Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
9ef5e12336cde017f467dbfe49bea1e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9ef5e12336cde017f467dbfe49bea1e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
9ef5e12336cde017f467dbfe49bea1e0N.exe
-
Size
3.6MB
-
MD5
9ef5e12336cde017f467dbfe49bea1e0
-
SHA1
3e9f4b22c937cf90b722d1ab9a576beb7dbdf765
-
SHA256
3615b52e16b586798efc5a8e78dc9d0f823e7926d824d69caff87d8350a313a5
-
SHA512
54760b19b91f5474cfeda3af1affd16c27cea01a3e504ecad1974a08b8c7dcd9b9e57ffc4ff0b8a2e09e21551492d3dfe9a81b918d3fbaff0d61ed77e7e0ae66
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBuB/bSqz8:sxX7QnxrloE5dpUppbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locaopti.exe 9ef5e12336cde017f467dbfe49bea1e0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 locaopti.exe 2052 devdobec.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvAE\\devdobec.exe" 9ef5e12336cde017f467dbfe49bea1e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB6G\\dobxsys.exe" 9ef5e12336cde017f467dbfe49bea1e0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe 2532 locaopti.exe 2052 devdobec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2532 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 30 PID 2392 wrote to memory of 2532 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 30 PID 2392 wrote to memory of 2532 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 30 PID 2392 wrote to memory of 2532 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 30 PID 2392 wrote to memory of 2052 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 31 PID 2392 wrote to memory of 2052 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 31 PID 2392 wrote to memory of 2052 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 31 PID 2392 wrote to memory of 2052 2392 9ef5e12336cde017f467dbfe49bea1e0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ef5e12336cde017f467dbfe49bea1e0N.exe"C:\Users\Admin\AppData\Local\Temp\9ef5e12336cde017f467dbfe49bea1e0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locaopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\SysDrvAE\devdobec.exeC:\SysDrvAE\devdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51be9b6574a290727859bde776e6034ce
SHA1efcc609e8d0fd901c114b64c46e182dbc93120c7
SHA256c17235d9bedfd4110c67d88e46e2d6b6a435354887a4ca92ca4aabdfe0eb641c
SHA5128798ee890635038a2ab85ec76f0bbded52d3ce98de6f0a82eec9d25a86571d98f53da0836990728bb16dc44bf2cd20bc6c3b1da2bc657ffa24f567dc10b8634e
-
Filesize
3.6MB
MD597060657f4d28bc647b2edd925d75c43
SHA1be2d632cdbd72a864051d0e56732def2e3800565
SHA256c5bde730dab7ceda7696873acc1791f5106ed56945684ab9ae77e1783184b83c
SHA512569af72ecbcf0721d98daecafd53e0dfb1542196fa64aa3b017d520efbd9a2973d11da40e18fd98c54bce0efd4b61a618374d8ad06eddcf77cc887640db031ca
-
Filesize
3.6MB
MD5c455294acff8ff2ff17fe8cb0eefc1f5
SHA18b3fd119f1f8d7595cfda713f9b0869eafeeab78
SHA256f1352322a64662d8ecc798696fb2b0441d4b272676492798ce112f584b63ceb2
SHA51272bd06028f9a4b45ba2a45369f4c1392f934fde99f0ebd7e8a802139dbe37461a34ff71ef3c8c6d87170bd94d04151698aa8988afd916373667ad94cffbd9e0c
-
Filesize
171B
MD52121d7258c936e0665e2790253cd9cc9
SHA18a6d808545a5c0e230c7c202f91843386c6ab1a7
SHA256f2b2e4615bf768a510a9dcf2b64ebbca80a3647b4f0762914e035910db1f79bc
SHA512db3582b56b0bc8f40c150e89f053892c01559c9baa1b743c5ea71cf1d7c0829850643754415e49fe03882ba2a7cd2676f69637e967dc4154575ee7573ac532a2
-
Filesize
203B
MD53df2165d865bae84e2ff3e0cc95de9c9
SHA15ceac1126514e6c70897e21646c28fe16f6d6e52
SHA2566da9bfb13974efa9402627f8722f59487d54367de2f966d3e636784e9c477c14
SHA512515d6874d04ee6f11745e6cc2a3eb28731fccf0750ad5d022c28320aefc27a185405c17a106e3406e3a0515402cd12b3e3efcab10fc6e306701bb231a2222745
-
Filesize
3.6MB
MD5b7b20ef3ac39c47f648f8efc5f30208b
SHA1ac6784bb6994546a428a6f2cfc3e461a5eebabfc
SHA2564ab3f540b56b9b0fb0613fef98e1bc67bfc6695ad385efd4140d739f4421cb82
SHA512d9e67b4db5f2ad5b2df1327048fc936ce82cf5a6a097db75551dcf9dd9ee29032ccbc31a6523b774b8e793308b81a89236f83f1eb36d92d92e965ff5c99d1a7c