Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
263d293e9ad948b14593f529d9f193f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
263d293e9ad948b14593f529d9f193f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
263d293e9ad948b14593f529d9f193f0N.exe
-
Size
3.2MB
-
MD5
263d293e9ad948b14593f529d9f193f0
-
SHA1
32f62e6829fb5806934211670c6037171c1f8af0
-
SHA256
db151a1e2834e88938eecd6986efae314b497137d976d81a216673298fe06100
-
SHA512
08326a83c40030a73a90a98b8b48ecfc1eecc99a35e37339acd30ac92e0cf5f22d44d3c8b3a9c9319d38375c50eaa3128c43466a51a869b4d98dd343a5d06794
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB7B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpwbVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe 263d293e9ad948b14593f529d9f193f0N.exe -
Executes dropped EXE 2 IoCs
pid Process 1020 ecdevopti.exe 2216 devoptisys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotBL\\devoptisys.exe" 263d293e9ad948b14593f529d9f193f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZOI\\optidevloc.exe" 263d293e9ad948b14593f529d9f193f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 263d293e9ad948b14593f529d9f193f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1208 263d293e9ad948b14593f529d9f193f0N.exe 1208 263d293e9ad948b14593f529d9f193f0N.exe 1208 263d293e9ad948b14593f529d9f193f0N.exe 1208 263d293e9ad948b14593f529d9f193f0N.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe 1020 ecdevopti.exe 1020 ecdevopti.exe 2216 devoptisys.exe 2216 devoptisys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1020 1208 263d293e9ad948b14593f529d9f193f0N.exe 90 PID 1208 wrote to memory of 1020 1208 263d293e9ad948b14593f529d9f193f0N.exe 90 PID 1208 wrote to memory of 1020 1208 263d293e9ad948b14593f529d9f193f0N.exe 90 PID 1208 wrote to memory of 2216 1208 263d293e9ad948b14593f529d9f193f0N.exe 91 PID 1208 wrote to memory of 2216 1208 263d293e9ad948b14593f529d9f193f0N.exe 91 PID 1208 wrote to memory of 2216 1208 263d293e9ad948b14593f529d9f193f0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\263d293e9ad948b14593f529d9f193f0N.exe"C:\Users\Admin\AppData\Local\Temp\263d293e9ad948b14593f529d9f193f0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\UserDotBL\devoptisys.exeC:\UserDotBL\devoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59e613c8f61b925a96a8750fcd03e3858
SHA197ed44e6062c07a438da081a5e51ff8c5f2d3527
SHA256b004007556454026377b50fb811ac905b8eb5393734d15f138a37a300d0a339f
SHA512151fecd687bf2bc51301c9a7bfa24968e9784da1cd68e04d35389b210512a950fc39c6b69d779c695b79a28d81b828ffda44d5cfc76165a576bb6907f373d31e
-
Filesize
25KB
MD5c9221e0eb3a16dce428ff8c482aa2dff
SHA1793cc75bc04db78d6d21cce028ebc5202ab1f199
SHA25689c1ad531a116c26ad2fba26da6aa3bfb742ddc6af38f6f62b23e30e4064dc82
SHA51247ee868b2819e8889fa54c5e846d987eb2e67d90d25d969bde5b4f55cf75e4b12765acc7077bab313d9e96935a1d554300bfac8ef2ebe9d36f2bedcf78e5ec12
-
Filesize
80KB
MD57d1bb0cc0e3f7ecb4f15fca47bc032fa
SHA18c08b21ac5a8982475580e68a964746ada68750a
SHA2563d70791224421ef8ad82bb34a17e31c86f51048fb812f13651f883e5b691247d
SHA51239ccd3478ec8ed1edb688eb1a229c22fda2a51fe1bce727de6762d12f391bb7ed48c3b2a2d0dc1c214ad3eb7a92af0c03ec4cee2079219bd898e86dd2eebc4ae
-
Filesize
3.2MB
MD5f5a310591599597878ea928e207810ca
SHA115818ebe01a1abbdbe0b6406757d003a6d478b35
SHA256bb4723e006382229c6242ffc0f8ceece97f9e36ceed07bfabff14def77d06ccd
SHA51240e30a81ad39693a9b2dd6e7283e1293d3127c15c05671a1161c378a72dc42575dea47d04f96c16dc6c36678afa4997d0f23b33a4eb5c2afd6e6554878a04c6a
-
Filesize
210B
MD53eeed1641ef743ad242539cce3690ebf
SHA1231e67850b3f2e05ceb58563519103c0e85cc5fe
SHA2566fe8a86b6d30b87fb401ec632b5bdb746d8d9208770f0b68aeb9862ccc810dcd
SHA5125bef9737dad0693cd8c43918d9b5b55349d98bc0408239910b2e8cd56b33c25aad0fd09d7eca584d8752f214fbccdacc11170c98b7fab58eea8b381ab7263755
-
Filesize
178B
MD5d104f3c8f9595e4baa8fc69d79da14f3
SHA175869c4bcfd80ba0f7a6b63bf3adc8c0505ec1ec
SHA256014e9ea96149b0aaa0caa8a71a41a7d8ba63f1406e1d27e229ad91abd6fa6bfc
SHA5127ff1cb3b224bec21aa5541b5aa4c73372a9c32c83ad48c4118adb1753ecae43110f028f4db7c7ca07bf4e2751739c7b70b36024eecb48121ce596ec4b2228e17
-
Filesize
3.2MB
MD5cabcb9776406be384e6aea1c6daa6ce6
SHA138d39e2b9f14e8474feceb6ec52fba1d4a0c86b7
SHA25698e291ab17c77b3c4150aa13279626babc2a258f68d877f08c6888935e7f9fb9
SHA5121316011d7307b86f8b1fe3c92cd9d5cf6057d41d0f35589e9441888d2997b9464d7d792e0b54551800eefaddb62084407b94ce8908247239e2122e5bfc6e5963