c558
-
Filesize
200B
MD503cd72afac4d8d6b5c5695e04d70c848
SHA1ede221f1773da6beec5b41414b3e5ab625112988
SHA25613ae723946bd33e8181ce8ccf83ce4265b9f6992bc13628ed4cff45580e858ca
SHA51264aca05e947751c062682aad5eb6c2b26fd991ce55995f18c6aa88777fcaa405d22d4ab5446cded3803d39d3d50ac0dc08ea21dedd0b89cfb1fc1e2023ec4d5a
-
Filesize
2.7MB
MD5bdad57f1c1ec344630ca8dea9bb73424
SHA187ca61823a9568b54a494f0c1fd82bb5960f7009
SHA2566d87360543929cd08530ce96eb27d7c5981023fbe8d7030285d9edfc96c21128
SHA5120ed6de9908fac2ec4bf8a00002838a9335ad695806a8bbb770b7d88045cfbbd7e5fdde2ab2c14fef094fbe16b0c596d89f4a0d47f359674b2d28925c912de390