Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
915da6f90fed22edc808065361baf190N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
915da6f90fed22edc808065361baf190N.exe
Resource
win10v2004-20240802-en
General
-
Target
915da6f90fed22edc808065361baf190N.exe
-
Size
2.7MB
-
MD5
915da6f90fed22edc808065361baf190
-
SHA1
2cb24349bbfcaad89540800862a4951ac630ba6c
-
SHA256
259eb1ee7cac872271bb6cf738e59374c77c7b9a417fcd3691f5f78ce11df052
-
SHA512
7817fb9e388a776b6bd5663ea5c472e10d42100aac524d9af31acb4e54247fba6b1320f273bf4ebdc3ccb3e351e17b35e1d52dcf5fea5b87505171333e374545
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB59w4S+:+R0pI/IQlUoMPdmpSpB4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3548 devbodloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeD5\\devbodloc.exe" 915da6f90fed22edc808065361baf190N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintER\\dobaloc.exe" 915da6f90fed22edc808065361baf190N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 915da6f90fed22edc808065361baf190N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe 3548 devbodloc.exe 3548 devbodloc.exe 2988 915da6f90fed22edc808065361baf190N.exe 2988 915da6f90fed22edc808065361baf190N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3548 2988 915da6f90fed22edc808065361baf190N.exe 86 PID 2988 wrote to memory of 3548 2988 915da6f90fed22edc808065361baf190N.exe 86 PID 2988 wrote to memory of 3548 2988 915da6f90fed22edc808065361baf190N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\915da6f90fed22edc808065361baf190N.exe"C:\Users\Admin\AppData\Local\Temp\915da6f90fed22edc808065361baf190N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\AdobeD5\devbodloc.exeC:\AdobeD5\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD54a9b3fb23ce8b376d6e392ba8f8f6469
SHA13b1bd2176fecf21ee49cf4e0b3d7a760e8dcc5b6
SHA256905f3677656499ef6c66a5d7f450cc1aafc1e9f6131b0bba1394e0381ca716e4
SHA512a4a1e5c8dbc14b6346ba7307f6686e9e8de1c540743172568717f02555298bc8de91117ace308765f1b28db7c8db57e5ab158ff0ddc4da2163c03d672d670f2c
-
Filesize
2.7MB
MD5d47e3c8217ed69d7d041cf838b7c934f
SHA10a6432e69e0f1b90f3c7c445f3f400d3818469c9
SHA256a7400cb0da079a34ae62ff6cd64a1effc17cf36d1cd8410dc43fedce5805359c
SHA5126d270523face4449c685846132070b22d00a3501e6345c6778978238dcdefca05d70968ec9054ce223ff3cdfded84291398364a0cf6c074ebb5b17ffacac2d05
-
Filesize
204B
MD579154ea6ab6cef1f2862fa68eb27b5e2
SHA1ec114208640ccf186a825665c35646d54ea1df5c
SHA256e28f85dd8c52a14b621cc2d61054eb920a7e1fe378c6b9f3e07156f34a24781c
SHA5127ca84802b6373b594098c2490dcbb88eda2f1b2c065ca485a8e62604028f3fb563ccb3bbfb4640069b2de33a9102cf5876d9db9df964a26acd7afb6bbaf6a129