Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe
Resource
win10v2004-20240802-en
General
-
Target
103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe
-
Size
2.7MB
-
MD5
95ee134eb5f84b928cfce514db43bd51
-
SHA1
e20d3e2010dd7f234f10f6c3c0f0332d0feb82c0
-
SHA256
103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d
-
SHA512
1ecc339cf70779a7a5f66dc9898eb7e7ccdcbd558b9cc32ad90259034f748e5016f359b2e65df7b20185e81631868d4789f3f6d54ade341510e57d5877677453
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBe9w4S+:+R0pI/IQlUoMPdmpSpw4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1628 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotGX\\xdobloc.exe" 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidYY\\bodxsys.exe" 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 1628 xdobloc.exe 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1628 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 30 PID 2232 wrote to memory of 1628 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 30 PID 2232 wrote to memory of 1628 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 30 PID 2232 wrote to memory of 1628 2232 103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe"C:\Users\Admin\AppData\Local\Temp\103fb908433e953769b58e0f59b6353d5a5cd34542b89d273a1fc386c430415d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\UserDotGX\xdobloc.exeC:\UserDotGX\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD5d562bca31fc0791628df27f556c7a0f9
SHA1faa60bddbcb4fb2199130121987ba636806c7a52
SHA256a1b35b920c040129c29213949cda958d8d8a3d11d6fe2a88a65ad540c405bda3
SHA5125d4ce5dd108ad93b67bd56594be6bd000775ec205d6d32e12fd95f4d12458dc9ba0a490b7c0bbfc58f3e0cb0732842628fb5feda80358f37be8167b8691f271c
-
Filesize
2.7MB
MD5330cd0840da9956b933e467dbe8750de
SHA110a70b903e7d131178f05e071b00cc012d17ae2a
SHA256382e14bedda98a3060ca303ee7fab2aeb4f7409a208751b88e66f1791dbe6334
SHA512f39d2cda32348aa400fc07845f09f87bae8906f31a56714af8c3bda7e069b952d951e2280b9d5e2d3f342ebb4c5ec2bb43c4cf42fd77ce56c2c2fc6d1a5f87da
-
Filesize
2.7MB
MD502487f1449de1e6f66be944bbd3d3179
SHA17d66253fb33e27de840cf90f7ebe8f77d05efa16
SHA256f5e4223e8d274f6caf808f026e83dc52a26d086b671e09e81b8b251fbc065a61
SHA51227870cc7a856202dac535251ee663568b60e5843ed84fadfbfd5233c7422126ef386ffcaf26656d02481977db5127bfd775f91c4dccbacca734ee79a5b6f83ca