Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe
Resource
win10v2004-20240802-en
General
-
Target
e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe
-
Size
2.6MB
-
MD5
827d1a54f0828cd0b365b0972ce2fe96
-
SHA1
73a18d81703c0569967b0b35fa4d045f427b2769
-
SHA256
e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095
-
SHA512
27f261a29ca2a9c62ebb43230927fadf839d138b26f4256c29c573681df93c8f4e0670b13d4a905d6a9e9d753629f2869d94ee2b460881402e06085568bbf8bb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bS:sxX7QnxrloE5dpUpRb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe -
Executes dropped EXE 2 IoCs
pid Process 1844 ecdevbod.exe 3664 devbodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZG7\\boddevloc.exe" e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocG1\\devbodloc.exe" e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe 1844 ecdevbod.exe 1844 ecdevbod.exe 3664 devbodloc.exe 3664 devbodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1844 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 90 PID 4944 wrote to memory of 1844 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 90 PID 4944 wrote to memory of 1844 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 90 PID 4944 wrote to memory of 3664 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 93 PID 4944 wrote to memory of 3664 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 93 PID 4944 wrote to memory of 3664 4944 e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe"C:\Users\Admin\AppData\Local\Temp\e018c7a9526e69c9e6e991cea006d0dd2174e178957839cf244c7dcbea5bd095.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\IntelprocG1\devbodloc.exeC:\IntelprocG1\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD546b2882dfa280e2a588c3085a347d307
SHA10aa8bd85a95a502a470b869fb8f29fb5d3eaf2d5
SHA256c427a6293eca7292ae91ac2c10df692225e8d1ddf00d8f39959df786ce3a3983
SHA51284814aa62f09b692e749ed0675490f9dabb280b62ea432f1339c8b8ed63dbeb5eae3d9a6f82c8e0469eb97cd82a6fe6104949144b68c178f2fc4f4074225da95
-
Filesize
2.6MB
MD54090caf073f3a40b0d297492adb527db
SHA1096baef6721630cb70836e108d33bd8c9c3d30d4
SHA2564aa31765f34d5df235da5978d5f49725cfcf9445812a9f83fb7a5e7df6cc11b6
SHA51287a62f3ee4b1b17c069706564a6397e979c03c0d0cca809e800d80dbcd5722dd36ab4f90990eb665dced19249cd45d2faee0de2037a32de8ff11f69fb19d1480
-
Filesize
2.6MB
MD5a6cf750853d03a9f94b8ba66550a79c0
SHA1d1089926ccb8e89bb19a70d50953453884169b42
SHA2561481f678f8616512ce53902617694f65d87b200b98996778f1c2e3095e50fc06
SHA51224d9e8f6d8b6b175fe760d362d4b4dc98ff9e7a659c91a7af1a4b59048bccbd4b89cbc0c4eec96ff13481f994c2dbcfba4d2222a26c39e27b9d5c8a110cb7e17
-
Filesize
209B
MD502d635059670d5e091e89c5ed954f9b3
SHA12c8b74d5489d171fcb762014df4e8a891b116599
SHA256682344921a4ae54f9eaa572ec59fdbbd7ef3f4979235520173c22565d9a9f76c
SHA512738c3ddae59e166d699a655d216ac01bf6f2ebbed7b4e428cfb83d9b048b9ac7df1e79bf4e63822c7d448ab53df7ea341f443427138ae155e7a188fc0f1d0c25
-
Filesize
177B
MD52fc591019e6ddeed6b36e4b8b7de9aab
SHA1a6c11ced7e70584aafff3b7977279ec8ef0cbcaf
SHA25624afb04808a8e4a1df31b1add72ee99ae30419b8290bc4e83bedcba6b015afa1
SHA51256d0af27e56b4546128757e452a4bca067becce44ea5e0b90851186a28c4ce2326fff3da930a20291d82671c70ac51cd2e9540466fcd6007295546ab0606d688
-
Filesize
2.6MB
MD5754205b2b8a135945c6e3c16bd6fa522
SHA14fe11780ad3f636a8eebf1e03118690638f1fe06
SHA256d691ac932f9df8a0610fc8627e45bcfa2ec11547e9092fca9833d31dc358afdc
SHA51201c214b029805c4d46ce379b23e6d8962db57173ef59185f8034f8ea45351191704fd51b7a80f94e475ed94547e4fa8df21731fe03e676705e5a4ce619d35dab