Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe
Resource
win10v2004-20240802-en
General
-
Target
ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe
-
Size
2.6MB
-
MD5
481024bcac7ce4ee44228fd3cdb266bb
-
SHA1
9a4c3849760f361aa13c5abd2473a3647d968e53
-
SHA256
ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d
-
SHA512
b975c302416c8581e380956c95a513595627d8bf185e088baad321dcf28612bd1de38d1956408e745425e5749c7efbe100bbf2cc3a0aeea0cf4938d4803c8d33
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBWB/bSq:sxX7QnxrloE5dpUpZbV
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe -
Executes dropped EXE 2 IoCs
pid Process 5056 ecadob.exe 4548 adobloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocEV\\adobloc.exe" ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZOW\\optiasys.exe" ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe 5056 ecadob.exe 5056 ecadob.exe 4548 adobloc.exe 4548 adobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3588 wrote to memory of 5056 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 88 PID 3588 wrote to memory of 5056 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 88 PID 3588 wrote to memory of 5056 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 88 PID 3588 wrote to memory of 4548 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 91 PID 3588 wrote to memory of 4548 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 91 PID 3588 wrote to memory of 4548 3588 ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe"C:\Users\Admin\AppData\Local\Temp\ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\IntelprocEV\adobloc.exeC:\IntelprocEV\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5bb1518da2ee9e15581cc80bebe83662d
SHA11426fd3a656dd2f319fd1c64c5bacdbe2740c0b2
SHA25644baa435f7bf59dacde2478a44f29964375477ae3a4b02ea2b8d51a6143c9502
SHA51222c12334678ba3cb21c0651999a884790a3f06f516ab4640d0ddd8c0bb67790af2cf18a97ea5310f1bee6aaf86abbbf4d5d3d932f6e65e1880f970a6cfa112e3
-
Filesize
2.6MB
MD55c2e21a4ff93e97d6adbde8cf0cc65fe
SHA13ce6f74707f916a69b54913f05af1c926a14152d
SHA2566fc5be7a1f29d592dd81cf2d951a5e55b026760fda6c42b156a3c0b7f1fe8949
SHA512be4acb027b626d805e487bf8c47d3dfe3ce0d704db291f76627af88a7c7a64629a31ca28bb368116e0ce6c499aa73240ccd98fdacaa75f1e5f6f8dbdb6e8b9e2
-
Filesize
136KB
MD5bc2bee7ad510f8f21c33d744da290bd6
SHA1458c9f7f74795a69c6fdb3cef5e5006c9f386a24
SHA256d540d4bca412b1d15fa08b90dfc21d1fc91c19c7495557edd90589bf4b1c0353
SHA5124db7e10baf697c1f817d5f7afcc63ca1a44017651ca7bfbe2910e140c46510107070c6798f1774873a452907b201e7908c23e57fe6d8513f2e82ea10d05feaec
-
Filesize
204B
MD548860823b75e02063c9f02f8f927e3ea
SHA1d7e091e4c6eeba212d9c9ccec3f6f3b0c5de7d2a
SHA256b91b053a5fed71bedd0c63e05c6baa8c1b407f835df60eac21c3d3fc3c937626
SHA51241498c94b0099166ba38eebfd09e65842f2c5688f175955bfc9fe8d9b9e3af03327707c543c0e085139c228b612e1f579964ee8b9fc8e009744e268355c276fa
-
Filesize
172B
MD579e82c8a167505864a7c41a1d87bd372
SHA1b3621ca61633eb847a5ed86f71c3d90665fd979a
SHA256a79f594eb059148c6503f0bdb4efdc608fed3c03bed6342459f7a8863e053a14
SHA51250b89dd8d7c99800a4093b47ec1407a850bb1443dc35570a860d269bb0391dee2c7b8ae7285eddbdb723884814e0e57698db064a0d4f032e19efca51d21ab87b
-
Filesize
2.6MB
MD55318bd401a7d3ae5475cbf7d1d72fa07
SHA1daee075153916d2892115668ae280e75e72edf4e
SHA2568066480e2f428a5a18cf1004440757948f3709f82da8e3b05145e01940ffcb47
SHA51259efd5b05fc592e65c2eca1d70a127d139f69e8769ad1fa7989e36fd6ca0fe7e9a4cd883e4bc38419007ec1b4fc68266ac4bb61af6467c967a710d391614a051