Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 02:23

General

  • Target

    bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe

  • Size

    2.6MB

  • MD5

    2308f1f6393556fff2a14c264b542385

  • SHA1

    460dfa5e29858ce0ed47202f34ee95327a979dff

  • SHA256

    bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67

  • SHA512

    53c5f527f678ce4f20d2f7e13a1d99eb85990f16b09775b27a5b71cd57389ad7225bccd23900ca4e98be67b66e40ce7f70697b3117f7cf9a3d959ad714ea3061

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBVB/bS:sxX7QnxrloE5dpUpeb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe
    "C:\Users\Admin\AppData\Local\Temp\bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2176
    • C:\IntelprocJ4\devoptiloc.exe
      C:\IntelprocJ4\devoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocJ4\devoptiloc.exe

    Filesize

    2.6MB

    MD5

    433264164df3f364449b7dcf10a124ec

    SHA1

    ad0a7cd2e161adbdcbc6a74a9d7a973008cb91b4

    SHA256

    4d343970e8d8cbea7613d2b53ef36e76d47fb09fdd261fec94986dfb2f4ff85b

    SHA512

    7b32395444e5aca2db7213079fb2951ad8a9ee568203bd76e8e0430f7e455658521b9a8ac568ea343f18fe0b60c9d677ed861c8f2884a0c4ad9fb93286fa9848

  • C:\KaVB6L\dobasys.exe

    Filesize

    2.6MB

    MD5

    72755864e2eac034586428a20fb53717

    SHA1

    1323051a699075394543df4a3b0d2a7cee14b73f

    SHA256

    64ff9385d61c4b44abb268e2e99b4b89e057d5cb1fb1014e5d5c902fecafcd0d

    SHA512

    16f1f4acea1d12cec8f7021c9c6d292f6c6598ac2a045c3d2b889d8d71bc295245a92b72782606a747e2f1607f7a3c16fb05198351d6df2bb6168a59f713747f

  • C:\KaVB6L\dobasys.exe

    Filesize

    2.6MB

    MD5

    fe7965044e57de5460ffad720d9a7f51

    SHA1

    d50469c6edd750a631238a608bd45251bb25515d

    SHA256

    aea8cd8d7163d4014da62da5d930ebbb07434fd4e6b0cf8d5deb0e817b0019e0

    SHA512

    8e37793eeed63df0643a0924d2077a5e60783ff8fd6c1c6d6dd8086aa95a84980074c17d40645412e5e0991aed7e950ebed512315108762fd340f291cd515d56

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    175B

    MD5

    2b233d51c781ec7e764bf37ab98600f5

    SHA1

    4e09633167c717fe19ffc00cdfefffa180c7a423

    SHA256

    06dfabebdb2ac03d3ec11c7c13d876c7b3087a40c616c74f751884a7bfe20a54

    SHA512

    b445ac20f6cc7fe3742edb88bf958813669b2598dfa7fdf7bb19550afef761a3aade3ee67adbe8952753f40e1f6e97b3e17e268c15f8419abd1b9756bea6d029

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    207B

    MD5

    93f7d40a5a5136999b2c500ccb3d9121

    SHA1

    1b83869e63a268a28fd58abac49b66e8f5e6d18c

    SHA256

    352fc7521b889128d5e827a6afb1177b0b718e151e72aad5f4339e5efd6db1e5

    SHA512

    80756bee7d3eb5535b69d3faa397eceae00d2c7c2c6a881942b364497e413cb2d3c58124bb1899d638dcfd3198257922bc1ad864ea057d0dcc7c70b2df5df322

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe

    Filesize

    2.6MB

    MD5

    f858472901c751beea797c8979b382a0

    SHA1

    a3f192c688f162911d2468f52aa4edad9f4f1ca2

    SHA256

    92a6f3ff2d8bd84b9a33cb9ce7c2b77eb97f1ac7bbf955f0ded5f3e81fc48832

    SHA512

    88d76a38c50cd382725016d1b4d568aad676118d163d6ea437c6e030b32ed0be719b33b842e6c65e5a360b9f3936919c4c4874528f8af5a302063d0375e6ee8e