Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe
Resource
win10v2004-20240508-en
General
-
Target
f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe
-
Size
2.7MB
-
MD5
101637be78dac80a40b022e5ee2877fd
-
SHA1
e31cb18fbdd8d74d6eba90e93ad6c82444d1cf80
-
SHA256
f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322
-
SHA512
5e5ab7c38d3dc0855b04558fe58bce8acd90d4cdac5df0f11018ef37c2410632822cb7786ad6bdc2fff8a71b217e717ca76cc98e794b0a266fcc82102952a33e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4Sx:+R0pI/IQlUoMPdmpSpP4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 devbodec.exe -
Loads dropped DLL 1 IoCs
pid Process 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeOI\\devbodec.exe" f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax4X\\dobdevsys.exe" f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 2404 devbodec.exe 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2404 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 28 PID 2752 wrote to memory of 2404 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 28 PID 2752 wrote to memory of 2404 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 28 PID 2752 wrote to memory of 2404 2752 f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe"C:\Users\Admin\AppData\Local\Temp\f759478397b622d5f89c7624bba227f930973aee84f2b25ada05cb91f34f8322.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\AdobeOI\devbodec.exeC:\AdobeOI\devbodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5fa4154d2ae054a07831af152d619e1c7
SHA1d0f03cd2385840407a1cb3f3caf803312eb43555
SHA256f171a86a1c3dde8cb40109ff6885e71e41d04b909f93f1ce13fdc81942bd9b79
SHA51260f1997584cfea7539d47845c173f15faad4eaeddb5fd5938b88d59d36fe29e6a6d25eb6520a604030b47f89c3a51015c3c71c3c992e804ba4ea59c3e860175f
-
Filesize
2.7MB
MD5fe14c5fd5c5d64eaa1e38392a681fc4a
SHA1b7604cc432921e68380f2a2dddef9ea2f83b1364
SHA2561557ecab10a6f7067e197eed53421962fe84f9435018a6640fce7f2dc4fa253e
SHA512638560c1a6896c80a263eeddc26f86ebda3e1997402c868f16a9b699168dc1bc20e258fdbe92d1e24ef7877256b3452cfe7b439a889f4d37ce5fc94b913ccd97
-
Filesize
205B
MD5350db414f6c820e8741983b9a43efe7f
SHA13a6f0cc33ec15debbac3b9af59ce6553cbce39be
SHA25699898c233bedbb36c30691ebceca5f2bc64937f8aaa3691b773b6f40a57dab84
SHA512e7191c1380ba014c5d2eca6531bda73868d28908fdceb3217e6b21a0a24a62db411a6699d2dbe5093146b50d2b7616b4d8a09a59b46909d3f2790c0a2ab3954a
-
Filesize
2.7MB
MD558a6842ebff32922c0a809c2a82093ff
SHA17d67b74ecbe98f0c5771f89622d69a35ef8d4fb8
SHA256dfd025837e2cbd94fc4508de5b0f3b75e764e8b81cef409ecffba916079d8735
SHA512e8cb3d6bc41d13f111e0269ddefcdcf8b57c6f7fa080ce36266cde531faaac81706dff618e2878efc6a14373909949783e1334cdc4cf26180e69fc13d25e7b27