Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 10:56

General

  • Target

    e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe

  • Size

    2.6MB

  • MD5

    bc4fad2504660b57b1a9ab066d9dde99

  • SHA1

    60d5b00523d70465f0872f06f9f439ef3a0403f2

  • SHA256

    e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed

  • SHA512

    0be5d3ff70e3d211c522bc61db0fb1a744c2c2ba8ae18afe4f2f7407bbb0e24d59bdaf01c2ae9068601ce25c279e46d55fc5d00911dd0cae25fb8d8dd259565a

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBCB/bS:sxX7QnxrloE5dpUpBb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe
    "C:\Users\Admin\AppData\Local\Temp\e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2740
    • C:\SysDrv0Z\xoptiec.exe
      C:\SysDrv0Z\xoptiec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZW9\optixsys.exe

    Filesize

    11KB

    MD5

    4b15a8dc60fb28ba194308947f8d0bdf

    SHA1

    addcf6f0cc5dc9577f5354dd3efdf91843caddb2

    SHA256

    eeda459c0f86c4f2c639edc7bc26cc6dc4f508b51063a31d85ac8a6f6e64b152

    SHA512

    35c0dcc269feb3a6378ec13dde959d0dbc121e4ec5236b5910536beee95f1128b58b5d7711ee4f05359371d8097a799e57a11fa6b9dbb26c543666dffd669e7e

  • C:\LabZW9\optixsys.exe

    Filesize

    14KB

    MD5

    eea4aa3d13cff294fb9de101050d3b95

    SHA1

    8be9253d0215e54c585f56eadb2280278a3ef3fa

    SHA256

    4bfbd1374923be20f98b58ddc780be3cd5a3714124580ccf4631700f056077a5

    SHA512

    8793ab23bc508ea67a7d382f851f692b10c6141d6a08aea34676af615c93c597ab6a7bab354d52cfa7c84c568a31eee4521a37ed280aa9a5c1a200be1d176b44

  • C:\SysDrv0Z\xoptiec.exe

    Filesize

    2.4MB

    MD5

    5a32b10707ec758b22876b4cd2bed66c

    SHA1

    45d2fb64d977523d3ab76dbef9319d39a3caa135

    SHA256

    16590c90280464c6123c5b443311b7009ad1b5057d1823e698857bbe83d22000

    SHA512

    827b528fbe7ea2d5df114f565b9799e65bc3111a0d79e8f107a9bd4230f4c40b757c3b94c1256f693ab6609217e1479e18bfc8ca9f3e632585c49915bdff0ad4

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    08b3c81b238487bf632b2b27581454d7

    SHA1

    86cfb288312db5f805db349111cc6b9b8f613773

    SHA256

    9a91f94c37cbf60595c7c3636130688c35a1b33408a603d24a646253a8ad936e

    SHA512

    526444076bee1f15db0694e210d88723b982541ff32a983f36da95e1ab91fff76fdb081623d886c16296c2de1f669c4145a0d0206a505fcb9ba8d5186fdcab9e

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    91a33ffe338b7c95130044154644487d

    SHA1

    ec6c6d3c76db333fdd10c749e739634af0a8cfcb

    SHA256

    8efd50e65c36eab00af8d69d9248011ff7e5a59f9fe0baee8d8a06a371b27bc5

    SHA512

    b5395f27fa3f4ddec6d6bb499cc97e091b1743e8682b270ff57de6c41cc8a0c56b352cb9d4c19f5356e05242444796fe340925cb636cc4db6e2a0946a952d5bc

  • \SysDrv0Z\xoptiec.exe

    Filesize

    2.6MB

    MD5

    abc62caa627a4b0d7ff3dec0533bd3a4

    SHA1

    961eb36e296b3206c9ebde781eadfc431008a697

    SHA256

    32703a8410cb3d9c392e46fdf0bff8871edfed5dd331b09d38be13e4bd9d24af

    SHA512

    5a2bca8efec5170bb0b359ed884e6a53465042c197699eeeddcfa3fe4d92dbf99afd5a70db222a2e3f0519a9ad3a54977fedf6b830582f8c06ded794d72e2547

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

    Filesize

    2.6MB

    MD5

    94ae1d14933683e03a4984e45d407670

    SHA1

    3aff2a61bf100bdeec5c465ef1314463921ddec4

    SHA256

    cc16222bd6eeaa252b2205d6ce051753cd0b014efee693f874bb4ba5d4298860

    SHA512

    bc9b28659b2d8ad3c53cd0007b52e7a8e181f24881bd827fa3ca26c1cfb1264a30cd8ff28921d3e608d4ebf18457600a8cdc570d95027ce6e0b72e6e30f75932