Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 11:14

General

  • Target

    9935d3dd85107cd23c02a37220ba8100N.exe

  • Size

    3.2MB

  • MD5

    9935d3dd85107cd23c02a37220ba8100

  • SHA1

    0e0975fa9b53a685b2a917bdc6b3be88cd9553dc

  • SHA256

    9b087c2c517f67b31d7b1e84af8713861a581415ac5855db79627d5ac3fc7f9d

  • SHA512

    187f0eaf7f85e5d7bf18a1378fa75fd6adbc8e89244c124c58f967685ce400932e68fac7d048e53de42d2204375112f90e588abce79ee76325290f1e58cabdc4

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBfB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp0bVz8eLFcz

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9935d3dd85107cd23c02a37220ba8100N.exe
    "C:\Users\Admin\AppData\Local\Temp\9935d3dd85107cd23c02a37220ba8100N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2004
    • C:\UserDotY4\xoptisys.exe
      C:\UserDotY4\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\GalaxJN\bodaec.exe

    Filesize

    1.9MB

    MD5

    14b30faff4a38c3d5bd5ac950dfa5ed7

    SHA1

    106c1c0c93825f47ef633879ca6b858e98f71ac4

    SHA256

    7edb229048aef85d2441514036be867d672b3820735adaa5196c61fa8f4d0f16

    SHA512

    6b59fa335f2b0f17872cf530e3f2c6946e814440bad2d73ccd634656da08da5c485bd50f245f7f84e2f3574baf781347672a934b2294e02b62c50899c1167322

  • C:\GalaxJN\bodaec.exe

    Filesize

    3.2MB

    MD5

    12b431984e3f0fd92e0e7d9599fbd710

    SHA1

    020200b70316561b67fa039ae39d0f511ca3d752

    SHA256

    8609d6b315d52acc728108343aab78d57d49837fd75cfbd772519cfaa5227afe

    SHA512

    56dac7528f1b43ccda8f3658a58e664e5e34493e75fcd32d75927c0ea606751db601d73b5d01e8ea065d0acbbb4ff1fdb251b8a4cf9d1aa7e668694810463031

  • C:\UserDotY4\xoptisys.exe

    Filesize

    3.2MB

    MD5

    8914a8fdfb0bbcd53f708adbd1b970db

    SHA1

    b95ff1fc95be22319b83bf03426744aaf4174dcd

    SHA256

    bd5e63a28e622a6be197f0d41f7a9b877a59129f3623b104c8d7647dfd03ddbb

    SHA512

    b9ae8da5d4821dc41768a1e0caec60b9d545dad0e31dffe79798035a622266465720a1a487a214696f5f69789ef4c9c1dc6e138699c7a17d9fbb24537a81f9f6

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    171B

    MD5

    742ade096db36d6809405a7574c152ad

    SHA1

    b5ad44449af042f8b42fe395cea70759dade5477

    SHA256

    db062a00a8c1d6f5a9986d328b530a21607e6386da5ca995cc5d26d18a383953

    SHA512

    de0fef10f00ddf39d0caeed4f613acc53e4506138be86990c1f88a206c8a0fbf1f013747087522ec61426fa2360680b5f823178c4a1f651c739c27a690b08c3a

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    203B

    MD5

    5d6719f29fb0a95178f44ef14020a091

    SHA1

    c4c038cb18eb91fd47b43aa6d93a051ee8c3ba70

    SHA256

    bdf701534fe07f2153c1f519c22c74b40ff2e598c34ed40ef5d8317ffb8c2368

    SHA512

    89c84cee422c8f58842a63773cefaad2309417feaf34b3a46865340bc5b67ad944a690ca48942a4384e96cdc9a639964733afb37358bfe2133ec69e8c8c3439b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

    Filesize

    3.2MB

    MD5

    5a294cdfecee00b833d5683254a1a81e

    SHA1

    a37873d7c087f64298dc12ecd043ab2e576cfa7b

    SHA256

    98e6156d6e94a87ef3bc8bd57e7e97d5f5c0db68dd689a61eca3e6127f85fbb1

    SHA512

    dddf97c27ccd7437137812854f6a45dea18645bc15073a34c9c5539bc072116233062e67cb047d729f6642586a01e26b1c77e8add2888fc78e41afdd6fb4c649