Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
fa1d440bb1348e08cd5975db0dc88ed0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa1d440bb1348e08cd5975db0dc88ed0N.exe
Resource
win10v2004-20240802-en
General
-
Target
fa1d440bb1348e08cd5975db0dc88ed0N.exe
-
Size
2.6MB
-
MD5
fa1d440bb1348e08cd5975db0dc88ed0
-
SHA1
1097f7327cd57e2927c806007f690dc7ddf86098
-
SHA256
9177654514a8e6b4a1092a50e4cd3fc3f5f4a46e6b1da4f908d29c8bf11b5206
-
SHA512
fc749ec42221b8235c04fd78869362d72501fd6b199434f4ed0fe2e1e783205965601ccfd45da566771ec810b47b00d9f677ae27e5bd5b401ccd7beba00c30ad
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBAB/bS:sxX7QnxrloE5dpUpHb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe fa1d440bb1348e08cd5975db0dc88ed0N.exe -
Executes dropped EXE 2 IoCs
pid Process 1336 sysxdob.exe 4972 adobloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files25\\adobloc.exe" fa1d440bb1348e08cd5975db0dc88ed0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZUL\\boddevsys.exe" fa1d440bb1348e08cd5975db0dc88ed0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa1d440bb1348e08cd5975db0dc88ed0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe 1336 sysxdob.exe 1336 sysxdob.exe 4972 adobloc.exe 4972 adobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1336 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 93 PID 1812 wrote to memory of 1336 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 93 PID 1812 wrote to memory of 1336 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 93 PID 1812 wrote to memory of 4972 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 94 PID 1812 wrote to memory of 4972 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 94 PID 1812 wrote to memory of 4972 1812 fa1d440bb1348e08cd5975db0dc88ed0N.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa1d440bb1348e08cd5975db0dc88ed0N.exe"C:\Users\Admin\AppData\Local\Temp\fa1d440bb1348e08cd5975db0dc88ed0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Files25\adobloc.exeC:\Files25\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4416,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:81⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5534180d28ca08e6942e0b460fe46b9a6
SHA1c76365ef37190a47e245bf5c4ee80bc551b5b00f
SHA256923b56caa39d38b63310b358f7ae2957c64dce4b0be4640c556d04155edcdcd9
SHA5128ea61a6818b3b59e254ea8712723bae888ec5b8ac74a38a0ca17bf0c6ba10f59e56cc7f75d032911330a6dea61de4aa9d37eac8e5347d818d48fe53052f476cf
-
Filesize
2.6MB
MD5c06aaac5279ff25a50f7496b5a9c23f9
SHA1d0d7d707baeca1d54945b83f7dcfff9d3663e764
SHA25635ca2f288c862ba4c62cdb94de1b8f069fb538e056cc39c0e311f2ee6f2b2fb2
SHA51204e81826c538c3cda24b700b09f2cddf2c6736c3b897643840cbc4f1f0cf4c1368061340e7fdf5a761a26b43a13a8909a082c71b79ec8a6a7722e96daac66a36
-
Filesize
2.6MB
MD5a56bb697c5b751cb7f96d303136613b2
SHA1bf4ad94add909903e607fb87a949802727421d0d
SHA256ef36c17c67c7b293e486849603ce74892eafe9bda92b85a90f12ce0680813f52
SHA512ada7a12fcdd5396027d48414bc462fda4e5b90838c483e94ee570a085950123bf5a5b866bd1e5d876e46414b0f5f71770cb39360186d461491df3dcb876e645c
-
Filesize
202B
MD5506c7c5d56c3985df5bbe870cc54f3c7
SHA1756489795040d1033efaa93262a6c17757e435d5
SHA256d7fa477b945469d3a425afcedf6b912884c148d4388cf42692f869135620add6
SHA512ceec0f78d1b8da9603a26c801df8dc33a318c24a7513270f3ff3bea16952226b20d8e256c87ad7865925640a0ee0dc105655ad9969033b37aed50671b4ff384b
-
Filesize
170B
MD5a8186c842f0dc158409e78c49e00fe68
SHA1126a7d0ada96f2e342b1c933ed1fd8d6c80796c4
SHA2564f2198577d2879db23bd15cfc450d0a81ffa924842d4feb74145107f72515108
SHA512e30c5a4eaf7b374c2b93ce701946f56495ecb3313b626d6843a282a4475bec88b2731204cb365afb3c981cbc1e46defb4c1d6e36970a8c56e785a4dd8545c100
-
Filesize
2.6MB
MD5a1a525243d0fa1f37159b7b00063534f
SHA17b5107d934c3a9e1fe6da865dd706b85dd369ddc
SHA25676417e9fa55a765e1cfd2b5fa283703b9763185628dd794c3d31b32e9bd79279
SHA512cb913c4e214affc61d091ccdbab3783bd92d7b0dc221f1776122ec6b970665b0f56f9b821887f1570bd53fc073e1ad2cb5747ce225de9606be3b4a4f8bdb0fba