Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe
Resource
win10v2004-20240802-en
General
-
Target
e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe
-
Size
2.6MB
-
MD5
bc4fad2504660b57b1a9ab066d9dde99
-
SHA1
60d5b00523d70465f0872f06f9f439ef3a0403f2
-
SHA256
e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed
-
SHA512
0be5d3ff70e3d211c522bc61db0fb1a744c2c2ba8ae18afe4f2f7407bbb0e24d59bdaf01c2ae9068601ce25c279e46d55fc5d00911dd0cae25fb8d8dd259565a
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBCB/bS:sxX7QnxrloE5dpUpBb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe -
Executes dropped EXE 2 IoCs
pid Process 2740 locxbod.exe 2384 xoptiec.exe -
Loads dropped DLL 2 IoCs
pid Process 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZW9\\optixsys.exe" e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv0Z\\xoptiec.exe" e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptiec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe 2740 locxbod.exe 2384 xoptiec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2740 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 30 PID 2280 wrote to memory of 2740 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 30 PID 2280 wrote to memory of 2740 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 30 PID 2280 wrote to memory of 2740 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 30 PID 2280 wrote to memory of 2384 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 31 PID 2280 wrote to memory of 2384 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 31 PID 2280 wrote to memory of 2384 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 31 PID 2280 wrote to memory of 2384 2280 e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe"C:\Users\Admin\AppData\Local\Temp\e05f47fdbb956b1308665592dfc689a41fc13f6cbb63042911a66ae99046efed.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\SysDrv0Z\xoptiec.exeC:\SysDrv0Z\xoptiec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD54b15a8dc60fb28ba194308947f8d0bdf
SHA1addcf6f0cc5dc9577f5354dd3efdf91843caddb2
SHA256eeda459c0f86c4f2c639edc7bc26cc6dc4f508b51063a31d85ac8a6f6e64b152
SHA51235c0dcc269feb3a6378ec13dde959d0dbc121e4ec5236b5910536beee95f1128b58b5d7711ee4f05359371d8097a799e57a11fa6b9dbb26c543666dffd669e7e
-
Filesize
14KB
MD5eea4aa3d13cff294fb9de101050d3b95
SHA18be9253d0215e54c585f56eadb2280278a3ef3fa
SHA2564bfbd1374923be20f98b58ddc780be3cd5a3714124580ccf4631700f056077a5
SHA5128793ab23bc508ea67a7d382f851f692b10c6141d6a08aea34676af615c93c597ab6a7bab354d52cfa7c84c568a31eee4521a37ed280aa9a5c1a200be1d176b44
-
Filesize
2.4MB
MD55a32b10707ec758b22876b4cd2bed66c
SHA145d2fb64d977523d3ab76dbef9319d39a3caa135
SHA25616590c90280464c6123c5b443311b7009ad1b5057d1823e698857bbe83d22000
SHA512827b528fbe7ea2d5df114f565b9799e65bc3111a0d79e8f107a9bd4230f4c40b757c3b94c1256f693ab6609217e1479e18bfc8ca9f3e632585c49915bdff0ad4
-
Filesize
170B
MD508b3c81b238487bf632b2b27581454d7
SHA186cfb288312db5f805db349111cc6b9b8f613773
SHA2569a91f94c37cbf60595c7c3636130688c35a1b33408a603d24a646253a8ad936e
SHA512526444076bee1f15db0694e210d88723b982541ff32a983f36da95e1ab91fff76fdb081623d886c16296c2de1f669c4145a0d0206a505fcb9ba8d5186fdcab9e
-
Filesize
202B
MD591a33ffe338b7c95130044154644487d
SHA1ec6c6d3c76db333fdd10c749e739634af0a8cfcb
SHA2568efd50e65c36eab00af8d69d9248011ff7e5a59f9fe0baee8d8a06a371b27bc5
SHA512b5395f27fa3f4ddec6d6bb499cc97e091b1743e8682b270ff57de6c41cc8a0c56b352cb9d4c19f5356e05242444796fe340925cb636cc4db6e2a0946a952d5bc
-
Filesize
2.6MB
MD5abc62caa627a4b0d7ff3dec0533bd3a4
SHA1961eb36e296b3206c9ebde781eadfc431008a697
SHA25632703a8410cb3d9c392e46fdf0bff8871edfed5dd331b09d38be13e4bd9d24af
SHA5125a2bca8efec5170bb0b359ed884e6a53465042c197699eeeddcfa3fe4d92dbf99afd5a70db222a2e3f0519a9ad3a54977fedf6b830582f8c06ded794d72e2547
-
Filesize
2.6MB
MD594ae1d14933683e03a4984e45d407670
SHA13aff2a61bf100bdeec5c465ef1314463921ddec4
SHA256cc16222bd6eeaa252b2205d6ce051753cd0b014efee693f874bb4ba5d4298860
SHA512bc9b28659b2d8ad3c53cd0007b52e7a8e181f24881bd827fa3ca26c1cfb1264a30cd8ff28921d3e608d4ebf18457600a8cdc570d95027ce6e0b72e6e30f75932