Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 05:10

General

  • Target

    e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe

  • Size

    2.6MB

  • MD5

    827d1a54f0828cd0b365b0972ce2fe96

  • SHA1

    73a18d81703c0569967b0b35fa4d045f427b2769

  • SHA256

    e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095

  • SHA512

    27f261a29ca2a9c62ebb43230927fadf839d138b26f4256c29c573681df93c8f4e0670b13d4a905d6a9e9d753629f2869d94ee2b460881402e06085568bbf8bb

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bS:sxX7QnxrloE5dpUpRb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe
    "C:\Users\Admin\AppData\Local\Temp\e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1844
    • C:\IntelprocG1\devbodloc.exe
      C:\IntelprocG1\devbodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocG1\devbodloc.exe

    Filesize

    2.6MB

    MD5

    46b2882dfa280e2a588c3085a347d307

    SHA1

    0aa8bd85a95a502a470b869fb8f29fb5d3eaf2d5

    SHA256

    c427a6293eca7292ae91ac2c10df692225e8d1ddf00d8f39959df786ce3a3983

    SHA512

    84814aa62f09b692e749ed0675490f9dabb280b62ea432f1339c8b8ed63dbeb5eae3d9a6f82c8e0469eb97cd82a6fe6104949144b68c178f2fc4f4074225da95

  • C:\LabZG7\boddevloc.exe

    Filesize

    2.6MB

    MD5

    4090caf073f3a40b0d297492adb527db

    SHA1

    096baef6721630cb70836e108d33bd8c9c3d30d4

    SHA256

    4aa31765f34d5df235da5978d5f49725cfcf9445812a9f83fb7a5e7df6cc11b6

    SHA512

    87a62f3ee4b1b17c069706564a6397e979c03c0d0cca809e800d80dbcd5722dd36ab4f90990eb665dced19249cd45d2faee0de2037a32de8ff11f69fb19d1480

  • C:\LabZG7\boddevloc.exe

    Filesize

    2.6MB

    MD5

    a6cf750853d03a9f94b8ba66550a79c0

    SHA1

    d1089926ccb8e89bb19a70d50953453884169b42

    SHA256

    1481f678f8616512ce53902617694f65d87b200b98996778f1c2e3095e50fc06

    SHA512

    24d9e8f6d8b6b175fe760d362d4b4dc98ff9e7a659c91a7af1a4b59048bccbd4b89cbc0c4eec96ff13481f994c2dbcfba4d2222a26c39e27b9d5c8a110cb7e17

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    209B

    MD5

    02d635059670d5e091e89c5ed954f9b3

    SHA1

    2c8b74d5489d171fcb762014df4e8a891b116599

    SHA256

    682344921a4ae54f9eaa572ec59fdbbd7ef3f4979235520173c22565d9a9f76c

    SHA512

    738c3ddae59e166d699a655d216ac01bf6f2ebbed7b4e428cfb83d9b048b9ac7df1e79bf4e63822c7d448ab53df7ea341f443427138ae155e7a188fc0f1d0c25

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    177B

    MD5

    2fc591019e6ddeed6b36e4b8b7de9aab

    SHA1

    a6c11ced7e70584aafff3b7977279ec8ef0cbcaf

    SHA256

    24afb04808a8e4a1df31b1add72ee99ae30419b8290bc4e83bedcba6b015afa1

    SHA512

    56d0af27e56b4546128757e452a4bca067becce44ea5e0b90851186a28c4ce2326fff3da930a20291d82671c70ac51cd2e9540466fcd6007295546ab0606d688

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe

    Filesize

    2.6MB

    MD5

    754205b2b8a135945c6e3c16bd6fa522

    SHA1

    4fe11780ad3f636a8eebf1e03118690638f1fe06

    SHA256

    d691ac932f9df8a0610fc8627e45bcfa2ec11547e9092fca9833d31dc358afdc

    SHA512

    01c214b029805c4d46ce379b23e6d8962db57173ef59185f8034f8ea45351191704fd51b7a80f94e475ed94547e4fa8df21731fe03e676705e5a4ce619d35dab