Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
04fe48f38727fb588a5cb8fba89349c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
04fe48f38727fb588a5cb8fba89349c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
04fe48f38727fb588a5cb8fba89349c0N.exe
-
Size
2.7MB
-
MD5
04fe48f38727fb588a5cb8fba89349c0
-
SHA1
8c91506ed6ddb1be7144a836c54f98f5e019c890
-
SHA256
7e01c717fe9d0df58009208351584c7575b8a70cd670e0ec15a09d403b87fceb
-
SHA512
b64945119cce7ed518bc21635649da533882ef0964e0c882066201fd4c2808afe32cdc77e6ae00017848de3f9a064d9ba27fc73f3be35af98e3353be5b931d68
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBi9w4Sx:+R0pI/IQlUoMPdmpSpE4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 devoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2728 04fe48f38727fb588a5cb8fba89349c0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvD6\\devoptiloc.exe" 04fe48f38727fb588a5cb8fba89349c0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint47\\dobdevec.exe" 04fe48f38727fb588a5cb8fba89349c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04fe48f38727fb588a5cb8fba89349c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 2740 devoptiloc.exe 2728 04fe48f38727fb588a5cb8fba89349c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2740 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 30 PID 2728 wrote to memory of 2740 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 30 PID 2728 wrote to memory of 2740 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 30 PID 2728 wrote to memory of 2740 2728 04fe48f38727fb588a5cb8fba89349c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\04fe48f38727fb588a5cb8fba89349c0N.exe"C:\Users\Admin\AppData\Local\Temp\04fe48f38727fb588a5cb8fba89349c0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\SysDrvD6\devoptiloc.exeC:\SysDrvD6\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ac71f024c193b12798ce72f592879a2b
SHA1779b4a8110aacc0ca989dd7af10fde9f1c21d3f5
SHA2568eaef5ce3e8587f6039d2f4de10833343dd3c2d551886c0958dd7995a1ac6d30
SHA512160d37b9d925e9cdf449d7b15077eaead43b8e5f52a987bd03890787628c1bdc3d822cf66a7a1de6c2fd17f32ed841204e02a01fd061d0c43a64d1f5d69d2a98
-
Filesize
206B
MD5fbf48b022894e4c884951c3369d7ec28
SHA1e2f462885430cb5bb51b72e76eefb708b533fef4
SHA256e6f421bddc4b90cc02b92abb57bba6af7c5e89f5cac926fad1648d4968d288c2
SHA51292a58db01b274eff7fe1fddde9786c65a166f4bf0746d569f49fdc99800825c1f19e9755c04b5d39a25067382e11a12cc0cce3f8c913975df3cc0386219bef69
-
Filesize
2.7MB
MD5b6e86152aa9e1bda8ad8a29c6728f16f
SHA1d06629a3ab589b5f8d98e1fa564b35d2e882e9f5
SHA256e3d199c4cbc176ec761a7ec948464d6e7f6447ce9ec05de9089ec8dffa13b62c
SHA512b3e979456c9c235c2ef99e09059abc6f3b3f2f86d11c106d2154b2ef3bce27449f49d9edbadcc03e7c77245c386682de697a45bf79ebefb8d31b7ff395a5c3fa