Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
3ad5ebf46dc77d06551144119520bdb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ad5ebf46dc77d06551144119520bdb0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3ad5ebf46dc77d06551144119520bdb0N.exe
-
Size
2.7MB
-
MD5
3ad5ebf46dc77d06551144119520bdb0
-
SHA1
2e86585df470a06496f7247965dc2063ceb333c5
-
SHA256
da44fdb0537bdd20ba8932fcd0f9febf8e0a20aa03aa5534e15c54305c46081c
-
SHA512
a46e4504740bcbdb6e599c980e3d3167696f9770d9f029c1b837a511184eea54103d5aa8eb42eb7b7a3b50c35455cb5fa1c384a5e862e50b4770c003c9a38adb
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBz9w4Sx:+R0pI/IQlUoMPdmpSpT4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 216 xbodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZOR\\boddevloc.exe" 3ad5ebf46dc77d06551144119520bdb0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocG8\\xbodsys.exe" 3ad5ebf46dc77d06551144119520bdb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad5ebf46dc77d06551144119520bdb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 216 xbodsys.exe 216 xbodsys.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 4568 3ad5ebf46dc77d06551144119520bdb0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 216 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 90 PID 4568 wrote to memory of 216 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 90 PID 4568 wrote to memory of 216 4568 3ad5ebf46dc77d06551144119520bdb0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ad5ebf46dc77d06551144119520bdb0N.exe"C:\Users\Admin\AppData\Local\Temp\3ad5ebf46dc77d06551144119520bdb0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\IntelprocG8\xbodsys.exeC:\IntelprocG8\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57843986ebd9fdcef201de170537d1cd4
SHA15f587a336c40de85d96cc75403d753c5fa9832f1
SHA256aad8c45563560d3669e6ba8d98b9e07d3bcab6ba1babaa1d72f79e1c3f696655
SHA512e0d0a871d85562aa27992de6de18344b98c1b5752bc6f9ece8f1c7d7906d3ef6297d92a7d537d8ac4c91fb4240f2edc36654da09768df89748f7b92958b64925
-
Filesize
700KB
MD5f3354f20196b88a901f274bdee7dfed6
SHA1caddace2a706abafe70a9abe6456c316f154ef2f
SHA256cd9ad92b4702cf52fcc4ad9e266c78724756727add9b6af5f95fe92bd28f0466
SHA5120aa7d66d291177ae841588e203d3bb4b36c3729ff93d51ff623b22f9280acd859845ca2969e9e2c4969daea2093c182aeb03e60d993bcd1c6024583e52b22dda
-
Filesize
207B
MD52c04e76445f9e18172b6523d33e2b8f9
SHA146ed2562d5777d7f97482d76660ceedf8f7b4d29
SHA256069a0d36c8601626e41f767d4430bede176917a0d8066d8497d8608d5da9323d
SHA512bd853686dba3debedc3435df66dbc59c044e14edd6da1f78703d95221d0088b3cc8f5e36747280d54f1976a558500918eb2705d2baf8e7b2c010ea75912c2f37