Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 08:29

General

  • Target

    2791c3d6968cc6953e6387838057a460N.exe

  • Size

    2.6MB

  • MD5

    2791c3d6968cc6953e6387838057a460

  • SHA1

    bb69aefaa7a617785ad5a14250ac1624c4f38e8e

  • SHA256

    300c3abab170feb7e7aff739a157de89593a981f03d096a6bf669ab3e508db8f

  • SHA512

    671ad96b321859f5411d9d2411ba58c6d0228517c931a4d7de41db753da07b782b5757de0018a5a5e99e30991dcd8cd442ceb630cd9ed64396bd432d2db120fc

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBYB/bS:sxX7QnxrloE5dpUpzb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2791c3d6968cc6953e6387838057a460N.exe
    "C:\Users\Admin\AppData\Local\Temp\2791c3d6968cc6953e6387838057a460N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2280
    • C:\IntelprocVP\devoptiloc.exe
      C:\IntelprocVP\devoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocVP\devoptiloc.exe

    Filesize

    2.6MB

    MD5

    8308d972f854c3e84cabdee723bf41d7

    SHA1

    6d7cbae2dc267c35d4a031255726b4be83ca099c

    SHA256

    06a7f826708c08be7e11da02b5da232e8d2c82697b57412f929623a59f43534d

    SHA512

    ae50fc55dc5f1fd11237bf9e73b5ee4d20b3d56f56a58aa449192bbc540af081dc35a736317926ad157cc763aa82823d095cd2aa904eb522e4fc590b8c1b7d53

  • C:\KaVBAQ\optixsys.exe

    Filesize

    2.6MB

    MD5

    f63e78f49205480bb0f9f3df16cf164f

    SHA1

    4345e1f9dc12e2a3c0d6439d5799b1a4ffccbaa0

    SHA256

    f7e6431852ce466fe0733f6858c98b08b7aa5ffecddbc036e041e26ec666fdd5

    SHA512

    fd777f41a78fa3c1a4b2e07c40b34c9c0af4493bccfa7a8547cae0c0688d7a06ec279faadfcb0d45eb03720005ac87a3927f7d043f0fc99778141b235549e9c9

  • C:\KaVBAQ\optixsys.exe

    Filesize

    2.6MB

    MD5

    e3c131ee7273b48165ee0aa1686d9cd2

    SHA1

    9eb22f247d1b2e7c6128a13b021d512a617d4b40

    SHA256

    845570baf090f95bef06a31f840e45557717e715a4035f6c72a3dcc6bd4df0c2

    SHA512

    6b1ac8ea5f5b9726dc703a0fb66041211d9ca73570511e574de6e9dfd47f9474f02022ccf97ec0c5976bbcca1c6adc082de267c25b033615265eb1ce33082ad4

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    178B

    MD5

    3a71fbd39e52551bc60b8d087f7ab936

    SHA1

    e720fabcfce54993ba0f5c69cddc6d6b320730a2

    SHA256

    b5c8f050329167c0629cceeaa4edda5fb60be02d745d19b69ab9debe6caed367

    SHA512

    b05ced641f0d39c2549a493e72d55152275e41bec3414d37a3680516a5350cda79b6a01f75cc5afdc3fe20c92d945eb59814cccb7e8dfe09e0a20e570a6b2b25

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    210B

    MD5

    d0e4d3eb8cee01b31afec00713065b48

    SHA1

    65395609f41710217632b53bbfcf550f7106b8a6

    SHA256

    1ba140c5859cb033b1db3d8a2dbd8b695396d6bfdbcc9046479d580d049008ba

    SHA512

    630a11f35331efcb4a855bf15919804a315134c8d02748492852572f08071d64c2f6660f2dfa84f585361a47d80dd4ac3b7fe6e53ba60fa5581a4464a90f8255

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe

    Filesize

    2.6MB

    MD5

    01c1b5e27b646250f52200079ffbae18

    SHA1

    73db4c386086e1e2ec62648136e4f793e5a8b07d

    SHA256

    7183ce9b7c20ba7e4dfca2ed349055c23c2c3de05efcc917fa2ad9720e92bcf6

    SHA512

    38197b811b927ee1f79e11fe33921d17c026da890cac8b379aa1b03de11fe27eebb701d7c25a64393f07914af7e38519f337cec86162808a6959a4990933d7ac