Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe
Resource
win10v2004-20240802-en
General
-
Target
b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe
-
Size
2.6MB
-
MD5
4be4cf1d7701bb2a386c452ec9577130
-
SHA1
5d6cccb56d87dbafcff675f88328f0990f7efee4
-
SHA256
b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1
-
SHA512
6f8c709d8fd57295ab94571163f24180ffb73e727e6db918ecd02bc144000127d2fd4adfa030a31fbddbf5c692e68d8e48256f41f78fcacd3e06b380b5343d01
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LByB/bS:sxX7QnxrloE5dpUpxb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe -
Executes dropped EXE 2 IoCs
pid Process 2508 ecxdob.exe 2332 abodloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvQ7\\abodloc.exe" b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZRH\\optixloc.exe" b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe 2508 ecxdob.exe 2508 ecxdob.exe 2332 abodloc.exe 2332 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4124 wrote to memory of 2508 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 82 PID 4124 wrote to memory of 2508 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 82 PID 4124 wrote to memory of 2508 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 82 PID 4124 wrote to memory of 2332 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 83 PID 4124 wrote to memory of 2332 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 83 PID 4124 wrote to memory of 2332 4124 b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe"C:\Users\Admin\AppData\Local\Temp\b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\SysDrvQ7\abodloc.exeC:\SysDrvQ7\abodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a0c0a0eb3163c7a7190129acb2320bdb
SHA1a48109c2e9973c7efc18a3d9883bc3f33234743e
SHA25633be630f628c9bc7a763435fdcd4e17e2e1cc295a58c513eb21acff0748756af
SHA512105d25c6a62053cd8198996da5be0cc4b491852d205a3ae9fab72c58cecf3bb4aef84d0156dd81a449d2d57ec5c407de7470a6cc9e3732dbacf03bd5b3ee79a4
-
Filesize
693KB
MD5e3c9ac9a2da1e326be73a2aa841da884
SHA1e505567b91fd8ba136d127becb00ed80ae6aa044
SHA25661057e088c9468bc7c8469f640aba0dd32d6878b00c34b146621ec6635ead683
SHA512109f5fca5e095c59265dcb8c3e64de5c66c6684a8b8df6e537850e7c105bcb075f86ce40bdb259568a8bff6b0804dbbba2e3c0edc24cf3e6550fe1dff917e7be
-
Filesize
2.6MB
MD57d61d6a69bcfeb97be1c0c6e1395ba9b
SHA10f59dbe6f66f5e4f0189f9a0267e7f6032e19152
SHA256f5915238e6043c64689766df7a02c255cff4510ab682b84d421ca234dd8d68b5
SHA512f6fe52176b6b3fccdb691a8577e5776e34708de816a3423c0dee3951de6191105f5108f832e61dc15ee9f596c4a3726bc347195130065ace6dbc049f12cce778
-
Filesize
201B
MD5240efbf74dfda21dd3aebb3e8d349b62
SHA18924b8bd737c4a75cfa73738fe76e63862bda40f
SHA256ec4121bc08693da5e0238c932f11c50bd797b211d4d9c42d9a836fa3536099e8
SHA5129bce167b905cefdc3e965c8858138c39b3562f41bd395ff149f883968e830ec019584e09985eea848b04ed8c5533e56c5560782370f231a08ddeb2f07d3677ed
-
Filesize
169B
MD5dc1f0e7eecc185b1e94c3cd75d5db4df
SHA1c7507c5bcdbb85e4c550d2109abec0e5da53787f
SHA2564e4128c604208368d69b41017bd16f04eca1876cff6feb2067baa166f67eabf5
SHA512742fb5eb623b048adc4dd18dd2bc2ffabfae04578bebaba26666c0fe1ec87bb4ef88c1cd26a3bf3d1dca9943d47c64800d01fd0dd5020fc7c780505c569e52a0
-
Filesize
2.6MB
MD5f98a1fc8470f9b787b7c3a907c8f5af5
SHA15b3417d3a653df043073141e2b1cae3b0ac4eac5
SHA2562fb62f24d8a09e95bfd790c6551fe8a042bcc80c721ece0e57685974a4c31f64
SHA5123581c80685290085df8e43e3248737888fc43e25ba73c0fc8b294c7aa809e5bfc4d7166b7e489e10a1ca1eead5104707e3babfc3e0d6530fd9baf6ee7bf3ee79