Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
db305c5e63771a6de82cfe1f03f63cd0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
db305c5e63771a6de82cfe1f03f63cd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
db305c5e63771a6de82cfe1f03f63cd0N.exe
-
Size
2.6MB
-
MD5
db305c5e63771a6de82cfe1f03f63cd0
-
SHA1
2145c8dc8ad229d58388c6b90d36f3d9a6e1d993
-
SHA256
02430579ff8ce98e0473e809b160cf838ea80f88ac3dadec59ce432e4d467a8c
-
SHA512
3b0415bee9974a92b5e6ed84329195e38441076e167f6a0bedc3b66f45bb2c338edf3c5793dcc9d47e9bb3af00d11e13fb3dde6e0f5a91e7854e64ab3a16db9b
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBlB/bS:sxX7QnxrloE5dpUpCb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe db305c5e63771a6de82cfe1f03f63cd0N.exe -
Executes dropped EXE 2 IoCs
pid Process 688 locabod.exe 4916 xdobsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotYH\\xdobsys.exe" db305c5e63771a6de82cfe1f03f63cd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ6M\\optidevloc.exe" db305c5e63771a6de82cfe1f03f63cd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db305c5e63771a6de82cfe1f03f63cd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe 688 locabod.exe 688 locabod.exe 4916 xdobsys.exe 4916 xdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3812 wrote to memory of 688 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 89 PID 3812 wrote to memory of 688 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 89 PID 3812 wrote to memory of 688 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 89 PID 3812 wrote to memory of 4916 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 92 PID 3812 wrote to memory of 4916 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 92 PID 3812 wrote to memory of 4916 3812 db305c5e63771a6de82cfe1f03f63cd0N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\db305c5e63771a6de82cfe1f03f63cd0N.exe"C:\Users\Admin\AppData\Local\Temp\db305c5e63771a6de82cfe1f03f63cd0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\UserDotYH\xdobsys.exeC:\UserDotYH\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57d45de878bbbcf7ae96f6c9fc498440d
SHA15a2244d3d932bc1cfec40ff54f80f58491cdcac1
SHA2568a33ea4f478c2b84b82f7e93c04e8d06f8dc7f074c947956ab590190bf010ae0
SHA5120dd3a50f7d79600bc78fafb652927e095d14f8b370707eaffb2c884a66630964873e453f64f7ad4b8313f7cc6fcd36746d74ca3213aee9a5c5dd14d49e74c1c1
-
Filesize
2.6MB
MD5798610c6291409c90ccee1d55e24dfe7
SHA111c708f76f21ee81cd33c4e8e02b2609927f9127
SHA256f5687fde10b704221a291288f40085d433bdaf361557a35a4dcd135b6727b8a8
SHA512b38f5ee6c52d931bb8266287a7df36664de82948909eddd295a9610a54b73b86129ba46ef772da37eb91adf3e271fd81aade292b1e146019eefc943618227a6a
-
Filesize
85KB
MD5150f264deb6be1b19645e09b6dd4fea4
SHA19916fe51a3354b28021d7155ab3837f6580681f9
SHA2568467379882934997c080fdb9d588e1864dc5704e3c1b5ad7268d99ce768f9423
SHA5126754852fc3454e45a4d2091e8b93f75bf1b35d92ed01022274c2363e88693b0846b5a1f2ffa57e82d96a7e434401e46946dd69762dda418f8feba15fa23b0802
-
Filesize
2.6MB
MD5dd766da571a041e834851b1e153652fc
SHA1743f9c60f22939c4b067406687483e1ba450326b
SHA25676793c46a881d4e196b3bc9150b94b12c47255e56d3924b84a666102742e8a15
SHA5120be1a6134998a275f62f4fb81743aff8cd2954dcbf47552fc896e70aee2e75f569f78aa458e63111574f7ff0815592a15d2cd2722c16196d7d041292fde34a0d
-
Filesize
205B
MD5f64ce69f05526dc22fcfcf895b18dc8a
SHA113aff03c539be7e9a70c9505884af759e02830ee
SHA2568872f24385ce196ebf7c939d45a7b0a769cc76eefb41c791fa9473d4b2868ba9
SHA5123099ad5b95e6efec304fb47fca5d7e122cf103cf3e59a31abd91881aa5cfdcc78a588ddb4c34dfa1542fcfeccb2c1a3e0f80494aa7f4e36e14c309bcd6190082
-
Filesize
173B
MD5e532085f840ce20559c93cc40abfacd9
SHA128c0f5066cf945adebceddc503e54d71413b79c1
SHA256a047613406ce31b6d60ac8116a6da81fbbeb46b9bd2b51a7714a3881713cfcba
SHA51215dadb9bb1241fd330b44b58c89af5db881d9f6abb3c12b8adce5f16bff1029fe850d2151348d15f2f5ee75a9f1e903e20049c62d915870f9d5aa1bfa403cc2b
-
Filesize
2.6MB
MD58d40f260ff2425ee27987990cf9254c3
SHA17b107555ae53a969ecf7fa6840f33ce43d26c505
SHA2569a014c72ff1e5a618557fdc29ef88833c3208b5e2e3726bee963412e6971672f
SHA512058f6d47523020f8552e65e30dbc72d64bc7e0568285064f6f4dcb76475e72ec23b275e46e08a8f56435ef3fd0ed41a618794f15bcc4d2db954a9ddbe4ec8c98