Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
1b03326eb0891edd6f64d4a7e006d7a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1b03326eb0891edd6f64d4a7e006d7a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1b03326eb0891edd6f64d4a7e006d7a0N.exe
-
Size
2.7MB
-
MD5
1b03326eb0891edd6f64d4a7e006d7a0
-
SHA1
b31b549ceb576952220affe3d5c3cb39fb34f1ab
-
SHA256
8d94fda133b16643fe8f28a71e5c5b0e7053666a6f782f9c141d990c465d7a6f
-
SHA512
b0f06af1dfd48367920c41bbeef50e1998071f6666af5248247fad9c166e7b47329eff60e634602a8a999697ac25883cd997cbcc212d2b48ef05672d368155a7
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBn9w4S+:+R0pI/IQlUoMPdmpSpT4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 xdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvKT\\xdobec.exe" 1b03326eb0891edd6f64d4a7e006d7a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZXQ\\dobaloc.exe" 1b03326eb0891edd6f64d4a7e006d7a0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 2304 xdobec.exe 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2304 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 30 PID 2936 wrote to memory of 2304 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 30 PID 2936 wrote to memory of 2304 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 30 PID 2936 wrote to memory of 2304 2936 1b03326eb0891edd6f64d4a7e006d7a0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b03326eb0891edd6f64d4a7e006d7a0N.exe"C:\Users\Admin\AppData\Local\Temp\1b03326eb0891edd6f64d4a7e006d7a0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\SysDrvKT\xdobec.exeC:\SysDrvKT\xdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD513959ce59c86e3d1aabb75520b11ae5a
SHA1b3735363c70ba314536566647d2505fe3d1c1135
SHA256f72f12db75a68573b38c0069a82c2e9bf29caa93bb34044a54e7daf7f728659d
SHA5127347ddd2e4a8a4310ddd948fab65aaf1166893efddda1a90e2698c5d8b17632b7349f2c321f3c7edc30386fb300cd0fa0af1039b5779dce14c669fd3adbc1a7a
-
Filesize
203B
MD5cb0c163579b425c1edf013c486daea8d
SHA12c5ad20b0c4c734b94469960c5fbc1d210e4b186
SHA256b4fa3d0a785579334bf4a373f1ab88428a556ed98116e8010cb3984257cfe3c1
SHA512e09bfc3d34c290d298d430e885541a4bdd9110bdb4d32a01657cb737180007ac7b186984662f8cc78079e4753fbf598e3cb3098b3d482003f511f6f2eddb4f3e
-
Filesize
2.7MB
MD583acbf8fda238d677240f1be838447ef
SHA19b5c7529df551ce588cab4ac0d58ad60460f6862
SHA256957c8512a4de36e8f888885d4442005cc09f30d06ec0c6135e4165595040aac7
SHA5128e3bdff92addcf2b635c6126fab9417288303526528351a876afe8bf15068250dc8aa4493a1e9619cf090a41f000814e6f03509a8f74c3c1305805f4e8988d98