Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
52651501c0616f78ba07fb2ae0227520N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
52651501c0616f78ba07fb2ae0227520N.exe
Resource
win10v2004-20240709-en
General
-
Target
52651501c0616f78ba07fb2ae0227520N.exe
-
Size
2.7MB
-
MD5
52651501c0616f78ba07fb2ae0227520
-
SHA1
022d99693bccacab214c286836da586412b01e7f
-
SHA256
39f034d4dd9ca8d367d061d3a1270ef826791a667290fd655ff95a2796f5c02c
-
SHA512
3733d71c205c53947e39ad6a31314709708f96e78eba43f01b1736db2844c268bc5dbf422b19ef40089266ef57834151ae598dd43294d8fd040bc6ff09bc7dca
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4S+:+R0pI/IQlUoMPdmpSpP4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2108 devbodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 1648 52651501c0616f78ba07fb2ae0227520N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocUN\\devbodloc.exe" 52651501c0616f78ba07fb2ae0227520N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB5W\\optiasys.exe" 52651501c0616f78ba07fb2ae0227520N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 52651501c0616f78ba07fb2ae0227520N.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe 2108 devbodloc.exe 1648 52651501c0616f78ba07fb2ae0227520N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2108 1648 52651501c0616f78ba07fb2ae0227520N.exe 31 PID 1648 wrote to memory of 2108 1648 52651501c0616f78ba07fb2ae0227520N.exe 31 PID 1648 wrote to memory of 2108 1648 52651501c0616f78ba07fb2ae0227520N.exe 31 PID 1648 wrote to memory of 2108 1648 52651501c0616f78ba07fb2ae0227520N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\52651501c0616f78ba07fb2ae0227520N.exe"C:\Users\Admin\AppData\Local\Temp\52651501c0616f78ba07fb2ae0227520N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\IntelprocUN\devbodloc.exeC:\IntelprocUN\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD533d6d058d6631b3240e4e52872b84756
SHA13251b652a4850ef015745dbc8d9065eb03d93645
SHA25691a21c6a19a29679c4496b62525fa9f2e57fbf2df5de7e2742dba784255a7788
SHA512dcefd806190b03e614dee825b49d9c7c2ac06cc86e723709c5a5f9837d4c4da69a53e8063e8a142588864e76486d850b4d83b9f6400fe2337bbfcf9648d02bb6
-
Filesize
209B
MD582a8407ce6a9d8dcae21f5747581bc85
SHA1ce97bda0cd2eff7238064d136e3310fcb0825a1f
SHA2563e771d974981f40b18e66611306a1b3bf246d85af5d1759f0a149768638678a2
SHA512e35d1ec42b583b0d35197cc9563c9eaa3c0baf74fe83b9dfd4e3f7dc2f07af183cb2791ce0ed0527e79bc5d7a9bdee78bea55dcd3c63bf23a8a5038fe4db716f
-
Filesize
2.7MB
MD50bd24946759920decc8c7f04f2934aec
SHA19281437e6e881ebda9ebdd239ba8679df5fd404f
SHA2568268c2a6cd012fc0f2fc511086f3b834586f67abcfe56b23bc1a1847fcea02a2
SHA51298bb6ba2dd2e1142e1f708c2170f16e3477cf56ac646c1099238e55120b1402abfb5a799e5decf4b4d5619656424ef66ade6dc66b0c5f1a16d24f23f47a770cb