Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
4a8c78a1b799af7db766592e6b4e2f80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a8c78a1b799af7db766592e6b4e2f80N.exe
Resource
win10v2004-20240802-en
General
-
Target
4a8c78a1b799af7db766592e6b4e2f80N.exe
-
Size
2.7MB
-
MD5
4a8c78a1b799af7db766592e6b4e2f80
-
SHA1
6f357f3233b7ae44133c9315c4e1e509ac72acb0
-
SHA256
a6da86a44009ba875588545c70db63a26091051f942a7afd4b4112612d59c7d0
-
SHA512
28813157020bf0814c967d3f77b44e78483e3847c35c85012e682f041d9a899feb14a625cdad71cb2bb2f268f5d6abec40af173a5ef351ca17a0ecc0d3eaf190
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBm9w4Sx:+R0pI/IQlUoMPdmpSp04
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4500 devbodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc99\\devbodec.exe" 4a8c78a1b799af7db766592e6b4e2f80N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidDK\\optialoc.exe" 4a8c78a1b799af7db766592e6b4e2f80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a8c78a1b799af7db766592e6b4e2f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 4500 devbodec.exe 4500 devbodec.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 516 4a8c78a1b799af7db766592e6b4e2f80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 516 wrote to memory of 4500 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 86 PID 516 wrote to memory of 4500 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 86 PID 516 wrote to memory of 4500 516 4a8c78a1b799af7db766592e6b4e2f80N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8c78a1b799af7db766592e6b4e2f80N.exe"C:\Users\Admin\AppData\Local\Temp\4a8c78a1b799af7db766592e6b4e2f80N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Intelproc99\devbodec.exeC:\Intelproc99\devbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5362775d514b2417805e4f007aae4e3c5
SHA16233d2343cd89792f164d5bf50fd4080d420d351
SHA256ab34ea6ed7ceaa12b41f7a77c257bd86606fd05d25cb856465794332bea6bd78
SHA512d2b0360565b384bc5a8d13a888fa41ebba4eb3a53f09eed14b2efb7a16390e0549db1e0b18d7be0023b93350afe32f1b5fb79d49097827b7ed9b60827f2b54ae
-
Filesize
204B
MD579207aa5ca7db319c77c447e6cb17f07
SHA1ee7d34bd755fe6eea3cd892f62351cb0268f77ad
SHA2561fc053370fcf911d0e72357b9f7a74b56ef25a2fa503a5c0f6ca48e145ca5b89
SHA512633d4e9c9e584f2cdc08bbd3f5bff22830a2cf47943bb0cb9fafbe9d464d034440307e4246e54e35d7e770b89219f3837f4339e7d6bf531b687bd4490014be1b
-
Filesize
6KB
MD5320719c96854b0a5fd311ad8efe3b90c
SHA1929f6f68e9d0ac11ddb60ac23f6df8e912623717
SHA256bd7ff3d8c407c624edd5ceb1265060b5503e5a215dfdcf474c9d311d2e7612d8
SHA5122b1fe1fde8fe575df017873514f9b0313565bc3fe9d79bc7d99a68a366bba63b2cfe02be2b7261cefccc38ad68dd6b63b8c98bf9bf50e57119b8396d3e0476ee
-
Filesize
2.7MB
MD5108337c333b134d6812e0e41aa242522
SHA1ce4a025f2392bc7c4a3d2a96feec3ab0b2f75ecf
SHA2561cb0a18ac0f2ecc3ef04806bcd8ddb59d8eab3552a1f082a2717382437ceae68
SHA51214f20892c3cce3d75c853aa9df9521975759a528a545c26f7a03c9ca87f0b0ed96d5699370f0f77603dad405179626772d09cf659fc1a37c9b72f74cdc67d537