Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe
Resource
win10v2004-20240226-en
General
-
Target
d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe
-
Size
2.6MB
-
MD5
39910773f8deb3a8f3dd9e0a65c7e1c7
-
SHA1
166bf90ea54d8ee3398fa9176c9164265f475078
-
SHA256
d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0
-
SHA512
1ae84a57c9f628584f6754ad0e84c6d82d268f21cd1c3096574572714bae54c7bc1b43103512f9f81fc8a96a978ec900305c867eab82b8d19530f1c5d9f808b9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bS:sxX7QnxrloE5dpUp7b
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe -
Executes dropped EXE 2 IoCs
pid Process 4464 sysadob.exe 4636 xbodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocB4\\xbodloc.exe" d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint3B\\bodaec.exe" d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4464 sysadob.exe 4464 sysadob.exe 4636 xbodloc.exe 4636 xbodloc.exe 4464 sysadob.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2828 wrote to memory of 4464 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 90 PID 2828 wrote to memory of 4464 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 90 PID 2828 wrote to memory of 4464 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 90 PID 2828 wrote to memory of 4636 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 91 PID 2828 wrote to memory of 4636 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 91 PID 2828 wrote to memory of 4636 2828 d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe"C:\Users\Admin\AppData\Local\Temp\d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\IntelprocB4\xbodloc.exeC:\IntelprocB4\xbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD52a5045e19eaf442b061f73a20a9d6c13
SHA129f661e024dea9712d0bbaafb8af98e33fcef7cf
SHA25639be92fb538900f5dc64f30293c18494982c3ec3b3038aa1d024a9f6d3a88c73
SHA51232a63fa35e3f671ab22ab6eb0f1b27f95a3b3ca99299ba1d9472a2e0ad9cb8e5b2da303c26a912114bcb4f19aa4747416010a32eee32aca42756b5489e1fbc7d
-
Filesize
2.6MB
MD5e33248465080c3dc0cd0521529d12e2e
SHA1b04bc7d15a712bc1be3df2653ca2b14bd45d6159
SHA25617b13967d644bb595281e8606c62b2e3aa272a5f1e79829f3ee65d9951d4cb48
SHA5124c738741ba97296f94cd6b0a2af07d85a6f453e4ee5ff1033ebee4056b0bd6fcaa599d6d5eb7ee68a6b371a5cfd505588a637090dd9db760732f94bd854dbcae
-
Filesize
2.6MB
MD5031cc4dbc71b57d7cd59d2c0f3325d33
SHA1cd5569f9dd230889cc9aff018203e791de239314
SHA25655413f46a93e31011772f84d43d9bc44daca40cbfe8bb5923c3e57efe3dc2062
SHA512a154d2a3740cc4d45cc2bba18e3945e29279fec57599f944641dc6bb3757bc6a6145c9315b4dd550ae1a5321faf4b3c0a50baee67a217dd24636f2b0ec3207f9
-
Filesize
203B
MD574fc03579ef283d9ada433765b762639
SHA10a4259a69bddd514e43b75529ae17d45152d57e7
SHA256c920c67045a6eed9194603f2452e8ef26644615a3efdfe5f7c353988628fb33a
SHA512c40dcfe1cab03bd9bbd5527cb62fbe8cfa35ce4c5042556d4e9ecb2732dd8a1ecb76298a96fc0d286dc3b111401f8a5b5f4afa341f9edfdd24af6e4909598839
-
Filesize
171B
MD52b8e4895055079544c193892ea4d0cf9
SHA1c80d158ceedff4f8ad76932759539dae21d7bc73
SHA256cd0b857ab1170783ef7d9d3ebc3d38f75a5c0a7a71fcdb6a4604a4a27cce5abf
SHA512153a0886ea5968a934855059288e969b09eba580ce33e4b0972ccc70426e686735d4f6718c1ce801fab0c8943b926ed1a0254e653b9b737af0f6803169974e22
-
Filesize
2.6MB
MD50de925140ab616497b049a57d4c870a4
SHA12f3000cbd5144bf09d6bccfa9d4ce4143d707963
SHA256d68e48a141d1c7b1bdc295fdafee0983dfc36ef251ad0bd6ab8ae6e4927d9353
SHA5126caf6bc983c3551ff5b13cf34a23a82cdb297ef45fb2334bbd52ce1813d1c664e514eed0361f10bfd0c22cb134fbe3f9167f30586cc1db4d65cf505109b4fba2