Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
4536617e1ab87c50261c7bd2e8d464f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4536617e1ab87c50261c7bd2e8d464f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
4536617e1ab87c50261c7bd2e8d464f0N.exe
-
Size
2.6MB
-
MD5
4536617e1ab87c50261c7bd2e8d464f0
-
SHA1
85b3819b5ffde7e9ccd67ce337a76967c541be3d
-
SHA256
9e5b067fca7836d98f77908417ebaae07f1d5d1941578d2f7a8fdfd1bb01a416
-
SHA512
5f99251a72a42db2e5bcb13a3b322c814eaea8c9bb1bf832306d31e2e0e4068bec49e1ba959b6babf4759a8365c59bd7ded052938235a5717f5aedb2c8374e5a
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBDB/bS:sxX7QnxrloE5dpUpcb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe 4536617e1ab87c50261c7bd2e8d464f0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2612 locdevbod.exe 2668 aoptisys.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocTN\\aoptisys.exe" 4536617e1ab87c50261c7bd2e8d464f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBYU\\bodaec.exe" 4536617e1ab87c50261c7bd2e8d464f0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe 2612 locdevbod.exe 2668 aoptisys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2612 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 30 PID 2020 wrote to memory of 2612 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 30 PID 2020 wrote to memory of 2612 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 30 PID 2020 wrote to memory of 2612 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 30 PID 2020 wrote to memory of 2668 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 31 PID 2020 wrote to memory of 2668 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 31 PID 2020 wrote to memory of 2668 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 31 PID 2020 wrote to memory of 2668 2020 4536617e1ab87c50261c7bd2e8d464f0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4536617e1ab87c50261c7bd2e8d464f0N.exe"C:\Users\Admin\AppData\Local\Temp\4536617e1ab87c50261c7bd2e8d464f0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\IntelprocTN\aoptisys.exeC:\IntelprocTN\aoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56eb76584cad5137e17199a33035fddd9
SHA1b552d9ac850fcc185e8dd1a86ebb2103b1af2e1b
SHA25673afafa1f0787c3d417f1af0fe8a5aa6b5dcce616753cf53b6178ea099cc3342
SHA512412fa3738364df4552476570900bdfde3ec9b49b74550f9557e0bf4ce299678686448d033c7e293d551a6ea8ba5a25c59c51605cb0ee5bb7967502805921f762
-
Filesize
53KB
MD52e9a66b754b83350b21648f88780d54f
SHA10d11ac5510ab97707d5532f9533436cc60d891c1
SHA256e597c53b5215cf8367feb0dfaf2c8560bb3b69e9a2424e217f96cdd80db5fd1b
SHA512b55da4a67482d8ca4e5622815788ef121374058d711b3dd474a7d85db7666d66f92b6112b03619fd07016ba7014d5cbcfab88b6740cd6e4747ceacff96dfa54b
-
Filesize
2.6MB
MD5e2d631c4d9dd4a41c6ea9a2a59db7986
SHA11645ba216e8991a680f647bc6f8e1f109ce44af6
SHA256e3730f23d556b990ba2fa92724a3e4443f874a3c9279430ac5f0e19e5c96d07d
SHA512875cf6d078b0017c17a570e24640a80e4eb218c0259492a4551b986fd6c15c609108826d50ccd14e06fcc97623c78dfe7a6e58d59ac84cdb002301f327033bb3
-
Filesize
174B
MD50fdfd224661aa600ed3635bba1ada1b0
SHA15d601e726c9288ae16b1b5c38edfdb952aacc103
SHA2563873c5925a7436f902b6dabf2280dacafab0c27561c28f7eb399ff093adf25a7
SHA51265e44058c52d71e04d8ac7c0328aa8ebc54ef65624d43fe2e51271165f8fcb34da912a5e54d8202df6dc2618cde3584ba9dcbea5651cc5ae58e3045099ba292c
-
Filesize
206B
MD53fa545966c9b967d20d0ae65792626a3
SHA19c4c9d1a607975ab30e63f14a9940879a11541a7
SHA2562093efee9350be9da6febc7155504be9c8cb90e6aa53b98f18275c0dd5339b73
SHA512e13df53d485d196c674ecbdde2a58e5498b65acc4a2a2b6d1c2339d8b13b0d3207d187f2aea4a62c88cdac0179ff6c93d8ea3f74f6bfb11b32351d0130d3fa29
-
Filesize
2.6MB
MD5509f8bfea44df3fb0cb4b6b28efcc9ef
SHA15eafa378be83bd331b5377e73f976b35606873ec
SHA25678fa96ffb5e2d4f5ebd7c913dcf0f655d5a4fe93c4543d04099647f5ed2f0fa9
SHA51287b323140e63b74660445fb1c1c649967fc0843fee8299f12f0bfc9ff4ce04eef6963c03bc4250dd06e3490caea90dd13c9e1b337d71daecac4b43008de1abb2