Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe
Resource
win10v2004-20240226-en
General
-
Target
675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe
-
Size
2.7MB
-
MD5
1801d4591c59ed5bdd2fb55fd9c98a2c
-
SHA1
75b238a35cd66af0b43cc12230ff9f51aa6fc233
-
SHA256
675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a
-
SHA512
4ebd462c516008164fda6e7954d39d70ac5395077dd4c776de067a13273c8d2049c4eb0330204e6d3a80155083a0d9bca8b1e638ceed0f056b16cc96f2e510f3
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBl9w4Sx:+R0pI/IQlUoMPdmpSpl4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1980 devbodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvYZ\\devbodloc.exe" 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxX4\\bodxec.exe" 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 1980 devbodloc.exe 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1980 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 28 PID 1276 wrote to memory of 1980 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 28 PID 1276 wrote to memory of 1980 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 28 PID 1276 wrote to memory of 1980 1276 675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe"C:\Users\Admin\AppData\Local\Temp\675e50b9ed85d5d50ea049c1656019a6b330721f96712451a2d958160d485f4a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\SysDrvYZ\devbodloc.exeC:\SysDrvYZ\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD515bc8e44efd5dc6751d7150cab1d8ad4
SHA1a3a2438dd7ac72ab088f86260be2c7d0ab4b1336
SHA2562085839491b628df2843cc336cf9e458da2fdf12d0b4275895af373778c5ae0a
SHA51229eee9d4b6190bfa83b0b31b13b5defc8cb25ba13fc85718246983e0da1e75498cabce2753c579f851efbbe444cc3f360f3c4a3d72a4854cfbc715c220e2cd17
-
Filesize
2.7MB
MD5c5aa0d7e2743dcfd2fa4bb648a8f65ce
SHA15f7f6756f17cf6e286139d5268c251b3da554b37
SHA25655c74da27ed20739d7dbf1447987bc4c57ad9c6d571bac60e9062fa0329064ad
SHA512ce8b7abd75187862a95c88555d109a7713410750c6a7900f7a54e745f5bceb1d89414b663a72bd377fd8f4e0aa822e37db37c1c72275a70700be49375bb0e156
-
Filesize
203B
MD521f6c1f6f0eb752b5713eca11e0f501c
SHA17ea227106e4e1818845d7e2b6c5c8a8239a70801
SHA256fa2213f092ce67346efae4528bf60bd167ace1768b67a9f8a1ae17f4781d89b1
SHA512d37a3455aacccb794a5594ad71318d93cbd49c2e47ec2c44d6220e0f72645624c7a06e72be9efed2645add9e3991ebdb346c7a7a6cac94a0e34027e218076068
-
Filesize
2.7MB
MD55294e5b6f6a92f0c414e1a70c85c2688
SHA1b8a0ffd9cadc843737c1b316889bdc3e62835be4
SHA2561ccc316df3463b4f4e965b73ae0825c481e17f66f0ad7f3e0e0349577763a837
SHA51262ab1837fa2e500c77b8dc2e1df9f14e28f2c13219f25e3aa9eafbcebc301f97f6a3fef4ce507b844399a282eb4b568406a06cab33825be6d71069e901397112