Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe
Resource
win10v2004-20240508-en
General
-
Target
43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe
-
Size
3.0MB
-
MD5
44baab70116f04bf66825695716ac7d7
-
SHA1
e82790893da33573ed32d0ed8fbd1d3565fc0ea8
-
SHA256
43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a
-
SHA512
1175955d67bcda448a1890c09e2e99aeaba2864b3ee63c449a0039837f519b13b49a6bdaeb89e0f95ae8f676da6c092a83b3e2f22d229b53acd8ace61734d0a6
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bSqz8b6LNX:sxX7QnxrloE5dpUpVbVz8eLF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe -
Executes dropped EXE 2 IoCs
pid Process 1996 locabod.exe 2660 xbodec.exe -
Loads dropped DLL 2 IoCs
pid Process 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocVX\\xbodec.exe" 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxIJ\\bodxec.exe" 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe 1996 locabod.exe 2660 xbodec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 840 wrote to memory of 1996 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 28 PID 840 wrote to memory of 1996 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 28 PID 840 wrote to memory of 1996 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 28 PID 840 wrote to memory of 1996 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 28 PID 840 wrote to memory of 2660 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 29 PID 840 wrote to memory of 2660 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 29 PID 840 wrote to memory of 2660 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 29 PID 840 wrote to memory of 2660 840 43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe"C:\Users\Admin\AppData\Local\Temp\43106d0e8bcc809ca1846b8f8f337c9115a9ee1fb37b30fc0bba4074cca79b8a.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\IntelprocVX\xbodec.exeC:\IntelprocVX\xbodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD52ac4a7e22bbba2c452f63118efae7bb3
SHA168cc1ed9873f8516e1e40c56755920c8037a046a
SHA256f60daee20886b295fb124c1bd22a4af322ae4c74e9ef952785cc9ff64d097e5b
SHA512c90e4de4df4a10dc17720d69859da7c5a680b59a2f72d30132aa91b262791a30c2b07a23afbd57de3fde1ec99127d4c2f678f8d7eb29367fbe252646f22d2d54
-
Filesize
211KB
MD581a8de2ac1440aa2dd378d64a83bd1d4
SHA1e57cd57949fc4550c16fc99f6936bc3c7ed289f9
SHA25641d3113a9ba6ac0285b580443c7d2ed6982b9f536194e34d23a539c12c9e14bb
SHA51221c63172c1d7b242d3f63d9de68571feca4c6dafc2d8331dc5363813733d772ca65706ea84a087e9dcd74e69abad6fd258a32d85b5e96e0577eba0215afc6127
-
Filesize
3.0MB
MD53e9e16b4e9457c2c2a191610f21595ab
SHA13d67c1bc0518f3517eb59503f95f94249537df63
SHA256270aedc2446dd52a0ff52502bd02ac6afbebd98babb88fdb0c99cf227e6dc946
SHA512f0f365d1c1a16270de592b0bb8baf5e45a8f99f0bd0551e402721d31094f0b6aa82f896009c353316d176b178d9c9e63c8478fbf41918b2d55e0b7ba6f0ecd6b
-
Filesize
171B
MD5aac6268db057f01bdd058337d25add68
SHA179862542bbbbb078355b65e3eb8c68f9933f82a6
SHA25655adeffc5f8b5691e327ca1f59369b715e90e2d71b6d54f308f95e750ff6f44e
SHA5120a917617a49a57836cbe755aae6b6a1f8eb627afb15ca0f816c7f2dc566c44d95062c0cee8f6e98b9d4276654437d5e03b3a7a2d1da9fb81da837fe364be00c7
-
Filesize
203B
MD58814094b2093510d2163120d105ff8da
SHA1678d656f9aefbc9abbd2880b23b26f5b2ef458d9
SHA2560381f176d49224e41f60d6b33d425b24dce2b2b78cbc8ea3c91c524649c54e53
SHA512b1e7729ef8432ad6f49287202b8c26db4d9d9e17f442daaf304c500630a037bb89021a8efc97dfdcb67a8c0dfb41f479c16113a8afd2975a4619294dbb2dcd6d
-
Filesize
3.0MB
MD507faa693aaf740a931ea86eacc4edacc
SHA143c7d7691b93d2eb6bc256d2c1de0a12a53ddcbc
SHA2561a15ff38ed08e766f758f8dc9643c31e7bfe653357243ac949c5370b4fc29af6
SHA512f69450b47e6778b448c61d1e3c62abe68cc24f0de7f0c9d7e91da141b0581cd63fab5e20910b4a6ee035278b1a2325cfae0646ad53dda05dec7a31c10f81ea3d