Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
8fc01923e273e72a72cb87ab9c4b29e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8fc01923e273e72a72cb87ab9c4b29e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
8fc01923e273e72a72cb87ab9c4b29e0N.exe
-
Size
2.7MB
-
MD5
8fc01923e273e72a72cb87ab9c4b29e0
-
SHA1
96b0d9a09722d6256a6f32340f6c1b46211dac61
-
SHA256
af35df04391306ea1f53827b0a680ba69f279c7402a6057a6aa6984cd90ed0fb
-
SHA512
e283bdbb51fe48bd18773337c624e81a6ca1aeb40e09a3b0cce851da0fc01b413ff784736e92f4f184a4763b6b7b1fa520674ad53bd35c0724fdb10ab1f20769
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpA4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2648 xoptiec.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid3L\\boddevec.exe" 8fc01923e273e72a72cb87ab9c4b29e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot8J\\xoptiec.exe" 8fc01923e273e72a72cb87ab9c4b29e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fc01923e273e72a72cb87ab9c4b29e0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 2648 xoptiec.exe 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2648 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 30 PID 2368 wrote to memory of 2648 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 30 PID 2368 wrote to memory of 2648 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 30 PID 2368 wrote to memory of 2648 2368 8fc01923e273e72a72cb87ab9c4b29e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fc01923e273e72a72cb87ab9c4b29e0N.exe"C:\Users\Admin\AppData\Local\Temp\8fc01923e273e72a72cb87ab9c4b29e0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\UserDot8J\xoptiec.exeC:\UserDot8J\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5449be6262c466ba88992dd37b6aa830c
SHA152248f84893e46cae60a97bb54f661f2885b0f17
SHA256dac5129920cb3501b7737d4cae87000fea1c0e9784ddd0274f0821b48ae6678a
SHA512688779c08b968ac5bc60ed7db3cd602aad2bddebb3808418bd832f7aaf303f00ea5213cd28c12f98f9c396b2f39580d340df15601478b2b64a369f35a44d4a78
-
Filesize
202B
MD556f77802baa760a3170c3d39d2d6ce2d
SHA120c9521c8c852cc88d31bfbe9d2f38f529867e71
SHA256eccbaff36a3952c7807cb92c0ac87d48b952f5b800a2463f2cbcbddadb375aac
SHA512cfa01873f154659f6be1e5f07bec76bfd805f506a3eadcaeeb27a5e3b05ecd39e58b0fc799d4827cf4e52e27f4b49cd4de0999dca6956f3857979522cc8cc5e4
-
Filesize
2.7MB
MD5e2a841e1d58c7fea1f4818efda6d31a4
SHA1e9c6ac7ff2939c26ec725551803df16d1c5d57cc
SHA2566923ab703d47de9fc47c7d3ccaab7c1f171dc7c667ae92bc38e9b09ae19099f7
SHA5127a4874ed7a5c2e037822a584303d52aa0db592e8bd051c5623d7524308b341159d712204c0aeba3e8e243cbdac69153583e0ff7a9e9e1c69922caa2f0901b6cd