Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
4a8c78a1b799af7db766592e6b4e2f80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a8c78a1b799af7db766592e6b4e2f80N.exe
Resource
win10v2004-20240802-en
General
-
Target
4a8c78a1b799af7db766592e6b4e2f80N.exe
-
Size
2.7MB
-
MD5
4a8c78a1b799af7db766592e6b4e2f80
-
SHA1
6f357f3233b7ae44133c9315c4e1e509ac72acb0
-
SHA256
a6da86a44009ba875588545c70db63a26091051f942a7afd4b4112612d59c7d0
-
SHA512
28813157020bf0814c967d3f77b44e78483e3847c35c85012e682f041d9a899feb14a625cdad71cb2bb2f268f5d6abec40af173a5ef351ca17a0ecc0d3eaf190
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBm9w4Sx:+R0pI/IQlUoMPdmpSp04
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 adobec.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv5W\\adobec.exe" 4a8c78a1b799af7db766592e6b4e2f80N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBO5\\optidevec.exe" 4a8c78a1b799af7db766592e6b4e2f80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a8c78a1b799af7db766592e6b4e2f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 2952 adobec.exe 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2952 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 29 PID 3012 wrote to memory of 2952 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 29 PID 3012 wrote to memory of 2952 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 29 PID 3012 wrote to memory of 2952 3012 4a8c78a1b799af7db766592e6b4e2f80N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8c78a1b799af7db766592e6b4e2f80N.exe"C:\Users\Admin\AppData\Local\Temp\4a8c78a1b799af7db766592e6b4e2f80N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\SysDrv5W\adobec.exeC:\SysDrv5W\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD58c3dad6d912552bf20a79852ec009f98
SHA1683948f28eb16909dea36cca7dd9e6ba2997c176
SHA25693906d9a6307e4593c6758deb7af568755292e2799183eb087ebaf8f361cad6e
SHA5125a9b25e7f599d080c0f1471a464695465c42a2b2300bbbe14082f45ce176eb14934f5082bd4da49aac71d89a97319bd70ddd31211742e3f3e2ed9e1101a0ed6e
-
Filesize
203B
MD574ad77f6ad593e523ae2c1c3dc0a9f99
SHA15ad4d32415eb388e875ccec38e776f92c3d3b524
SHA256585ab905e7fdc377bade3f6652d3b4a56731bcd7b03acc7ecf980975ca6db2ea
SHA512c49855b3d2a0b1fbdd481efb6cde4185ccac021ee8e490b50b034e8a8b42db059411aca60b9f3d78d32771192c7263076686610c5e395022adb9d75ca3e2886a
-
Filesize
2.7MB
MD52974bd1e7a7c5a421f31dd093ee4e5c9
SHA1304aab6eb432a0345a23c0e776ea9f752787bcf4
SHA2562c2b55e775bdb70db752997c49c0e56096564c8d96cddb88922c60622c12695f
SHA512fbada85890407d965bad716a77a14fb7f74ac5f2aee1ebdbe2a820e706b6590131c69fbe52b1f2f19cb10326c5ce95347d7139e42bfb386e81090132d3c8e441
-
Filesize
2.7MB
MD547793037506c768bd3086fab988a0fa9
SHA1902036fc1b59570d83423ff23bc196656b35b92b
SHA256e0286905a880c22e3dd3ddaae59e268f0226c4d700b18ef852c13d285e1a15f2
SHA51264b86b9aeed32efd139a8a14f34c5562bff5881eba92528fe3eceea4dd2903688c7e088c421e8852e43e4f226e64501cfb4b5570c94304d2f1bd0f6c45d126e8