Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe
Resource
win10v2004-20240709-en
General
-
Target
baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe
-
Size
2.7MB
-
MD5
124deea2dd40bf37afef2009e583c1a4
-
SHA1
0e914afc75ed2082c4214d49cf42d7a194cfd3b9
-
SHA256
baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa
-
SHA512
cf11e7cef57301beb1d140b6f39ef9baa148388855bbe877cdb8e1438eea7ec6fdf30db151faf93364b139d6dd372fd8ea82cbeac14a3898b794270493feef87
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB59w4Sx:+R0pI/IQlUoMPdmpSpp4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3060 xdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesA7\\xdobec.exe" baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid1Z\\optialoc.exe" baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 3060 xdobec.exe 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3060 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 30 PID 2088 wrote to memory of 3060 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 30 PID 2088 wrote to memory of 3060 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 30 PID 2088 wrote to memory of 3060 2088 baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe"C:\Users\Admin\AppData\Local\Temp\baea2fe61d86a25b679a5ab54eff377a33845ae536a977c7c8dcfe25809632fa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\FilesA7\xdobec.exeC:\FilesA7\xdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD5721100826c578622c7296c4f80e9b1bc
SHA1214b2e97af60248eb3f9dd1d7b1ba716a7a4f7d6
SHA25605a15417fe0b2107a7f713308d875ac6216f093b5291548d77497a57c53959db
SHA5128ebfa71abd8f723179d576705392438d7b01df1ee9076c572bc672c6c9f924cdd66d0f2d6dbca5ae2eb7b7df9a5d434c41ade5324ae94c5e118f6bc85ea2dec1
-
Filesize
2.7MB
MD5a3c82b25ef640b4de7ee350723a9a43a
SHA1f8867844c4ed3c429b80ccc44282e2ddb90790a0
SHA256b50a0969aca5d815a9c18f80a274e1adadb8e7e48b4c5c769951b611a4de56c1
SHA512ba0afffcc57db2c3da0ab4103c5de41dc2dfb0e8443cd1182bb91e7cfae3a9c109d1be182953bfb427663785570d57ef11f63c0eb7ef5d7358aba6c1d3e0372b
-
Filesize
2.7MB
MD50a99b77c73b4e85605da8df3bcf1bd5c
SHA11ddee6ba5b2f8d83e3621c3bd138944d77a76c49
SHA2566bb318e110b88aa09bcb32c167682223dd471f281b7c6890fb2b4d9bb378cf0a
SHA512a542361b87b00a2a3c1a3124bb0e70b2d4f593b307a244c812fde38dcc6e75e9d48f1da9bee39aee76715bfecd0a3450fbff4c346a543210e210ab328a25a2ef