Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
41ee6d44dc5dfb53682985465dd2cc40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41ee6d44dc5dfb53682985465dd2cc40N.exe
Resource
win10v2004-20240709-en
General
-
Target
41ee6d44dc5dfb53682985465dd2cc40N.exe
-
Size
2.7MB
-
MD5
41ee6d44dc5dfb53682985465dd2cc40
-
SHA1
615dc7d0096bd5b487a026d6af7111ae66c1a6d8
-
SHA256
a2688f2ff0615ee8b272550985141b010001e953b82fb3ca09ebf88dbd2d57f3
-
SHA512
2205aa337b78ba3b669c73cc20f98acb0e6d517070d3d767dd8ec749b81b97ff1350d29932f2348df2135c7ef9930ceea66d1f925066bcc4f008440be82a2c27
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB89w4S+:+R0pI/IQlUoMPdmpSpO4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocJ0\\xdobloc.exe" 41ee6d44dc5dfb53682985465dd2cc40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidTC\\dobasys.exe" 41ee6d44dc5dfb53682985465dd2cc40N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 2052 xdobloc.exe 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2052 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 30 PID 2536 wrote to memory of 2052 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 30 PID 2536 wrote to memory of 2052 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 30 PID 2536 wrote to memory of 2052 2536 41ee6d44dc5dfb53682985465dd2cc40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ee6d44dc5dfb53682985465dd2cc40N.exe"C:\Users\Admin\AppData\Local\Temp\41ee6d44dc5dfb53682985465dd2cc40N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\IntelprocJ0\xdobloc.exeC:\IntelprocJ0\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5c529602a5b0684ed4fbaf7172cb72896
SHA1cd79dcc0bdd6422773bb73065701200214c9d53f
SHA2560c19206dc3ebead370838224f88de410443c7f6d748983ad76eb94618644c9e1
SHA51229cf3459b54184e80fec672a44970b3abfaf3400bffde19934ad2264e8fd74519b186c502dc341eb554c925f35de050142afd77ab5f72108c6c3ad4c3906ef1f
-
Filesize
3KB
MD5c7b51062c87a208f9442963c2b20d250
SHA10e547612586c272a27827db5dbbed56d37a255e7
SHA256e3b4eadabd908d54c7c9252808b2cf750431927782a3b7b3e596467be1bde3e0
SHA512fa80cfdd204d057f6913115178e8c1aa005c35300a166dbe3f278d747a2bd73b6ffc6df2602db45993d1fb681a48db8e6b9a5567228ee5007c7d933035c55e9c
-
Filesize
2.7MB
MD5b8d3ac0aa19cd74ed2340b00536bf19b
SHA1ecb5eeeb246db1ad0c910f1e517c3a8b1d0d249c
SHA256a88f52dd66b2c5e566ab850300dbc7210abe912c2588da6894d93cc6536a9aa8
SHA5128ab45d55ade55c1ec05c6b1fcac1a48cdfe4ce6a0da0ac4e574d13b6038aa510f72b55d331a4fb42df6c9ba981c8692e7f2fcc3b894956455a99b3bd04f37375
-
Filesize
2.7MB
MD50b5cd690723bfd7e273e2534357d0ad0
SHA12aab39c39632de88e2545b727dcdb177699a9a2f
SHA2566fa3c52bc01cca1f96d5b4befe697f18faa88d0460d248e358ec713141e087ff
SHA512c4c2abad832e31613bb1fd9b25fb0243699725fd6f9a8910b4871f593989f601b2325834dbf7b12167c11482e424719d0ca2444c2860d1e1f3a6eeb1f3868850