Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe
Resource
win10v2004-20240802-en
General
-
Target
bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe
-
Size
2.6MB
-
MD5
2308f1f6393556fff2a14c264b542385
-
SHA1
460dfa5e29858ce0ed47202f34ee95327a979dff
-
SHA256
bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67
-
SHA512
53c5f527f678ce4f20d2f7e13a1d99eb85990f16b09775b27a5b71cd57389ad7225bccd23900ca4e98be67b66e40ce7f70697b3117f7cf9a3d959ad714ea3061
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBVB/bS:sxX7QnxrloE5dpUpeb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe -
Executes dropped EXE 2 IoCs
pid Process 2176 sysabod.exe 692 devoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocJ4\\devoptiloc.exe" bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB6L\\dobasys.exe" bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe 2176 sysabod.exe 692 devoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2176 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 30 PID 1916 wrote to memory of 2176 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 30 PID 1916 wrote to memory of 2176 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 30 PID 1916 wrote to memory of 2176 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 30 PID 1916 wrote to memory of 692 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 31 PID 1916 wrote to memory of 692 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 31 PID 1916 wrote to memory of 692 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 31 PID 1916 wrote to memory of 692 1916 bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe"C:\Users\Admin\AppData\Local\Temp\bc45577184d07e3a876244ba4c7587d717ba6f2c1084832bd5b2799d74a69b67.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\IntelprocJ4\devoptiloc.exeC:\IntelprocJ4\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5433264164df3f364449b7dcf10a124ec
SHA1ad0a7cd2e161adbdcbc6a74a9d7a973008cb91b4
SHA2564d343970e8d8cbea7613d2b53ef36e76d47fb09fdd261fec94986dfb2f4ff85b
SHA5127b32395444e5aca2db7213079fb2951ad8a9ee568203bd76e8e0430f7e455658521b9a8ac568ea343f18fe0b60c9d677ed861c8f2884a0c4ad9fb93286fa9848
-
Filesize
2.6MB
MD572755864e2eac034586428a20fb53717
SHA11323051a699075394543df4a3b0d2a7cee14b73f
SHA25664ff9385d61c4b44abb268e2e99b4b89e057d5cb1fb1014e5d5c902fecafcd0d
SHA51216f1f4acea1d12cec8f7021c9c6d292f6c6598ac2a045c3d2b889d8d71bc295245a92b72782606a747e2f1607f7a3c16fb05198351d6df2bb6168a59f713747f
-
Filesize
2.6MB
MD5fe7965044e57de5460ffad720d9a7f51
SHA1d50469c6edd750a631238a608bd45251bb25515d
SHA256aea8cd8d7163d4014da62da5d930ebbb07434fd4e6b0cf8d5deb0e817b0019e0
SHA5128e37793eeed63df0643a0924d2077a5e60783ff8fd6c1c6d6dd8086aa95a84980074c17d40645412e5e0991aed7e950ebed512315108762fd340f291cd515d56
-
Filesize
175B
MD52b233d51c781ec7e764bf37ab98600f5
SHA14e09633167c717fe19ffc00cdfefffa180c7a423
SHA25606dfabebdb2ac03d3ec11c7c13d876c7b3087a40c616c74f751884a7bfe20a54
SHA512b445ac20f6cc7fe3742edb88bf958813669b2598dfa7fdf7bb19550afef761a3aade3ee67adbe8952753f40e1f6e97b3e17e268c15f8419abd1b9756bea6d029
-
Filesize
207B
MD593f7d40a5a5136999b2c500ccb3d9121
SHA11b83869e63a268a28fd58abac49b66e8f5e6d18c
SHA256352fc7521b889128d5e827a6afb1177b0b718e151e72aad5f4339e5efd6db1e5
SHA51280756bee7d3eb5535b69d3faa397eceae00d2c7c2c6a881942b364497e413cb2d3c58124bb1899d638dcfd3198257922bc1ad864ea057d0dcc7c70b2df5df322
-
Filesize
2.6MB
MD5f858472901c751beea797c8979b382a0
SHA1a3f192c688f162911d2468f52aa4edad9f4f1ca2
SHA25692a6f3ff2d8bd84b9a33cb9ce7c2b77eb97f1ac7bbf955f0ded5f3e81fc48832
SHA51288d76a38c50cd382725016d1b4d568aad676118d163d6ea437c6e030b32ed0be719b33b842e6c65e5a360b9f3936919c4c4874528f8af5a302063d0375e6ee8e