Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
933ef546eff7c6f5a29b642af99a7cb0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
933ef546eff7c6f5a29b642af99a7cb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
933ef546eff7c6f5a29b642af99a7cb0N.exe
-
Size
2.7MB
-
MD5
933ef546eff7c6f5a29b642af99a7cb0
-
SHA1
8bb0e318ab3dfa730d1692858fd01a2b9a8c50d7
-
SHA256
861018a3b9c12f6aa2f54f4a09bc97f79591f741aba32f245c73e02281184bdb
-
SHA512
c6debc1db7eae826dddb3efec5809fd9ce0573dc8e03108072bfe50ffa624687dc8f853db43717f85a67e0005ef52b00aa7076b0e9f462409e5e46cae6c6500b
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBO9w4Sx:+R0pI/IQlUoMPdmpSpE4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 devbodec.exe -
Loads dropped DLL 1 IoCs
pid Process 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotHS\\devbodec.exe" 933ef546eff7c6f5a29b642af99a7cb0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidTG\\optiasys.exe" 933ef546eff7c6f5a29b642af99a7cb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 933ef546eff7c6f5a29b642af99a7cb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 2188 devbodec.exe 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2188 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 30 PID 1752 wrote to memory of 2188 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 30 PID 1752 wrote to memory of 2188 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 30 PID 1752 wrote to memory of 2188 1752 933ef546eff7c6f5a29b642af99a7cb0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\933ef546eff7c6f5a29b642af99a7cb0N.exe"C:\Users\Admin\AppData\Local\Temp\933ef546eff7c6f5a29b642af99a7cb0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\UserDotHS\devbodec.exeC:\UserDotHS\devbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203B
MD50a8f5b34869fb745642c7e3e1c8c202a
SHA1f49fefb7d5f5d25bd7f8cbb373170c8af131c100
SHA2561dcb54a935856b2b7ba534ac84b14bf130a9348404e004ab8d5cf8064b6863ce
SHA512382478e67d41554b254aa16b06a883ffaf64af94be75319450ae8594d87725fe8527b841f52d0d2275de9542d02e78c855ae77c2521d59e03bf9464291505bd1
-
Filesize
2.7MB
MD5d4fd1f4800fea937aed567351b765605
SHA143670b85082cb09fa109475c4055f5e60626d98b
SHA256e9a36db233865c2b47c9c31e21a7e5bd1ee3380ba204313fedc5b60ec24968db
SHA512211789dbe771c9b9e11b1f28c46d266e2050fa79a6a9185e2257ed83b79b53a57ec6c6e1747c75aa85dc638ead5d6560e1644b56d4d9d0d2f08ad83bcc892585
-
Filesize
2.7MB
MD50e921bc05102a6194994507552ba2f72
SHA104d66b522b63732892a5b39f951be5c5ef46e6cf
SHA2566392de2aea1298917df82fdc2da481d3bcfe1f76ea8eedf7a346e3eb97b21d86
SHA5124b2b0292dbb3a92e2dffccf9addfa700af9b4b8586c01790e455b194374cebe046306e91a3d7cc4611b1bb350039434d4d5c987003ad49fa17fcab067626e0f0