Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 22:36

General

  • Target

    db305c5e63771a6de82cfe1f03f63cd0N.exe

  • Size

    2.6MB

  • MD5

    db305c5e63771a6de82cfe1f03f63cd0

  • SHA1

    2145c8dc8ad229d58388c6b90d36f3d9a6e1d993

  • SHA256

    02430579ff8ce98e0473e809b160cf838ea80f88ac3dadec59ce432e4d467a8c

  • SHA512

    3b0415bee9974a92b5e6ed84329195e38441076e167f6a0bedc3b66f45bb2c338edf3c5793dcc9d47e9bb3af00d11e13fb3dde6e0f5a91e7854e64ab3a16db9b

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBlB/bS:sxX7QnxrloE5dpUpCb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db305c5e63771a6de82cfe1f03f63cd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\db305c5e63771a6de82cfe1f03f63cd0N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:688
    • C:\UserDotYH\xdobsys.exe
      C:\UserDotYH\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZ6M\optidevloc.exe

    Filesize

    2.6MB

    MD5

    7d45de878bbbcf7ae96f6c9fc498440d

    SHA1

    5a2244d3d932bc1cfec40ff54f80f58491cdcac1

    SHA256

    8a33ea4f478c2b84b82f7e93c04e8d06f8dc7f074c947956ab590190bf010ae0

    SHA512

    0dd3a50f7d79600bc78fafb652927e095d14f8b370707eaffb2c884a66630964873e453f64f7ad4b8313f7cc6fcd36746d74ca3213aee9a5c5dd14d49e74c1c1

  • C:\LabZ6M\optidevloc.exe

    Filesize

    2.6MB

    MD5

    798610c6291409c90ccee1d55e24dfe7

    SHA1

    11c708f76f21ee81cd33c4e8e02b2609927f9127

    SHA256

    f5687fde10b704221a291288f40085d433bdaf361557a35a4dcd135b6727b8a8

    SHA512

    b38f5ee6c52d931bb8266287a7df36664de82948909eddd295a9610a54b73b86129ba46ef772da37eb91adf3e271fd81aade292b1e146019eefc943618227a6a

  • C:\UserDotYH\xdobsys.exe

    Filesize

    85KB

    MD5

    150f264deb6be1b19645e09b6dd4fea4

    SHA1

    9916fe51a3354b28021d7155ab3837f6580681f9

    SHA256

    8467379882934997c080fdb9d588e1864dc5704e3c1b5ad7268d99ce768f9423

    SHA512

    6754852fc3454e45a4d2091e8b93f75bf1b35d92ed01022274c2363e88693b0846b5a1f2ffa57e82d96a7e434401e46946dd69762dda418f8feba15fa23b0802

  • C:\UserDotYH\xdobsys.exe

    Filesize

    2.6MB

    MD5

    dd766da571a041e834851b1e153652fc

    SHA1

    743f9c60f22939c4b067406687483e1ba450326b

    SHA256

    76793c46a881d4e196b3bc9150b94b12c47255e56d3924b84a666102742e8a15

    SHA512

    0be1a6134998a275f62f4fb81743aff8cd2954dcbf47552fc896e70aee2e75f569f78aa458e63111574f7ff0815592a15d2cd2722c16196d7d041292fde34a0d

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    205B

    MD5

    f64ce69f05526dc22fcfcf895b18dc8a

    SHA1

    13aff03c539be7e9a70c9505884af759e02830ee

    SHA256

    8872f24385ce196ebf7c939d45a7b0a769cc76eefb41c791fa9473d4b2868ba9

    SHA512

    3099ad5b95e6efec304fb47fca5d7e122cf103cf3e59a31abd91881aa5cfdcc78a588ddb4c34dfa1542fcfeccb2c1a3e0f80494aa7f4e36e14c309bcd6190082

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    173B

    MD5

    e532085f840ce20559c93cc40abfacd9

    SHA1

    28c0f5066cf945adebceddc503e54d71413b79c1

    SHA256

    a047613406ce31b6d60ac8116a6da81fbbeb46b9bd2b51a7714a3881713cfcba

    SHA512

    15dadb9bb1241fd330b44b58c89af5db881d9f6abb3c12b8adce5f16bff1029fe850d2151348d15f2f5ee75a9f1e903e20049c62d915870f9d5aa1bfa403cc2b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

    Filesize

    2.6MB

    MD5

    8d40f260ff2425ee27987990cf9254c3

    SHA1

    7b107555ae53a969ecf7fa6840f33ce43d26c505

    SHA256

    9a014c72ff1e5a618557fdc29ef88833c3208b5e2e3726bee963412e6971672f

    SHA512

    058f6d47523020f8552e65e30dbc72d64bc7e0568285064f6f4dcb76475e72ec23b275e46e08a8f56435ef3fd0ed41a618794f15bcc4d2db954a9ddbe4ec8c98