Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe
Resource
win10v2004-20240709-en
General
-
Target
479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe
-
Size
2.7MB
-
MD5
0b09312f2898c0cd5aa304813435eb4d
-
SHA1
18f55d6ff76eedce06b87cc4c6c43d1907f938fc
-
SHA256
479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573
-
SHA512
7f293fe971dc67fab84da2eb57e71e7acbdd862ec02115955f86652a75954afb822e89d921fe4b3efeea4072b53090221363045e5ea5d941545c23ad1ef42cea
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBl9w4S+:+R0pI/IQlUoMPdmpSpl4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1464 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocGZ\\xdobloc.exe" 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZZ5\\dobdevec.exe" 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 1464 xdobloc.exe 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1464 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 30 PID 2548 wrote to memory of 1464 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 30 PID 2548 wrote to memory of 1464 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 30 PID 2548 wrote to memory of 1464 2548 479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe"C:\Users\Admin\AppData\Local\Temp\479c1fbfe79efd057547f0f4c266fa68dfe44910a6ede3b89c3c1b8e2a531573.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\IntelprocGZ\xdobloc.exeC:\IntelprocGZ\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD54da7db7ef60bf2beaab0e9ac6a736021
SHA142c126c35a7791b70f4d2f0dc91a283075f72ed7
SHA2569f778dd9498be441880bf3aa996ee1ae96a95e3fa8225c6a50ea6d2582e01e7e
SHA512d6b74e391982de4c3b6f579d1a18629de1057292fc16443bbb55fb4d8f5db9a1da6f4281a2f5bbd21878c82eb33378772f41e0a586ac2841527ae1665b91ddff
-
Filesize
205B
MD5c98eb613026b658bd0109c7b5032a71d
SHA148bbb257622ce5e4a121cb073fc1ee9817f5a70e
SHA256efd31c564c04145c46a0d9ce1851dfe95f33af2ad3ec93af980283f9228e696f
SHA5126731e970a43503e9b441a04e8e2cbec183908ff90cf14777e3d8aeb9f7734c6f38dd2725f036f3451a50564423a73fef490d0e67c20ed206508b3474a051a81b
-
Filesize
2.7MB
MD56d6fb64f43cf200440bd771fef59026e
SHA1c5edc66164293dcb4008288dc3ab87654e9aa3dc
SHA256d31eb35417da6ab9b0df63cbb51b7b0e98c32b23e47b2f0ef944a64b58fbbeb8
SHA5124caced87b41ba2a8326542f0744e7f1153b1ae0d7b1e6f6a5af89282b5eeb690cfb2d480200010e41d37392abeef93f0c15f19dddb051faf2017d39184a113d1