Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 01:55

General

  • Target

    ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe

  • Size

    2.6MB

  • MD5

    481024bcac7ce4ee44228fd3cdb266bb

  • SHA1

    9a4c3849760f361aa13c5abd2473a3647d968e53

  • SHA256

    ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d

  • SHA512

    b975c302416c8581e380956c95a513595627d8bf185e088baad321dcf28612bd1de38d1956408e745425e5749c7efbe100bbf2cc3a0aeea0cf4938d4803c8d33

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBWB/bSq:sxX7QnxrloE5dpUpZbV

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe
    "C:\Users\Admin\AppData\Local\Temp\ad2468cbb0a4d201420679240092d46d8c9b58c7cac4666d892d5cf7698f7a0d.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5056
    • C:\IntelprocEV\adobloc.exe
      C:\IntelprocEV\adobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocEV\adobloc.exe

    Filesize

    2.6MB

    MD5

    bb1518da2ee9e15581cc80bebe83662d

    SHA1

    1426fd3a656dd2f319fd1c64c5bacdbe2740c0b2

    SHA256

    44baa435f7bf59dacde2478a44f29964375477ae3a4b02ea2b8d51a6143c9502

    SHA512

    22c12334678ba3cb21c0651999a884790a3f06f516ab4640d0ddd8c0bb67790af2cf18a97ea5310f1bee6aaf86abbbf4d5d3d932f6e65e1880f970a6cfa112e3

  • C:\LabZOW\optiasys.exe

    Filesize

    2.6MB

    MD5

    5c2e21a4ff93e97d6adbde8cf0cc65fe

    SHA1

    3ce6f74707f916a69b54913f05af1c926a14152d

    SHA256

    6fc5be7a1f29d592dd81cf2d951a5e55b026760fda6c42b156a3c0b7f1fe8949

    SHA512

    be4acb027b626d805e487bf8c47d3dfe3ce0d704db291f76627af88a7c7a64629a31ca28bb368116e0ce6c499aa73240ccd98fdacaa75f1e5f6f8dbdb6e8b9e2

  • C:\LabZOW\optiasys.exe

    Filesize

    136KB

    MD5

    bc2bee7ad510f8f21c33d744da290bd6

    SHA1

    458c9f7f74795a69c6fdb3cef5e5006c9f386a24

    SHA256

    d540d4bca412b1d15fa08b90dfc21d1fc91c19c7495557edd90589bf4b1c0353

    SHA512

    4db7e10baf697c1f817d5f7afcc63ca1a44017651ca7bfbe2910e140c46510107070c6798f1774873a452907b201e7908c23e57fe6d8513f2e82ea10d05feaec

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    204B

    MD5

    48860823b75e02063c9f02f8f927e3ea

    SHA1

    d7e091e4c6eeba212d9c9ccec3f6f3b0c5de7d2a

    SHA256

    b91b053a5fed71bedd0c63e05c6baa8c1b407f835df60eac21c3d3fc3c937626

    SHA512

    41498c94b0099166ba38eebfd09e65842f2c5688f175955bfc9fe8d9b9e3af03327707c543c0e085139c228b612e1f579964ee8b9fc8e009744e268355c276fa

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    172B

    MD5

    79e82c8a167505864a7c41a1d87bd372

    SHA1

    b3621ca61633eb847a5ed86f71c3d90665fd979a

    SHA256

    a79f594eb059148c6503f0bdb4efdc608fed3c03bed6342459f7a8863e053a14

    SHA512

    50b89dd8d7c99800a4093b47ec1407a850bb1443dc35570a860d269bb0391dee2c7b8ae7285eddbdb723884814e0e57698db064a0d4f032e19efca51d21ab87b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecadob.exe

    Filesize

    2.6MB

    MD5

    5318bd401a7d3ae5475cbf7d1d72fa07

    SHA1

    daee075153916d2892115668ae280e75e72edf4e

    SHA256

    8066480e2f428a5a18cf1004440757948f3709f82da8e3b05145e01940ffcb47

    SHA512

    59efd5b05fc592e65c2eca1d70a127d139f69e8769ad1fa7989e36fd6ca0fe7e9a4cd883e4bc38419007ec1b4fc68266ac4bb61af6467c967a710d391614a051