Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe
Resource
win10v2004-20240709-en
General
-
Target
d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe
-
Size
3.6MB
-
MD5
d878c955d9081278cb8931d573558e5f
-
SHA1
3c27ca895e6ffa55e97e881db5343b73e39533cd
-
SHA256
d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e
-
SHA512
5fa7f01f14fc9843f96f4bbd939986a6454f9741825b860174c11d31e49a36942ed76c4118a36783b3d7752824563ce3201f1ced0db109e0d2f2cf9674efa59b
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBQB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpPbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe -
Executes dropped EXE 2 IoCs
pid Process 460 ecabod.exe 2000 xoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintHN\\dobdevloc.exe" d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesPC\\xoptiloc.exe" d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe 460 ecabod.exe 460 ecabod.exe 2000 xoptiloc.exe 2000 xoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 820 wrote to memory of 460 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 85 PID 820 wrote to memory of 460 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 85 PID 820 wrote to memory of 460 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 85 PID 820 wrote to memory of 2000 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 86 PID 820 wrote to memory of 2000 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 86 PID 820 wrote to memory of 2000 820 d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe"C:\Users\Admin\AppData\Local\Temp\d6b810b58c554228c3902de31d960ac23cbc9da0b86fa78d9e9f436fc85cad0e.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
C:\FilesPC\xoptiloc.exeC:\FilesPC\xoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD598e3bb4f380fb47a215a22f7427212ec
SHA1ac6e11ad565f389a679ce2fdef5140daefa02ac9
SHA256e50ca319069c86d293bb07c8b334a0ba4336088ea12574039d0f3e575251ea58
SHA5129053db32b158579921a66fb44e594da7fff4a0d858b01f8172bb90a9aa41eed1442ed052cd3d6b1c3204892bdc752a22bab8989e84a33a10cb0d91743b5421ff
-
Filesize
718KB
MD5b38e8aeb17d02c09c52c077b376d5543
SHA1711dcd5eec7052eff5659e0be1de372eacbe06fe
SHA256c7ac5573fa0da1c15ca73e996940e79c720efeee018fd0615839a16dddcfffae
SHA5129a60be4ef86dc91f02f5f729f5fb58d5af0bcf3ba63faaf119b14916638c2b8d62187ee28e20d198e7f3e82c2c6154e82d2569e206e0f8d6fde1f0bd7e9490cb
-
Filesize
201KB
MD5a95f3aa587bfd7e8c4d814571ec093b8
SHA155b5258164c433ffe1817fdbdd6f553c64801e45
SHA2564852daf8a032af98883f880f398738355844394fe9738a730407db5b270f5ccd
SHA512d6e450dd7783426a319ad0945feb303f003cd2a3745f2cd57548ab445ff29c1eb85495170d9c126f89d1699387787585c773dce8cd99f4f8b2fde158b06143a0
-
Filesize
202B
MD5f5ae656b715120e29e060b180704b14a
SHA14dd5da43a1b6f658b32b936c1a8c1575c32536ad
SHA2567ec704424e02ff23eb8db4e4a1609a64aff3d4e7bec55a286e0fc06d7abe7033
SHA5120a55eb45c729ea02348777dd40b20f1fd3550549f98c8a405cc171285ae9c1cdf70a0ae9da807f30be10c4a7cf19648a872d6a2d589c449821da559d2d400ba7
-
Filesize
170B
MD5978355557fc613e4a8136326aca012fb
SHA131a49374c5567d2a798d625d286890d2b1af3c05
SHA2569f966ba75bd04081a2a89a0f6d646df4b295995d75137ec21faae58cacb6ac9b
SHA512867c0d8797f90c5dd6b45d2c1198dd9731e9ccc2b925a7e0d30b4af6a4ba51e6002ac9cbe8893ca649709882900f4fb41a00d35a00d5a6877c1e620dae11a283
-
Filesize
3.6MB
MD57ef105500c121e0e75db20374d8ed9e0
SHA1c2b72ee6cb0e881b3fff8ebee5b2975349f4c5cd
SHA2566b970c75a2a3f72280dede059de8458f1e14007fe847b484264a415fd8f101b4
SHA5124a07136d1bab978c93d5c8369ba9032370d46005a2f539456949735a9f761af2f49fae088050885ca4c030f6c0b59cd2a14101bb431d7b5d00131164082935e0