Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/06/2024, 02:32

General

  • Target

    d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe

  • Size

    2.6MB

  • MD5

    39910773f8deb3a8f3dd9e0a65c7e1c7

  • SHA1

    166bf90ea54d8ee3398fa9176c9164265f475078

  • SHA256

    d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0

  • SHA512

    1ae84a57c9f628584f6754ad0e84c6d82d268f21cd1c3096574572714bae54c7bc1b43103512f9f81fc8a96a978ec900305c867eab82b8d19530f1c5d9f808b9

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bS:sxX7QnxrloE5dpUp7b

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe
    "C:\Users\Admin\AppData\Local\Temp\d0e2e3ce6992890b66ea4773fd9c6549274d36843ac7467a8107ae0270cdeba0.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4464
    • C:\IntelprocB4\xbodloc.exe
      C:\IntelprocB4\xbodloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4636
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\IntelprocB4\xbodloc.exe

      Filesize

      2.6MB

      MD5

      2a5045e19eaf442b061f73a20a9d6c13

      SHA1

      29f661e024dea9712d0bbaafb8af98e33fcef7cf

      SHA256

      39be92fb538900f5dc64f30293c18494982c3ec3b3038aa1d024a9f6d3a88c73

      SHA512

      32a63fa35e3f671ab22ab6eb0f1b27f95a3b3ca99299ba1d9472a2e0ad9cb8e5b2da303c26a912114bcb4f19aa4747416010a32eee32aca42756b5489e1fbc7d

    • C:\Mint3B\bodaec.exe

      Filesize

      2.6MB

      MD5

      e33248465080c3dc0cd0521529d12e2e

      SHA1

      b04bc7d15a712bc1be3df2653ca2b14bd45d6159

      SHA256

      17b13967d644bb595281e8606c62b2e3aa272a5f1e79829f3ee65d9951d4cb48

      SHA512

      4c738741ba97296f94cd6b0a2af07d85a6f453e4ee5ff1033ebee4056b0bd6fcaa599d6d5eb7ee68a6b371a5cfd505588a637090dd9db760732f94bd854dbcae

    • C:\Mint3B\bodaec.exe

      Filesize

      2.6MB

      MD5

      031cc4dbc71b57d7cd59d2c0f3325d33

      SHA1

      cd5569f9dd230889cc9aff018203e791de239314

      SHA256

      55413f46a93e31011772f84d43d9bc44daca40cbfe8bb5923c3e57efe3dc2062

      SHA512

      a154d2a3740cc4d45cc2bba18e3945e29279fec57599f944641dc6bb3757bc6a6145c9315b4dd550ae1a5321faf4b3c0a50baee67a217dd24636f2b0ec3207f9

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      203B

      MD5

      74fc03579ef283d9ada433765b762639

      SHA1

      0a4259a69bddd514e43b75529ae17d45152d57e7

      SHA256

      c920c67045a6eed9194603f2452e8ef26644615a3efdfe5f7c353988628fb33a

      SHA512

      c40dcfe1cab03bd9bbd5527cb62fbe8cfa35ce4c5042556d4e9ecb2732dd8a1ecb76298a96fc0d286dc3b111401f8a5b5f4afa341f9edfdd24af6e4909598839

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      171B

      MD5

      2b8e4895055079544c193892ea4d0cf9

      SHA1

      c80d158ceedff4f8ad76932759539dae21d7bc73

      SHA256

      cd0b857ab1170783ef7d9d3ebc3d38f75a5c0a7a71fcdb6a4604a4a27cce5abf

      SHA512

      153a0886ea5968a934855059288e969b09eba580ce33e4b0972ccc70426e686735d4f6718c1ce801fab0c8943b926ed1a0254e653b9b737af0f6803169974e22

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe

      Filesize

      2.6MB

      MD5

      0de925140ab616497b049a57d4c870a4

      SHA1

      2f3000cbd5144bf09d6bccfa9d4ce4143d707963

      SHA256

      d68e48a141d1c7b1bdc295fdafee0983dfc36ef251ad0bd6ab8ae6e4927d9353

      SHA512

      6caf6bc983c3551ff5b13cf34a23a82cdb297ef45fb2334bbd52ce1813d1c664e514eed0361f10bfd0c22cb134fbe3f9167f30586cc1db4d65cf505109b4fba2