Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
fdc3b4f2b1652a2c42bddbc6e4bee990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdc3b4f2b1652a2c42bddbc6e4bee990N.exe
Resource
win10v2004-20240802-en
General
-
Target
fdc3b4f2b1652a2c42bddbc6e4bee990N.exe
-
Size
2.6MB
-
MD5
fdc3b4f2b1652a2c42bddbc6e4bee990
-
SHA1
62d4e19aa1b8384f1eaa7bdeb7fe42e3be5e15ec
-
SHA256
aa4562b293c9126d076d83723b89798e695f9423a4eeba10d4c90a92020c9542
-
SHA512
be2cd7d53fb09ab9e8ae34584329efdcb986822559e54ac8433e8ddcb1eb5498cafae6d87c8e7be3f50b79db367bfbb0981cfbc4b3d067b10e98de9b7cb77f42
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bS:sxX7QnxrloE5dpUprb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe fdc3b4f2b1652a2c42bddbc6e4bee990N.exe -
Executes dropped EXE 2 IoCs
pid Process 3572 ecdevdob.exe 4008 adobec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot8W\\adobec.exe" fdc3b4f2b1652a2c42bddbc6e4bee990N.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint5J\\dobaloc.exe" fdc3b4f2b1652a2c42bddbc6e4bee990N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdc3b4f2b1652a2c42bddbc6e4bee990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe 3572 ecdevdob.exe 3572 ecdevdob.exe 4008 adobec.exe 4008 adobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 552 wrote to memory of 3572 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 90 PID 552 wrote to memory of 3572 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 90 PID 552 wrote to memory of 3572 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 90 PID 552 wrote to memory of 4008 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 92 PID 552 wrote to memory of 4008 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 92 PID 552 wrote to memory of 4008 552 fdc3b4f2b1652a2c42bddbc6e4bee990N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc3b4f2b1652a2c42bddbc6e4bee990N.exe"C:\Users\Admin\AppData\Local\Temp\fdc3b4f2b1652a2c42bddbc6e4bee990N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\UserDot8W\adobec.exeC:\UserDot8W\adobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD571fa1b1b83039420ec71997b78bec375
SHA1b5bd6950f3cca256218baa7aee93f3fbf4b8d175
SHA256f240a7b47c88766d0be766956b40ef61275446488b88d7bda175fb55a912b3d6
SHA51219d96bde8942123514268a1ab2e2013470dbe0cfc83a3851f03decc9acdbee50c60e987342c3d98d1cd4d12fdedd0f6bd185332d32de69e591e86ca5c0339495
-
Filesize
2.6MB
MD5b404bbb485b34f2af8cfb5c4f6d5bdfa
SHA16774a54c4416b07237982f6e0d67b1f6ebf06ebe
SHA256c7079ff426dc2df618ea6ecf341887d9ff7c1b470b872a77da90e0ab2acc4665
SHA5123ce4dfdcd83f8925fe821b5b38c0dfe31d3312bf4a759d213151c289300b541bcb3b99fde7adf3876bc8da2827385cdc23ae8e7035cad4522a421f35dc17b14b
-
Filesize
2.6MB
MD5deb56d847fe8f0c2febb9a20286b8a2f
SHA13129ed462bd79c279012ae39fcff3c70df3c61fe
SHA256a90e46b23b8b9c89ec75911577f6785e42a55440f53bfbbd9b68504e90f37d58
SHA512be1551919c57a4ad20f811e4eb12603bc51fa6ce41eea03c5c323069f98e120b7cdc9a4f6ec9e2ae2a2deff2e7afa763f92cdd2f69a33eaca2c83c35b4222695
-
Filesize
202B
MD5358deabf49bb2c44d24769613d132286
SHA1e7c6ec753248315f1a8a403e5381f71839ea9936
SHA25635024aa6f4343c663af97830f4e48df1af54b59ff15cb7cc1a3bc3dc5ffb088d
SHA512511c1e4170f7c890f9c7036766a5f4472be7c9b2078f654eb83a130607467391c30e473adee8cfea691a660bd62fd2cf096ecd762a82f160409f91e67d6868b3
-
Filesize
170B
MD544ac20a7df9e8c1bb9bc2d98b55519d1
SHA1f40216913f1f34f76b4cbf77cc308616dc4a74ba
SHA25642f1f4ac1e28bde2d5f290b3b258a5eef26de5c4e08ff43a759cb4db58a85b88
SHA5120e0db648f3df5f182ba3a0dfce23ccb2b313b1946638f6aaaacbdd85426895237fe4cd7722eef58e626c67b95dccf17c4369015f1ac5cdea59214f8bfd8f7b3b
-
Filesize
2.6MB
MD5825d5efe07f7d1cc8e439b1b22e03d30
SHA187576163ddcb6a6b3fd4f13c3fd81790f9b6e60d
SHA256e0f6ded9c7245c8e23c68296e77f4fb32b36422a667d269a566c1bbd25347e9b
SHA512f86d056c67771a85842c6c9c48734fadd9de33abded375f1438a512a773dd7e7fae21401b9e412a3b1498344ecc73b3f01809527f01166505b0d7cbfa192e78b