Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 21:57

General

  • Target

    4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe

  • Size

    2.6MB

  • MD5

    4f9e62b641b82463c2d09941131abb83

  • SHA1

    d7c1a9c10178bbdededb32e5d92cebdc3a5e6acc

  • SHA256

    4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92

  • SHA512

    e2468c8a336003e7121545196a144096190c69f39fa15af0abd62a592666db1522522053f9401e4657e4132d302aab365938ef7024148606f91cc5e06d76689a

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBhB/bS:sxX7QnxrloE5dpUpWb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe
    "C:\Users\Admin\AppData\Local\Temp\4570eff0d1d92560081b7314ab36a8103e975a5b09b671c03045711fe71b7e92.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2736
    • C:\FilesFD\devdobsys.exe
      C:\FilesFD\devdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesFD\devdobsys.exe

    Filesize

    62KB

    MD5

    2ff9c011edc4ccb65655a93583c78d1d

    SHA1

    ccd14e17aaca8d3d11ae82ba517dcafc32609754

    SHA256

    2acc8e52407544b2416d82d913f4e998873bf447c583ba920fed9148ecf8aed6

    SHA512

    0a39b5668a8daff6c629632e9b53342aee67b7a0e79f7d7079c9f65f14a5b87fbedb467df3ada7a2fdddadd27d037d0db8e440f6cce38a6b675035454c1be960

  • C:\MintVO\boddevsys.exe

    Filesize

    2.6MB

    MD5

    7bec670c3a7ad76a3b204c818ff144dd

    SHA1

    7cad0cef919ea1100f62993bcddad012ac1fab12

    SHA256

    fb41727d1e56e4ef4699f3c4e5e61adae4bfc9ca95e3f299a8bd372accd8ee82

    SHA512

    0e76cbd837271df9ff9cadd2b43c89400219baa35a05f07f8256fff832bda0e38e9faee0d165ed438c96a6ea590e736806554dee4940c71ae0f2885efdf6caf2

  • C:\MintVO\boddevsys.exe

    Filesize

    2.6MB

    MD5

    54d14ec8aeb09d22af18b74a28d9fd43

    SHA1

    bdf9d2ed59c680e00784518acb0c50d75306a093

    SHA256

    174c4eceb1ed345ac47c44fd082f02e3d517b6db87415ac90a27a9124c4e1363

    SHA512

    b379c3aed3391bc6795ca436b59de91d839ae506b728e61808cdeeb54eb2694aaa5bd5d18bd572e6320b150f03b93375d2da47cfd4e951553e2943e0efe55679

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    173B

    MD5

    2db6ff220066e8feb68b36e6ccd4e033

    SHA1

    68c80901baedf0b91570ff2044f53c2fd564b5d1

    SHA256

    c8e155ac01bfdf664a270ec3b15ae55f1fc91cb558d1f9453675ab2224cc2599

    SHA512

    906f579be80d0816332b97601a25d3e19cbe8239e4b6136f81119f2a50e53014754997376968c881730021c4b84e92360f0fd4e3fcb3832a9087e701aca928bc

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    205B

    MD5

    af13c4abb9c248294961bd5ef8770feb

    SHA1

    eb15808794d7e0b87368e305b2b4067905c61afa

    SHA256

    ed3d1f65fd19a8701f1c8aa877a7c67f365bbaab85d691ed8f3a5e8817f78f38

    SHA512

    ae223e2972b63b94a70318ab4f26b6e75963b23b80acb2c3eccb100a5a68a37a7779bd33df5634090a9cf72b0c056fbca6a4401247e3bda0ebd2011d79dd8a93

  • \FilesFD\devdobsys.exe

    Filesize

    2.6MB

    MD5

    ab18f665c169f37a2784fa2c46c30a8d

    SHA1

    419fbdcdfa8a5af12eca2fd85564294fb4e81b6e

    SHA256

    4bbdde255810ba62c6b8f659cdd7be756a798aefeadd607910091b8e3f3e86be

    SHA512

    163d30ce059225d5b75483ef7326254440b4da697297dd9b1d25a1fa1043106ddc4c7ed2d4105efb222785d9d9ca05d21cd6569319f44312310bc4881fbc1a7d

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe

    Filesize

    2.6MB

    MD5

    566c2078155db5f79bf7a32d2c4a41b0

    SHA1

    51c120e7fc712629d9a60b8cd92ba7f820aba6cb

    SHA256

    295b3da4dff27ce0f7d09fbb87b94d92c055ea451f10925d2fe96837a812ed22

    SHA512

    3636fac9e6076acff1ac34ec55f0de7d2e278fc9b672f8de418e9358445104e29973023c38c958aa6647cbc5af79c09840b3bdcadd6dbb06a27c1012f011e166