Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
3e09ff4aa8f26794de27c3e1a6fb39f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e09ff4aa8f26794de27c3e1a6fb39f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
3e09ff4aa8f26794de27c3e1a6fb39f0N.exe
-
Size
2.7MB
-
MD5
3e09ff4aa8f26794de27c3e1a6fb39f0
-
SHA1
d643f711570e2771c700d22f06f7995e4f60dc49
-
SHA256
30a532b7e6bc2a5c653736365dd8a168178d61d9cad5f5eb0ef1199ee1078ed2
-
SHA512
0546b9e5685062c37d4345b6eadeb8e9ca62da85398a2b54dfb7f95fea9fc6adc19e5e173553dc5948a62698c874694c538b5ffa4e4a3242e44222eff9f3b1b4
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB79w4Sx:+R0pI/IQlUoMPdmpSpr4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 692 xbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeSH\\xbodsys.exe" 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint83\\bodxec.exe" 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 692 xbodsys.exe 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 692 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 29 PID 2876 wrote to memory of 692 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 29 PID 2876 wrote to memory of 692 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 29 PID 2876 wrote to memory of 692 2876 3e09ff4aa8f26794de27c3e1a6fb39f0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e09ff4aa8f26794de27c3e1a6fb39f0N.exe"C:\Users\Admin\AppData\Local\Temp\3e09ff4aa8f26794de27c3e1a6fb39f0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\AdobeSH\xbodsys.exeC:\AdobeSH\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5461333fd913fefade6d68214203b94e3
SHA1d05b43e61bca11c7710e6afddf19af193969a49a
SHA25680f272175f274d5dec690785e6d0371b610149659cc8b6825a651360b1cf5c80
SHA51237d005b28267ea9b48a5a8da8a023ae6f02212a47da39796f25cedff047d43419e2993401a60ab750b8dbdab6df62e547c63dea6e31fb4fbcd7b0f936ded8793
-
Filesize
200B
MD5cefd015f82e7850a48193d987fe16528
SHA1300b9fdea58dd7a542efb2d1f654028ed29c520c
SHA2561e2ac996651abad32be6e9084741498994f0313b6251c7aefd189d547af61277
SHA51241d3289f6532e41158c1b88d404f811259eb76fc37996c7a799650b75834a6e797c07bafdc7e88a68263bede4502c30a33bb26e62af6ef0c37b5daabfbc5940f
-
Filesize
2.7MB
MD55aa3b659615d4274bffa357cf3794801
SHA17d3bfd4db135dc196c660b26318d88dfffd53efd
SHA25642756fdc92ccbfc38cd3e8e3c105e75a199f7438e83ab27985ffccced7544a25
SHA51211f6a245d0d99e0b592358e89600f9787979a993bdf87120a5900ce7bf896d70dd4eda35955d25cf495621280109e4f71a8d8ea8ef85ba2d9a7de3e0704aba7d