Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
37abe3e7419258005219514c404a2b70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37abe3e7419258005219514c404a2b70N.exe
Resource
win10v2004-20240802-en
General
-
Target
37abe3e7419258005219514c404a2b70N.exe
-
Size
2.7MB
-
MD5
37abe3e7419258005219514c404a2b70
-
SHA1
677841e772a3b17b89e4ba539e48f7a54ff17771
-
SHA256
b8d2d3ff455db439e87e0273cf74d2bd9a6ff59520acfbf16667d835b8674141
-
SHA512
8c8a417fc1ab972db782105785f1423d00890169d15d2cbe059bc90d5c43c6d3f498d0b677f07593d434ff8fb1e572108e0e01fa1deba035afe4eeb033d9d442
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBb9w4Sx:+R0pI/IQlUoMPdmpSpn4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 xbodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocEH\\xbodec.exe" 37abe3e7419258005219514c404a2b70N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBSS\\optiasys.exe" 37abe3e7419258005219514c404a2b70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37abe3e7419258005219514c404a2b70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe 1672 xbodec.exe 1672 xbodec.exe 2068 37abe3e7419258005219514c404a2b70N.exe 2068 37abe3e7419258005219514c404a2b70N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1672 2068 37abe3e7419258005219514c404a2b70N.exe 95 PID 2068 wrote to memory of 1672 2068 37abe3e7419258005219514c404a2b70N.exe 95 PID 2068 wrote to memory of 1672 2068 37abe3e7419258005219514c404a2b70N.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\37abe3e7419258005219514c404a2b70N.exe"C:\Users\Admin\AppData\Local\Temp\37abe3e7419258005219514c404a2b70N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\IntelprocEH\xbodec.exeC:\IntelprocEH\xbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3932,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f86d36c103e70251249ecf25bbcffad3
SHA19a55266a857dbcdfae1732a813cc858d01c4aeee
SHA256ad8538521787612262b82fc74dac489bbf7f1e5b4f4e46ee158fbf50851a7755
SHA512d017aa26e3c238c2474cd1560cb6e2409a0113395e8af347b48cfa9de2d85ac01f1c3ebfa537e012e5b80398c513b183df2fdc4cab60f6950c31d4769e8f111d
-
Filesize
2.7MB
MD581a4b0726e7d13518050b47d2ff8e371
SHA19652e9b49b1f9233b629ad6e34dc252c426dd099
SHA2568cc3ed3cf69c236ef50b1511f9cb8b6b26621079f1457effdf153bee3365dc2a
SHA512a1701eeb6e39825d34aab7645f0b678f3bc23baeca43d4907d2a61642a68066daad6f77e4744a9e7ee4eca7f8a1d4d3aa940612ae362de71e3e5597c275d2285
-
Filesize
192B
MD523ffa795e936f41e7c7c223c42d706cf
SHA11f479c54c0ef7d79f3641d7ec96726f912c65ce8
SHA2567fc775483a610188906114ca5114a2e36ac2be413458b6e55883203262337130
SHA512aade307fef8a2a3a6e93b98bf418d2939f59608bb03809fa17aa4e261cc6b415fcbe9aa450296dc11dad89e93c982084fdcfc59aff88893b01e156d5047d0ebe