Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe
Resource
win10v2004-20240426-en
General
-
Target
17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe
-
Size
2.7MB
-
MD5
46c076bed77d9c4e6d30b383d456c1b7
-
SHA1
0598b84f98015c10877d820f45d4745e69c28cd1
-
SHA256
17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b
-
SHA512
4ee81fc694de66eb1dc1bc502f6fa77332817015952fd1b035f9d6b4abfc2b8a3654ca6388202e12ebabb64594a2fda1931d995ec335a6cc63e35e88f283f20e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBf9w4Sx:+R0pI/IQlUoMPdmpSpb4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 xbodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocOB\\xbodloc.exe" 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintB1\\bodasys.exe" 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 2056 xbodloc.exe 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2056 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 28 PID 2248 wrote to memory of 2056 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 28 PID 2248 wrote to memory of 2056 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 28 PID 2248 wrote to memory of 2056 2248 17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe"C:\Users\Admin\AppData\Local\Temp\17782977dcc16ce3c1a6a614223a0e4c98f4b575206bc9b5ab50ee6e81e56a4b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\IntelprocOB\xbodloc.exeC:\IntelprocOB\xbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59958ec7ccafb54dc85733f417f974a81
SHA136367551597a4b811b52ab3f626433b0dd3f014b
SHA2568fc0cea26cd97f56ec89462a3b490a31acece478823f80f17933b590fef57d02
SHA512d79cd3cb39f9195c12b7ee90ae7bfd15375db894d17f4a9be9605e5348ee79a027f4941378490d38e874bb7436c051cd6c0671b6829a3f4dae33b4580e52f536
-
Filesize
206B
MD5db866abf1b12c985e891094495bcb030
SHA150ba0ce48ff976b04e7a262702ee20e10ecb21df
SHA2568f71c29ffbf7faf31faa3524a5f4dd6b3681e323c7fa152059f5520cafb3995b
SHA5126dbe4f5789d26c5b9df4fb10bef0068aeac929e87b70e7dc47fe76d55c66f14f254bcfc5c4f71917000121395311096b907323db964787e616b280a632214e8e
-
Filesize
2.7MB
MD5a5e20f4d3b3642170d822bd140ce0def
SHA1e285d0e2901dc728552aa30eb16a7f68ab50d12b
SHA2560f380988f6d0fbbdd57f3de3dfd9c321bbf8700b32b373a7211b339b6cd57b85
SHA5128212f7a2b6280b1dc2b03832e0823e8b75ec3710aadf79d5e7542220283862f7b3ca64b7b662d6bebe3408f515561f2d015fad138b864524e41f749e6dc250d4