Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 17:32

General

  • Target

    66a967865d0b31b15c92358f17b378c0N.exe

  • Size

    2.6MB

  • MD5

    66a967865d0b31b15c92358f17b378c0

  • SHA1

    668a9e142c13dc45dc467a7286f25ea30906a7e3

  • SHA256

    d49f5769bc8da6c5747d91ab13d3458df0cb9b154b2c865b70f2a868414e4718

  • SHA512

    8007f34913379a579e86f533369688e0e12eccb01df0b52b2b4cc15f48ca3e1ca46be36e569bbf0229916f2a1777304be441e029a134eb80c6ebc7dfad5dea4c

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUpVb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66a967865d0b31b15c92358f17b378c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\66a967865d0b31b15c92358f17b378c0N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1732
    • C:\Files39\abodsys.exe
      C:\Files39\abodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Files39\abodsys.exe

    Filesize

    23KB

    MD5

    3802e70e50917db6adbff13a6824dce7

    SHA1

    1ec74804dcbb5eac9158cc01b922116000bd27f6

    SHA256

    b81d5b38681149b114bf47a1e7fa43ddd85131b90d90958a3b1ff715a6be3573

    SHA512

    2ae50667aa5c3bf216c71d67c60ef19a77841a00f44d71976aa8f97b9a6fd7f512a1183679559970fb5175722a27db103b3b44cbae08e134908cdae961b88b2b

  • C:\MintPH\dobasys.exe

    Filesize

    3KB

    MD5

    1158f86a0845ee6fe9ce7b682fd51439

    SHA1

    caf9890ab05a6eef87827bb3ab60eaee3b254faa

    SHA256

    3d1f80bce336609701c74a291ec5f27ae76b198dfc51fe6615349996dcba8ab1

    SHA512

    3820fa06d8911561113535b4e01a0e4a3bcb87a566762f0995074fdd561e824454613a36d5347004f0370ff27867df4f962f498ca63e8e4b5e82c935860d3503

  • C:\MintPH\dobasys.exe

    Filesize

    4KB

    MD5

    ede40b36034d11420daf9b761d447622

    SHA1

    83e69cb72e12fd8ccd507bfa21133e1fca0fd5d7

    SHA256

    6e27085c9b049479ed4b5d515c82d49091d1d0d6a70cc1af4fe1e085816236d4

    SHA512

    0fc2330cfab1d7a2fa7e55f9cc177aa246de7f672540212721ca9232920652a2306906719e60af2bd37ca2fc9074d2244a5514fdc7f344e7c4006b4c69a75120

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    167B

    MD5

    d477514b924f22c9b48691f87820815f

    SHA1

    f0f415b7140bf6aebcfbb3fa4251d9d0e66b3e05

    SHA256

    8c0c56d8bae656759447a8ece1ea89e87dfe5412e45553b1ecad27cb0bc685ee

    SHA512

    eeddbdeb344cd0f8bb8f24af25c647c7a95408a67a738e03022813092a4d67ebf2ff0d86afd9a078b4a0234f5c8e2e05429211c9eec26fc5ac7e4d90d823e2b5

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    199B

    MD5

    9458282866992c50a22a7caa0f95cf83

    SHA1

    4cc303e15f9972d2c9a87ced788e1ea5d344a49f

    SHA256

    5aa2b8d8849d18093683ab7e7af8d2db42108f55aa99bc6c053a3d6bfdbce307

    SHA512

    f73cc705a1ee1a5f9c87261f4f34f931e3d2075b944f7e6d2ee0802721618bd96c81c6bb181a1eb05a8b5b87bd290c1802f306ac2415c146f4b92a19ac5e68f4

  • \Files39\abodsys.exe

    Filesize

    2.6MB

    MD5

    fb7eff77ddc9a2cd276a64cb866a71c0

    SHA1

    e9cca580b9ee9339dfde8c6c771577318e4b738d

    SHA256

    88943b339553c358894b36a4e1ff60807033e19ed027fe575114919450774632

    SHA512

    5986fb1f85451022767372a6fcec42ae7ef97a2de92ac02387526ec99d0c49aef57cbb343297b1b01f8e109ceafb90aeeffc8470386717d1bc7850354f2c0ee9

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe

    Filesize

    2.6MB

    MD5

    1ad78428baf6755c7aed812d9aa06320

    SHA1

    5090d026177174bea0fdaaaf45cd41ae914bda72

    SHA256

    b7846de7d3e0c653a174e1a038210dda36f81352963de5c2ffb408a67461460e

    SHA512

    963ed14171299c3da17cc9354786325250222d67a683bac1bd818040c1092c6a45199ef7b58407ad2b1cb0a60a5581e455326d2d3711e7c234bf60aa74df5ad2