Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe
Resource
win10v2004-20240802-en
General
-
Target
efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe
-
Size
2.7MB
-
MD5
905f7c7f4b620e7b0be478c6dc443688
-
SHA1
ffd43243eb84edef1935004e12bf06434fb14ff6
-
SHA256
efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0
-
SHA512
b08bd96d8808cacb4af3153ec82fa0822fc75ee61c5dcc0d3a70eb430b12a05651f734c7559e92a133899549872f2eb9e6ca8bce3c9cf920efd2996ae7604a5a
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB09w4S+:+R0pI/IQlUoMPdmpSp64X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2476 abodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesJB\\abodsys.exe" efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax4H\\optiaec.exe" efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 2476 abodsys.exe 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2476 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 31 PID 2628 wrote to memory of 2476 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 31 PID 2628 wrote to memory of 2476 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 31 PID 2628 wrote to memory of 2476 2628 efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe"C:\Users\Admin\AppData\Local\Temp\efef5f2f5d849f0c409092c08c8ad9772e0eb05bde0f9cb123baad8ca4c07ea0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\FilesJB\abodsys.exeC:\FilesJB\abodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ac8ccd583be26636487ee15f63a5b4f1
SHA1f122f27184651fc9991d4de596e7bf5940db005e
SHA256ae5d749dce7bcbb55630b09c2e04fe3d03550e012ca45ce5a3cf2a47bf71176d
SHA512d30cbd0fdb985f8766b7d36709324db6eb350cc77d08c2cec57079651c04ad4ef043122e1d7802568ecaae5811fdda29c824f95a5f907524323bbcabeeaf269d
-
Filesize
200B
MD597911c948fdd944bbf2bcb103670fbc8
SHA18083b1c291fb32d4d25cc4161588f278b798f0b2
SHA2565f62a3f04fc67cfbc83461bc6efcf0b17db88bd5e94560199e2d3ba8cef68859
SHA512024cdcd511107fb588afbdee7867243c1abfc8c342a2f7267201f4635a6e0c1d73c7222dcc184a128019374ae2b93f27ab300525b09cff99c4b5a99610134c3a
-
Filesize
2.7MB
MD5a78bd5f17c3c39ee8819af41b2bc1837
SHA1242f0277deef40f26062f21048885a076969cf39
SHA2560a1471aedaeaf6fef58b28807ff8eaa8b795b65cbeba9e9bb6c0693f15262ceb
SHA5121aeb2b319b575343b7f8f49c9a4c632420b376bff6789ece065b8633296f520b5f8ddff020f4de0d09c78d0cdd77586599d2923e4a4d71a54c2a62db2a8535c9