Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe
Resource
win10v2004-20240802-en
General
-
Target
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe
-
Size
2.6MB
-
MD5
abafae1dee331923326e1062c9e21a26
-
SHA1
2f5f722053e6889085d1e6b0ac270dd7d37bb560
-
SHA256
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb
-
SHA512
b5667d92e2f8381e8c3f3fbaca50c11b844488155ab7afea16bb0f4e817edc711cf19ae95a3a25bfe2bfcfff4fb1cc1dcb7fb0d607524d315c14a38940446f82
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUpsb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe -
Executes dropped EXE 2 IoCs
pid Process 1244 ecxopti.exe 3012 xdobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintMF\\optixec.exe" 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeVV\\xdobsys.exe" 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe 1244 ecxopti.exe 3012 xdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1244 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 30 PID 1864 wrote to memory of 1244 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 30 PID 1864 wrote to memory of 1244 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 30 PID 1864 wrote to memory of 1244 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 30 PID 1864 wrote to memory of 3012 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 31 PID 1864 wrote to memory of 3012 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 31 PID 1864 wrote to memory of 3012 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 31 PID 1864 wrote to memory of 3012 1864 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe"C:\Users\Admin\AppData\Local\Temp\6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\AdobeVV\xdobsys.exeC:\AdobeVV\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD589e94991401f10689fab248a9eaa465b
SHA19879a94fc3484d6c349fd74ff3738ed3877fa87e
SHA256bb9b70c7757c362c58bf13ba19e43879d7b2dfdff180faddac2b18e4365d957b
SHA5123e6147054dadef86253599acf711a250fee125857b409c59d28d434329a82e7a18bdf1835a4530621043671b77a4cba97898d144414dfe5e4175f19439be7ffd
-
Filesize
2.1MB
MD502f7542067eb3597d32c52ddd8c8e58d
SHA144aaaf088a45a29510d0cc7c00ccf6c819c35ae1
SHA256dedcff3958122c87163dcf2ff58f7ee4586764382ce7ee780a2e3a5b34e01fbf
SHA512d2e2dacf002bae39727bf9b469f2b8e007abd18230df52b92d6488ca4c8110348b0e908493780d87605c80d73aa602d7a7de98293d1964f8dad8c9be30af92e7
-
Filesize
2.6MB
MD56feef8495324d0e469ae7936bcdd092c
SHA14da97d5dc2caeb328da7e5c1b8a532b63ace44ce
SHA256966a9d376c78b05890aa27055d2a21712ceb0310804a7300d59b3e2fd62a35de
SHA51251dc0ae715626b5df41cf256c8bab232585e4ffeecd35f16161f2f442f582976e64705a026b34a42bc215304a8318204ad996781462fa04bf2e1e1454f5fd6d6
-
Filesize
168B
MD55027d7a3b04a96c4905cdfbf2e38d61e
SHA1e3e3cb6a9c74fc0da8bc8b4f3760da66786a2b61
SHA2567f96d163eb5cb47c1ea6cdd4dfce6b51d3f104df024f13b9700d93e1ccf89c32
SHA51251c3dc9c825ceeab919dd6e500de8da35c6024b1d1d334b763811f440cc2ebd92e63db06b4dce7179ef16abff7e885bd00dd643d167d27dab31f532e645562a3
-
Filesize
200B
MD5d5caf1124ab31e2552ba6c5d77f92328
SHA12fded6f34cbca0f6dd93be141f7b250fb1138805
SHA256b4221e371a92eacaa0b33e0195e7fe5bdeced808b33595ab6461b8a4387af6dd
SHA5125313affe05db26e35d761dc79b7f2edbcdd7be1f597c973a8c6258c2dfb57250a0db7bac7520332f3921152daaa9148515f802ad797d61662e9e140ae3678ab7
-
Filesize
2.6MB
MD5b01f64426c7f591e80d348dfbbbeb038
SHA19f004b017d0255725559e4d04620c3dddbd9256c
SHA256fb2d5eb77102d25b54e20bed946be7129944e99080bf43c95cb8d2077c5095bb
SHA5125ecc5321d393854e8e8f4dcad96c7af3026e94852feb987fb57659a2c290f81cddf807506c2d5c90f5a50920a36dd6d9d942e478cf1caf9f8890b1a8cc983e66