Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe
Resource
win10v2004-20240802-en
General
-
Target
4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe
-
Size
2.6MB
-
MD5
4f9e62b641b82463c2d09941131abb83
-
SHA1
d7c1a9c10178bbdededb32e5d92cebdc3a5e6acc
-
SHA256
4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92
-
SHA512
e2468c8a336003e7121545196a144096190c69f39fa15af0abd62a592666db1522522053f9401e4657e4132d302aab365938ef7024148606f91cc5e06d76689a
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBhB/bS:sxX7QnxrloE5dpUpWb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe -
Executes dropped EXE 2 IoCs
pid Process 2736 ecdevbod.exe 2656 devdobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesFD\\devdobsys.exe" 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintVO\\boddevsys.exe" 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe 2736 ecdevbod.exe 2656 devdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2736 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 30 PID 2060 wrote to memory of 2736 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 30 PID 2060 wrote to memory of 2736 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 30 PID 2060 wrote to memory of 2736 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 30 PID 2060 wrote to memory of 2656 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 31 PID 2060 wrote to memory of 2656 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 31 PID 2060 wrote to memory of 2656 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 31 PID 2060 wrote to memory of 2656 2060 4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe"C:\Users\Admin\AppData\Local\Temp\4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\FilesFD\devdobsys.exeC:\FilesFD\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD52ff9c011edc4ccb65655a93583c78d1d
SHA1ccd14e17aaca8d3d11ae82ba517dcafc32609754
SHA2562acc8e52407544b2416d82d913f4e998873bf447c583ba920fed9148ecf8aed6
SHA5120a39b5668a8daff6c629632e9b53342aee67b7a0e79f7d7079c9f65f14a5b87fbedb467df3ada7a2fdddadd27d037d0db8e440f6cce38a6b675035454c1be960
-
Filesize
2.6MB
MD57bec670c3a7ad76a3b204c818ff144dd
SHA17cad0cef919ea1100f62993bcddad012ac1fab12
SHA256fb41727d1e56e4ef4699f3c4e5e61adae4bfc9ca95e3f299a8bd372accd8ee82
SHA5120e76cbd837271df9ff9cadd2b43c89400219baa35a05f07f8256fff832bda0e38e9faee0d165ed438c96a6ea590e736806554dee4940c71ae0f2885efdf6caf2
-
Filesize
2.6MB
MD554d14ec8aeb09d22af18b74a28d9fd43
SHA1bdf9d2ed59c680e00784518acb0c50d75306a093
SHA256174c4eceb1ed345ac47c44fd082f02e3d517b6db87415ac90a27a9124c4e1363
SHA512b379c3aed3391bc6795ca436b59de91d839ae506b728e61808cdeeb54eb2694aaa5bd5d18bd572e6320b150f03b93375d2da47cfd4e951553e2943e0efe55679
-
Filesize
173B
MD52db6ff220066e8feb68b36e6ccd4e033
SHA168c80901baedf0b91570ff2044f53c2fd564b5d1
SHA256c8e155ac01bfdf664a270ec3b15ae55f1fc91cb558d1f9453675ab2224cc2599
SHA512906f579be80d0816332b97601a25d3e19cbe8239e4b6136f81119f2a50e53014754997376968c881730021c4b84e92360f0fd4e3fcb3832a9087e701aca928bc
-
Filesize
205B
MD5af13c4abb9c248294961bd5ef8770feb
SHA1eb15808794d7e0b87368e305b2b4067905c61afa
SHA256ed3d1f65fd19a8701f1c8aa877a7c67f365bbaab85d691ed8f3a5e8817f78f38
SHA512ae223e2972b63b94a70318ab4f26b6e75963b23b80acb2c3eccb100a5a68a37a7779bd33df5634090a9cf72b0c056fbca6a4401247e3bda0ebd2011d79dd8a93
-
Filesize
2.6MB
MD5ab18f665c169f37a2784fa2c46c30a8d
SHA1419fbdcdfa8a5af12eca2fd85564294fb4e81b6e
SHA2564bbdde255810ba62c6b8f659cdd7be756a798aefeadd607910091b8e3f3e86be
SHA512163d30ce059225d5b75483ef7326254440b4da697297dd9b1d25a1fa1043106ddc4c7ed2d4105efb222785d9d9ca05d21cd6569319f44312310bc4881fbc1a7d
-
Filesize
2.6MB
MD5566c2078155db5f79bf7a32d2c4a41b0
SHA151c120e7fc712629d9a60b8cd92ba7f820aba6cb
SHA256295b3da4dff27ce0f7d09fbb87b94d92c055ea451f10925d2fe96837a812ed22
SHA5123636fac9e6076acff1ac34ec55f0de7d2e278fc9b672f8de418e9358445104e29973023c38c958aa6647cbc5af79c09840b3bdcadd6dbb06a27c1012f011e166