Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe
Resource
win10v2004-20240412-en
General
-
Target
035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe
-
Size
3.0MB
-
MD5
393a6da9775739cb73d93a30b26bc19e
-
SHA1
5f239870438730bf52b59cffc5122bbfc7df4ef5
-
SHA256
035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49
-
SHA512
4d8698de3473af07b27b70de8431378867ee738a1de77a5227f94e8bf7215c450493bc3adc47660796ee049490a00b6f3a7c01f6862a23c5baaec6b1b3730096
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bSqz8b6LNX:sxX7QnxrloE5dpUphbVz8eLF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe -
Executes dropped EXE 2 IoCs
pid Process 3576 locdevopti.exe 552 devoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files87\\devoptisys.exe" 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ4L\\bodasys.exe" 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe 3576 locdevopti.exe 3576 locdevopti.exe 552 devoptisys.exe 552 devoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 372 wrote to memory of 3576 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 90 PID 372 wrote to memory of 3576 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 90 PID 372 wrote to memory of 3576 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 90 PID 372 wrote to memory of 552 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 91 PID 372 wrote to memory of 552 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 91 PID 372 wrote to memory of 552 372 035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe"C:\Users\Admin\AppData\Local\Temp\035d009a220b0371d8ebffc19280e5f185ea48c76e6abbac446bfbffbfb8ad49.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Files87\devoptisys.exeC:\Files87\devoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD54e132ea5a3cc80ae284d713420fa818d
SHA114dc76aecb07edd96a35aad6a4a5cdec91f7ef98
SHA2567e12d385eecc19991cd7e93f9b66c5e21a88d2fd4bd29fe0e3345dfacc976519
SHA51229d34357eb9e6da6e496b57bc6c404d6cd62f96b2d42f258910a4d3b93254826275771f345c59227bbd4c697f7ed0812073d5c5cae1cb04c22c436be975818a8
-
Filesize
3.0MB
MD5eec038d1879a346f21a22d10c37acb14
SHA1c3596ea2c01e362c0a31be0f16c9feaac75ae182
SHA256a5b349a5278b67baacf3183a31312171c4b3b90ba8681bad4d3116d91b1c0d55
SHA51251670cf2736547b14edf0c3d6752c554d8e13ce4e05a71ebc0df9e7d77ab7310fd663d7d2455cfd84c195f0e84bb0f7f3883e1a1d57df1207ae73e3fe4ed02a3
-
Filesize
3.0MB
MD5fdb0e8ccdc8f4fab38b3addcf3ba6f97
SHA15cde6121ac274139f57402e5e435f370b2108bbb
SHA25655761ae010439829c9c74a0de50aa6d4d58dcb4f47f46373e88979da0b2ae19c
SHA51290bf4c76c4c8bdb5bac17a94172bf472522159d681f49473b38b20737325ffe269b8d5a302b5dd1645f7ef88dba7a0fd194bba0c87447aedbec51a5369f6943f
-
Filesize
206B
MD5ec9143629dfa9c8b4cdf685dbd762f56
SHA1814fbd1af645c112ac769c9d486bf5610828bd70
SHA256b0b75e6106677309aadde27939657556e0faecd8c5e9d1c90115328e05349b89
SHA51216c47e16515d0f33c3ba29ce089681ca711891ef057c168804959a0360a6989008d7092653a2dd178e475a9760f0d0fef7073de21ef24ad889cd46309e929fe6
-
Filesize
174B
MD507d4e49be1f6d1c0c23bd016605df425
SHA1d2e0338a5b5e54e5b710c9131cc26ecbf84e98f0
SHA256e2b05cf162df88bf3564ae3bbf67ecdca9e487da13d99a0ac73bf1c43bb22855
SHA5129828e9402381e2741a33abd68a35b676aa9c48453b9ad8f9527ecfd352634111e6aa8ce9f7b5fd24c1de987038edc32123dbccdd139a18cb26c961b37b1146a3
-
Filesize
3.0MB
MD56330ba65c84fde8a40dd372542ba702a
SHA1d9318693665f2f0f84e41fb91406ee71c35588bc
SHA256b8c991fec5af83490d3a658c4318fe13bdea738acd77bf09be4e3a8e93ab2c5c
SHA5124d91cbc5289209bf020d640542318a2bb597622876dd4a3fec242f261ab7057aaaf7d5a4d277543a5690bdb36fd7a95e39aed16f49f497f5133fdfaa0d0eb04f