Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe
Resource
win10v2004-20240802-en
General
-
Target
8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe
-
Size
2.7MB
-
MD5
a90cffa702e913306df4c4a0acdfd404
-
SHA1
688da8c94990b47fff9fd83253b972b8dee2cbdb
-
SHA256
8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4
-
SHA512
43f0a3b77e613f9a43540867572ec8f298c8f7af7c353467b2a51f5b3804869e5eff5db160a6ebe4e5a02e3dab31ae89c66494fe037dc57bd8e8f289a61c72dc
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBP9w4Sx:+R0pI/IQlUoMPdmpSpD4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2308 adobsys.exe -
Loads dropped DLL 1 IoCs
pid Process 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvK7\\adobsys.exe" 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintVB\\bodxloc.exe" 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 2308 adobsys.exe 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2308 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 30 PID 468 wrote to memory of 2308 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 30 PID 468 wrote to memory of 2308 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 30 PID 468 wrote to memory of 2308 468 8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe"C:\Users\Admin\AppData\Local\Temp\8f4d2f0e0c86fcf9ab1bcf4fc1f6f4934837b2d2950acad50f2e6da1053399c4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\SysDrvK7\adobsys.exeC:\SysDrvK7\adobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5f4619b120396f8c5a1281d7d1fbe8d47
SHA1f8aec92321250ae4eb954a135a17d01b4bb798db
SHA256c2a4bc3d09bb3d1648067082da7dc408f133b3e96917a311b9112bd1e99e8125
SHA512f8d30353f8b6946811fbcc9780f05e922dbd48fcfe5439dfcba41f3af94c19fabad9782c6f4f86d2a6af0a1501a2d3f7348aa0753f48b77c92d059aa1a3b83d1
-
Filesize
2.7MB
MD536a833314c8a45a0ddcf268d38b6d902
SHA1d46d8b25f096d1a63e1aedbf3cd6d49060355d8d
SHA25629199c422954b538780acd8d327d4ee733f6c38ee0bdfa16775350e5a9014606
SHA51244bb650af30c27bb1f65349af1d9b73c448f9f886a4f8e2c0cb1236d1ad86ba02b5bd89b9b07126c67082f067bb20209a0e55c37cb9fe8b8a4df6badb080bd58
-
Filesize
202B
MD5653a090c31f3da8d8daa0d134cb6e6ae
SHA1725f76b29c954a8c42d460de99034913c17a3aed
SHA2566e341ee1ed9dc4a23caa52f9edc4b35c40014e3002ff0e472ba41d8ba1e26140
SHA51207956ee56c9b1ab13f40ca74fcf64a8798b8c40f91812c1c00ea7f423017fe2cf0f953e86ac38c79b86918461345f1930d7d126fd8f5d16ff06ef3610be969eb
-
Filesize
2.7MB
MD5adbfb8a502644c1297328449a84fdebc
SHA1239d8532e5714e7cdafcd7bdc613e0c426d97d14
SHA2565d61ffedc852054f1294fd3937d0b5c51918cddffedaf4074f55186bb71bf5f7
SHA512922af29ceef8c144f4c3b882418a80f479ed1d37e6289548d1e89f1d0a4d039503684d4fdcb521609aa5ac8a1044efe6a4de34e08682bf6e177b764bee9a8cf6