Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 22:28

General

  • Target

    60c41a36a04f8d4f67c32dd91e73d6c7b92db7cd6b2d1294ac6604cb40dae30d.exe

  • Size

    2.6MB

  • MD5

    4979549ffeb15b3a35518ee078efa6c8

  • SHA1

    92b5093771d0d49794b688aec922a1322ef97259

  • SHA256

    60c41a36a04f8d4f67c32dd91e73d6c7b92db7cd6b2d1294ac6604cb40dae30d

  • SHA512

    da1637076866f1f1b9d8a30a97cccaf01552c0764f6c87022fa47fc27f709f5a59a75637a9aced327fd8ff22ecf8b6ef6eff7474471057d326dd957efabcb1a3

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBaB/bS:sxX7QnxrloE5dpUpZb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60c41a36a04f8d4f67c32dd91e73d6c7b92db7cd6b2d1294ac6604cb40dae30d.exe
    "C:\Users\Admin\AppData\Local\Temp\60c41a36a04f8d4f67c32dd91e73d6c7b92db7cd6b2d1294ac6604cb40dae30d.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3888
    • C:\FilesJ3\xdobsys.exe
      C:\FilesJ3\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesJ3\xdobsys.exe

    Filesize

    2.6MB

    MD5

    a3a48a91cb4d9273502c2d3b4997d170

    SHA1

    055760463fbde711c6fd23c2f144607198e2b021

    SHA256

    a37e87028ab06f55bd29c9ba087af2ca57c2c2c08d8763f36c05266854b5cd29

    SHA512

    d32f31c27e35e7de03fb9093c08754fbcfd77430ca14af6ce770dcb3d8e9accf712ac2473fe899082d64eb405b68a9f2f9b55561e5a0471808cde5bc396f4d6c

  • C:\KaVBOU\boddevloc.exe

    Filesize

    2.6MB

    MD5

    f4d0a5478541b6a281f67512bee6e18c

    SHA1

    e657ed04af7186e66b65bc5f83a657120d53ab21

    SHA256

    72dd6c78b8f4f94ba2eba14b996d5b2fa0db1178503bdde6b902a54300159eb6

    SHA512

    511313f4c5f594e1fbf7487782c3beda87c9df386aede51536d4d21a6d777548c9ea1550b396222532dca580508e72aac2e920da35632fa67c638b34eaf5da36

  • C:\KaVBOU\boddevloc.exe

    Filesize

    2.6MB

    MD5

    fe944b5b2a8c9a78d6693a8c5f77b4fb

    SHA1

    26c13b804058b34f1cd378410dd91ef5d56bcfc9

    SHA256

    c063008fd043309dc7595be02c785cc600defa51b094ef837ee7c5897791b044

    SHA512

    f24591fda4042771657bf9a4ec2159d7836b4ed52b6f520af92d085ad51a6b0d558380462d5eab7af669522f3cee8db77ab560dd53f03c1d3ca0caf7a5516462

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    406f2c8f8118f9dc777f163bc2b1c053

    SHA1

    eb288b16d9bb4ab288883f4ab1b3e8ceae0fb6b2

    SHA256

    7148d9966bc880b35d1380be69f39083917323a63abcf9fd108d64c856f959a3

    SHA512

    eb850495b34c00430f0ab3db404e244680718c844b0ff6dabbf53b681604cf163a14023e828e032a4c13fd1e378bc954b41684659dfc573291af1d37bdbff575

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    096b9ed602bc5cd523d508ba54b27abf

    SHA1

    29d67e33e2ac18820e815e409c3f9d6515f2a2e9

    SHA256

    1942ec5012213755cb7fa93f25b649acf1e0b0362ad3bf4b0b22385225945bec

    SHA512

    1a176b1f88e9bced73e23cf5037cbd68b22a0ad9015e82c4ee4e0ce99730cb854ffeadf4ce857abe4e2d6022a92a769b6ad323b4a876d841f02b171f3dcf86cf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

    Filesize

    2.6MB

    MD5

    4b10cc50b1b9ec6204e3072d77fc5f08

    SHA1

    3d7483aab3ebcab48cfa20149c79cb74d2b6b23a

    SHA256

    773ae617f24b8c1b0ed811834b8d6b68a390d590270fc5351f625ee7dd0839c2

    SHA512

    4d036653819cfcff853edf4b2865162f44a63026b2238b7d47c59e37b33768d740f4fb2ad6471f7eb4c0f3be5505bb3f159c6aa987e57e2d8a40eb4cd53af5ce