Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe
Resource
win10v2004-20240802-en
General
-
Target
08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe
-
Size
2.7MB
-
MD5
4b2a5356aa624bcccf84d047269a36fb
-
SHA1
d2790f4d2fc27d50babddf97bafb5b2907a688e3
-
SHA256
08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd
-
SHA512
a04ff768b50015bba65f25cd8ffe4e44a52676fb009a5ccbd5acab9273ca06b3dee0d6e5fc54e8e9f59a55dec0f79e86da0d62cd83e3afb018a5ecc42f8f71ad
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBm9w4Sx:+R0pI/IQlUoMPdmpSpE4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1376 devoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesS7\\devoptisys.exe" 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBYP\\dobxsys.exe" 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 1376 devoptisys.exe 1376 devoptisys.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1376 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 86 PID 3668 wrote to memory of 1376 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 86 PID 3668 wrote to memory of 1376 3668 08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe"C:\Users\Admin\AppData\Local\Temp\08dc98118679c825a8b4541ab34d35e63788fc51ec444a2623be6d13607483cd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\FilesS7\devoptisys.exeC:\FilesS7\devoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b462950899f901dea081fa1f4628aafe
SHA14d2e60071642899423390d89509a0ffb40275442
SHA256f2ceaa65bf04b24f9ae3fb516eb1e86aee623f49a5eb896b74ad446ab70eb10e
SHA512a43c59fe62cf52a1d193932c53b2c003ed8ec8c3bd466dc4b2b257e91e86def257143cf6ee5963a382852632626e6fe38a9dd654a64bd90c107cc08c0af4772a
-
Filesize
2.7MB
MD50c63a827ab472460e9a35af9e81634a3
SHA1cb058af91b1a7f4d98566085b5349ea1d360194d
SHA256aefb2932b5ed84248172b15986caa3e6236a6c5a1eb03c95d97e2ae0ec7b7889
SHA512961356bb79260ff1f8dc76bb0e8c436f59ed330271d89c807a6d5438a290d489bc9246eb91c7a30180e8e8efca93d1805c16f1e4ac088fcc52d0f534e214ffed
-
Filesize
204B
MD552508ad07aeefd07d09b77a7ad99a688
SHA11252f215e729f81de55340b5d8b3c68d07287900
SHA25627e1c38b31b3703d99628a19fd13df534809ceb43d7984638adab17c97d2b1b2
SHA512576c17a2a6645b6f67cc97c57eab42051972fe672230cc9edd5b93667cd3ccf344c0906af70c95b8c157bbb20f4ccc2d74c85825cadfcb389fbcceb1a882dc62