Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
66a967865d0b31b15c92358f17b378c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66a967865d0b31b15c92358f17b378c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
66a967865d0b31b15c92358f17b378c0N.exe
-
Size
2.6MB
-
MD5
66a967865d0b31b15c92358f17b378c0
-
SHA1
668a9e142c13dc45dc467a7286f25ea30906a7e3
-
SHA256
d49f5769bc8da6c5747d91ab13d3458df0cb9b154b2c865b70f2a868414e4718
-
SHA512
8007f34913379a579e86f533369688e0e12eccb01df0b52b2b4cc15f48ca3e1ca46be36e569bbf0229916f2a1777304be441e029a134eb80c6ebc7dfad5dea4c
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUpVb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe 66a967865d0b31b15c92358f17b378c0N.exe -
Executes dropped EXE 2 IoCs
pid Process 1732 ecadob.exe 2716 abodsys.exe -
Loads dropped DLL 2 IoCs
pid Process 1404 66a967865d0b31b15c92358f17b378c0N.exe 1404 66a967865d0b31b15c92358f17b378c0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files39\\abodsys.exe" 66a967865d0b31b15c92358f17b378c0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintPH\\dobasys.exe" 66a967865d0b31b15c92358f17b378c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a967865d0b31b15c92358f17b378c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1404 66a967865d0b31b15c92358f17b378c0N.exe 1404 66a967865d0b31b15c92358f17b378c0N.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe 1732 ecadob.exe 2716 abodsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1732 1404 66a967865d0b31b15c92358f17b378c0N.exe 30 PID 1404 wrote to memory of 1732 1404 66a967865d0b31b15c92358f17b378c0N.exe 30 PID 1404 wrote to memory of 1732 1404 66a967865d0b31b15c92358f17b378c0N.exe 30 PID 1404 wrote to memory of 1732 1404 66a967865d0b31b15c92358f17b378c0N.exe 30 PID 1404 wrote to memory of 2716 1404 66a967865d0b31b15c92358f17b378c0N.exe 31 PID 1404 wrote to memory of 2716 1404 66a967865d0b31b15c92358f17b378c0N.exe 31 PID 1404 wrote to memory of 2716 1404 66a967865d0b31b15c92358f17b378c0N.exe 31 PID 1404 wrote to memory of 2716 1404 66a967865d0b31b15c92358f17b378c0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a967865d0b31b15c92358f17b378c0N.exe"C:\Users\Admin\AppData\Local\Temp\66a967865d0b31b15c92358f17b378c0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Files39\abodsys.exeC:\Files39\abodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD53802e70e50917db6adbff13a6824dce7
SHA11ec74804dcbb5eac9158cc01b922116000bd27f6
SHA256b81d5b38681149b114bf47a1e7fa43ddd85131b90d90958a3b1ff715a6be3573
SHA5122ae50667aa5c3bf216c71d67c60ef19a77841a00f44d71976aa8f97b9a6fd7f512a1183679559970fb5175722a27db103b3b44cbae08e134908cdae961b88b2b
-
Filesize
3KB
MD51158f86a0845ee6fe9ce7b682fd51439
SHA1caf9890ab05a6eef87827bb3ab60eaee3b254faa
SHA2563d1f80bce336609701c74a291ec5f27ae76b198dfc51fe6615349996dcba8ab1
SHA5123820fa06d8911561113535b4e01a0e4a3bcb87a566762f0995074fdd561e824454613a36d5347004f0370ff27867df4f962f498ca63e8e4b5e82c935860d3503
-
Filesize
4KB
MD5ede40b36034d11420daf9b761d447622
SHA183e69cb72e12fd8ccd507bfa21133e1fca0fd5d7
SHA2566e27085c9b049479ed4b5d515c82d49091d1d0d6a70cc1af4fe1e085816236d4
SHA5120fc2330cfab1d7a2fa7e55f9cc177aa246de7f672540212721ca9232920652a2306906719e60af2bd37ca2fc9074d2244a5514fdc7f344e7c4006b4c69a75120
-
Filesize
167B
MD5d477514b924f22c9b48691f87820815f
SHA1f0f415b7140bf6aebcfbb3fa4251d9d0e66b3e05
SHA2568c0c56d8bae656759447a8ece1ea89e87dfe5412e45553b1ecad27cb0bc685ee
SHA512eeddbdeb344cd0f8bb8f24af25c647c7a95408a67a738e03022813092a4d67ebf2ff0d86afd9a078b4a0234f5c8e2e05429211c9eec26fc5ac7e4d90d823e2b5
-
Filesize
199B
MD59458282866992c50a22a7caa0f95cf83
SHA14cc303e15f9972d2c9a87ced788e1ea5d344a49f
SHA2565aa2b8d8849d18093683ab7e7af8d2db42108f55aa99bc6c053a3d6bfdbce307
SHA512f73cc705a1ee1a5f9c87261f4f34f931e3d2075b944f7e6d2ee0802721618bd96c81c6bb181a1eb05a8b5b87bd290c1802f306ac2415c146f4b92a19ac5e68f4
-
Filesize
2.6MB
MD5fb7eff77ddc9a2cd276a64cb866a71c0
SHA1e9cca580b9ee9339dfde8c6c771577318e4b738d
SHA25688943b339553c358894b36a4e1ff60807033e19ed027fe575114919450774632
SHA5125986fb1f85451022767372a6fcec42ae7ef97a2de92ac02387526ec99d0c49aef57cbb343297b1b01f8e109ceafb90aeeffc8470386717d1bc7850354f2c0ee9
-
Filesize
2.6MB
MD51ad78428baf6755c7aed812d9aa06320
SHA15090d026177174bea0fdaaaf45cd41ae914bda72
SHA256b7846de7d3e0c653a174e1a038210dda36f81352963de5c2ffb408a67461460e
SHA512963ed14171299c3da17cc9354786325250222d67a683bac1bd818040c1092c6a45199ef7b58407ad2b1cb0a60a5581e455326d2d3711e7c234bf60aa74df5ad2