Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
6058ce6c1477c1d907a1f92788c0a020N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6058ce6c1477c1d907a1f92788c0a020N.exe
Resource
win10v2004-20240802-en
General
-
Target
6058ce6c1477c1d907a1f92788c0a020N.exe
-
Size
4.1MB
-
MD5
6058ce6c1477c1d907a1f92788c0a020
-
SHA1
d4f6bf17cbe98ce4055f1a8adda914c2de4fd317
-
SHA256
96eb97dae45a557ab485a9544134bc88428f970ac68c81061ba5d6452b15e6dd
-
SHA512
7285e3f7c6a9ee68ff23404c1a01bb03c5c7d354dff57fcd1d78493056076e12bfde492a814490cef5813ed245a9491ecc432a8a4e63a02aa30ee9426adf70a7
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpN4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmi5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 aoptiec.exe -
Loads dropped DLL 1 IoCs
pid Process 2952 6058ce6c1477c1d907a1f92788c0a020N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesPF\\aoptiec.exe" 6058ce6c1477c1d907a1f92788c0a020N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB25\\optiaec.exe" 6058ce6c1477c1d907a1f92788c0a020N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6058ce6c1477c1d907a1f92788c0a020N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 2876 aoptiec.exe 2952 6058ce6c1477c1d907a1f92788c0a020N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2876 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 31 PID 2952 wrote to memory of 2876 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 31 PID 2952 wrote to memory of 2876 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 31 PID 2952 wrote to memory of 2876 2952 6058ce6c1477c1d907a1f92788c0a020N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6058ce6c1477c1d907a1f92788c0a020N.exe"C:\Users\Admin\AppData\Local\Temp\6058ce6c1477c1d907a1f92788c0a020N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\FilesPF\aoptiec.exeC:\FilesPF\aoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD58903d20955677e6ab63c2ec718864d68
SHA146b286a865dd6a26faa55801ef4d06f1c577f741
SHA25611748175bfbe606c9904015f29352d2dbeb3e6bb8822c82cb1ee041fa3bf6488
SHA512bf747dab0eb10bdc3476d5262df7477bb632b35f7e48ae6515f323931763f1b6158595c2f7bc24674d0433528873bba16e08763ce9f9453e9cc500bea70bf529
-
Filesize
199B
MD54db66b8ca87296123c81ebee1520b4bc
SHA12321b349e62f3a57fa4c35f5dfdee591c9a00fe8
SHA25639813f7febd95499144cdb002f1ca8c9e408a791812ddb81671390352a5f0487
SHA5127aa8ebc54be66f354d4bc55a48b8fbc8136dc0bdf0614971bffbf34fee62e061087e24c8e0dde61a4dfbfd1f121f84aebf716470fa99a056e416d53d0579af7a
-
Filesize
4.1MB
MD5fa6ab124af706271a4cf08e17e6e3c6c
SHA1ab6234e9906302db0f76a221fcb697f80fd9c8b9
SHA25696bdaed77b73803f505b6e4debe1cbe999a1b45ccbf8702a40540707393009c2
SHA512ff96cd3f20493949543ea250a06773c8fd3d441912e126f2812d37382b92b6399dcdb64cabf61494058e3fa09d06fd108a743270b10ee82aeeccbbea44d0de20