Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
9935d3dd85107cd23c02a37220ba8100N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9935d3dd85107cd23c02a37220ba8100N.exe
Resource
win10v2004-20240802-en
General
-
Target
9935d3dd85107cd23c02a37220ba8100N.exe
-
Size
3.2MB
-
MD5
9935d3dd85107cd23c02a37220ba8100
-
SHA1
0e0975fa9b53a685b2a917bdc6b3be88cd9553dc
-
SHA256
9b087c2c517f67b31d7b1e84af8713861a581415ac5855db79627d5ac3fc7f9d
-
SHA512
187f0eaf7f85e5d7bf18a1378fa75fd6adbc8e89244c124c58f967685ce400932e68fac7d048e53de42d2204375112f90e588abce79ee76325290f1e58cabdc4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBfB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp0bVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 9935d3dd85107cd23c02a37220ba8100N.exe -
Executes dropped EXE 2 IoCs
pid Process 2004 locabod.exe 2808 xoptisys.exe -
Loads dropped DLL 2 IoCs
pid Process 2452 9935d3dd85107cd23c02a37220ba8100N.exe 2452 9935d3dd85107cd23c02a37220ba8100N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotY4\\xoptisys.exe" 9935d3dd85107cd23c02a37220ba8100N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxJN\\bodaec.exe" 9935d3dd85107cd23c02a37220ba8100N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9935d3dd85107cd23c02a37220ba8100N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 9935d3dd85107cd23c02a37220ba8100N.exe 2452 9935d3dd85107cd23c02a37220ba8100N.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe 2004 locabod.exe 2808 xoptisys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2004 2452 9935d3dd85107cd23c02a37220ba8100N.exe 31 PID 2452 wrote to memory of 2004 2452 9935d3dd85107cd23c02a37220ba8100N.exe 31 PID 2452 wrote to memory of 2004 2452 9935d3dd85107cd23c02a37220ba8100N.exe 31 PID 2452 wrote to memory of 2004 2452 9935d3dd85107cd23c02a37220ba8100N.exe 31 PID 2452 wrote to memory of 2808 2452 9935d3dd85107cd23c02a37220ba8100N.exe 32 PID 2452 wrote to memory of 2808 2452 9935d3dd85107cd23c02a37220ba8100N.exe 32 PID 2452 wrote to memory of 2808 2452 9935d3dd85107cd23c02a37220ba8100N.exe 32 PID 2452 wrote to memory of 2808 2452 9935d3dd85107cd23c02a37220ba8100N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9935d3dd85107cd23c02a37220ba8100N.exe"C:\Users\Admin\AppData\Local\Temp\9935d3dd85107cd23c02a37220ba8100N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\UserDotY4\xoptisys.exeC:\UserDotY4\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD514b30faff4a38c3d5bd5ac950dfa5ed7
SHA1106c1c0c93825f47ef633879ca6b858e98f71ac4
SHA2567edb229048aef85d2441514036be867d672b3820735adaa5196c61fa8f4d0f16
SHA5126b59fa335f2b0f17872cf530e3f2c6946e814440bad2d73ccd634656da08da5c485bd50f245f7f84e2f3574baf781347672a934b2294e02b62c50899c1167322
-
Filesize
3.2MB
MD512b431984e3f0fd92e0e7d9599fbd710
SHA1020200b70316561b67fa039ae39d0f511ca3d752
SHA2568609d6b315d52acc728108343aab78d57d49837fd75cfbd772519cfaa5227afe
SHA51256dac7528f1b43ccda8f3658a58e664e5e34493e75fcd32d75927c0ea606751db601d73b5d01e8ea065d0acbbb4ff1fdb251b8a4cf9d1aa7e668694810463031
-
Filesize
3.2MB
MD58914a8fdfb0bbcd53f708adbd1b970db
SHA1b95ff1fc95be22319b83bf03426744aaf4174dcd
SHA256bd5e63a28e622a6be197f0d41f7a9b877a59129f3623b104c8d7647dfd03ddbb
SHA512b9ae8da5d4821dc41768a1e0caec60b9d545dad0e31dffe79798035a622266465720a1a487a214696f5f69789ef4c9c1dc6e138699c7a17d9fbb24537a81f9f6
-
Filesize
171B
MD5742ade096db36d6809405a7574c152ad
SHA1b5ad44449af042f8b42fe395cea70759dade5477
SHA256db062a00a8c1d6f5a9986d328b530a21607e6386da5ca995cc5d26d18a383953
SHA512de0fef10f00ddf39d0caeed4f613acc53e4506138be86990c1f88a206c8a0fbf1f013747087522ec61426fa2360680b5f823178c4a1f651c739c27a690b08c3a
-
Filesize
203B
MD55d6719f29fb0a95178f44ef14020a091
SHA1c4c038cb18eb91fd47b43aa6d93a051ee8c3ba70
SHA256bdf701534fe07f2153c1f519c22c74b40ff2e598c34ed40ef5d8317ffb8c2368
SHA51289c84cee422c8f58842a63773cefaad2309417feaf34b3a46865340bc5b67ad944a690ca48942a4384e96cdc9a639964733afb37358bfe2133ec69e8c8c3439b
-
Filesize
3.2MB
MD55a294cdfecee00b833d5683254a1a81e
SHA1a37873d7c087f64298dc12ecd043ab2e576cfa7b
SHA25698e6156d6e94a87ef3bc8bd57e7e97d5f5c0db68dd689a61eca3e6127f85fbb1
SHA512dddf97c27ccd7437137812854f6a45dea18645bc15073a34c9c5539bc072116233062e67cb047d729f6642586a01e26b1c77e8add2888fc78e41afdd6fb4c649