Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
2791c3d6968cc6953e6387838057a460N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2791c3d6968cc6953e6387838057a460N.exe
Resource
win10v2004-20240802-en
General
-
Target
2791c3d6968cc6953e6387838057a460N.exe
-
Size
2.6MB
-
MD5
2791c3d6968cc6953e6387838057a460
-
SHA1
bb69aefaa7a617785ad5a14250ac1624c4f38e8e
-
SHA256
300c3abab170feb7e7aff739a157de89593a981f03d096a6bf669ab3e508db8f
-
SHA512
671ad96b321859f5411d9d2411ba58c6d0228517c931a4d7de41db753da07b782b5757de0018a5a5e99e30991dcd8cd442ceb630cd9ed64396bd432d2db120fc
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBYB/bS:sxX7QnxrloE5dpUpzb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe 2791c3d6968cc6953e6387838057a460N.exe -
Executes dropped EXE 2 IoCs
pid Process 2280 locdevbod.exe 3068 devoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 2791c3d6968cc6953e6387838057a460N.exe 2388 2791c3d6968cc6953e6387838057a460N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocVP\\devoptiloc.exe" 2791c3d6968cc6953e6387838057a460N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBAQ\\optixsys.exe" 2791c3d6968cc6953e6387838057a460N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2791c3d6968cc6953e6387838057a460N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devoptiloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 2791c3d6968cc6953e6387838057a460N.exe 2388 2791c3d6968cc6953e6387838057a460N.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe 2280 locdevbod.exe 3068 devoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2280 2388 2791c3d6968cc6953e6387838057a460N.exe 30 PID 2388 wrote to memory of 2280 2388 2791c3d6968cc6953e6387838057a460N.exe 30 PID 2388 wrote to memory of 2280 2388 2791c3d6968cc6953e6387838057a460N.exe 30 PID 2388 wrote to memory of 2280 2388 2791c3d6968cc6953e6387838057a460N.exe 30 PID 2388 wrote to memory of 3068 2388 2791c3d6968cc6953e6387838057a460N.exe 31 PID 2388 wrote to memory of 3068 2388 2791c3d6968cc6953e6387838057a460N.exe 31 PID 2388 wrote to memory of 3068 2388 2791c3d6968cc6953e6387838057a460N.exe 31 PID 2388 wrote to memory of 3068 2388 2791c3d6968cc6953e6387838057a460N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2791c3d6968cc6953e6387838057a460N.exe"C:\Users\Admin\AppData\Local\Temp\2791c3d6968cc6953e6387838057a460N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\IntelprocVP\devoptiloc.exeC:\IntelprocVP\devoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD58308d972f854c3e84cabdee723bf41d7
SHA16d7cbae2dc267c35d4a031255726b4be83ca099c
SHA25606a7f826708c08be7e11da02b5da232e8d2c82697b57412f929623a59f43534d
SHA512ae50fc55dc5f1fd11237bf9e73b5ee4d20b3d56f56a58aa449192bbc540af081dc35a736317926ad157cc763aa82823d095cd2aa904eb522e4fc590b8c1b7d53
-
Filesize
2.6MB
MD5f63e78f49205480bb0f9f3df16cf164f
SHA14345e1f9dc12e2a3c0d6439d5799b1a4ffccbaa0
SHA256f7e6431852ce466fe0733f6858c98b08b7aa5ffecddbc036e041e26ec666fdd5
SHA512fd777f41a78fa3c1a4b2e07c40b34c9c0af4493bccfa7a8547cae0c0688d7a06ec279faadfcb0d45eb03720005ac87a3927f7d043f0fc99778141b235549e9c9
-
Filesize
2.6MB
MD5e3c131ee7273b48165ee0aa1686d9cd2
SHA19eb22f247d1b2e7c6128a13b021d512a617d4b40
SHA256845570baf090f95bef06a31f840e45557717e715a4035f6c72a3dcc6bd4df0c2
SHA5126b1ac8ea5f5b9726dc703a0fb66041211d9ca73570511e574de6e9dfd47f9474f02022ccf97ec0c5976bbcca1c6adc082de267c25b033615265eb1ce33082ad4
-
Filesize
178B
MD53a71fbd39e52551bc60b8d087f7ab936
SHA1e720fabcfce54993ba0f5c69cddc6d6b320730a2
SHA256b5c8f050329167c0629cceeaa4edda5fb60be02d745d19b69ab9debe6caed367
SHA512b05ced641f0d39c2549a493e72d55152275e41bec3414d37a3680516a5350cda79b6a01f75cc5afdc3fe20c92d945eb59814cccb7e8dfe09e0a20e570a6b2b25
-
Filesize
210B
MD5d0e4d3eb8cee01b31afec00713065b48
SHA165395609f41710217632b53bbfcf550f7106b8a6
SHA2561ba140c5859cb033b1db3d8a2dbd8b695396d6bfdbcc9046479d580d049008ba
SHA512630a11f35331efcb4a855bf15919804a315134c8d02748492852572f08071d64c2f6660f2dfa84f585361a47d80dd4ac3b7fe6e53ba60fa5581a4464a90f8255
-
Filesize
2.6MB
MD501c1b5e27b646250f52200079ffbae18
SHA173db4c386086e1e2ec62648136e4f793e5a8b07d
SHA2567183ce9b7c20ba7e4dfca2ed349055c23c2c3de05efcc917fa2ad9720e92bcf6
SHA51238197b811b927ee1f79e11fe33921d17c026da890cac8b379aa1b03de11fe27eebb701d7c25a64393f07914af7e38519f337cec86162808a6959a4990933d7ac