Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe
Resource
win10v2004-20240802-en
General
-
Target
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe
-
Size
2.6MB
-
MD5
abafae1dee331923326e1062c9e21a26
-
SHA1
2f5f722053e6889085d1e6b0ac270dd7d37bb560
-
SHA256
6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb
-
SHA512
b5667d92e2f8381e8c3f3fbaca50c11b844488155ab7afea16bb0f4e817edc711cf19ae95a3a25bfe2bfcfff4fb1cc1dcb7fb0d607524d315c14a38940446f82
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUpsb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe -
Executes dropped EXE 2 IoCs
pid Process 3076 locdevdob.exe 3940 xbodsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvL5\\xbodsys.exe" 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ1D\\dobdevloc.exe" 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locdevdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe 3076 locdevdob.exe 3076 locdevdob.exe 3940 xbodsys.exe 3940 xbodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5020 wrote to memory of 3076 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 86 PID 5020 wrote to memory of 3076 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 86 PID 5020 wrote to memory of 3076 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 86 PID 5020 wrote to memory of 3940 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 87 PID 5020 wrote to memory of 3940 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 87 PID 5020 wrote to memory of 3940 5020 6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe"C:\Users\Admin\AppData\Local\Temp\6d636b00adca163d858e5df82cd38bb0cd0f1ef36232576ea5fe7bb8e4e9adeb.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\SysDrvL5\xbodsys.exeC:\SysDrvL5\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5da2155a00d45ef3b06ef3e9f5eafba83
SHA185156126c650b3d0e3ec5b6043fd8a864a508c70
SHA25603f237b0ac827473c117a9a674cd58a8cd734b0c06a96d522a6a1b707a860d44
SHA5126c70dba40e93c54b36f305f6f30fa83eee19273dd8b734764646ae6352c6cf52dd8499da6fd9da122f439daf52260742b3696338531ad19544e3f70894559fca
-
Filesize
1.4MB
MD56e964777eab32c940b16bcc65d053cfb
SHA1921ba8a34567b76bfb85534341394e1fae700f7f
SHA25691b0a24d444349a4ef4dda97809a82d7733a51e3f4a7504909a61a62ed339029
SHA5128c71122fecf0ab39cae363dfb976df44eb2e2fc6275362418033c23933a7afc207e1e31b76bbe6e06dd0c6072f6179b1d31573d7ca70b2a2faefe65b3caccda1
-
Filesize
2.6MB
MD5aecd8ce87d40d2b903ca23995ff69406
SHA1f0577ad9238f833d8bc6389c749ea6d069e8b84f
SHA256a6838d00e8600cab7d0b050e6f1b6698c65f04737ae3ca09f1fc9e6ee708f592
SHA51247d07e055bcc9f171ac465e5cd0bb6001542f321da928bf3f9a5d3aae0ed7d8e67d25cc995fd1cf6d79f27625b7fa53cf2b20de42dc13e2c7e0f6e85ab2001bc
-
Filesize
205B
MD5830d676fe2409bb09b612db3b2171f22
SHA1a715326898272fb10c352420cdfbc0a946f47240
SHA2567d43f9cc6eb58e36c315c06c3567fcf4931ef4c1f03137adafa3a3d7bc7dcd65
SHA512b19059318687a7c74585896a68e3c657c0e1771adabb7c381ece34b30f74176c7d5f5b7aa10314c8221ed9ed1255a8b6e81d1bac86192d55d3a8049ac22f1313
-
Filesize
173B
MD590a56dc41383a11ee0a95b11abb1dc72
SHA13c81526f1b494ba38663e7d2d9a6cc04a83ab856
SHA256838366ca5bd866a9c9f47dc4bb044b81b829cf3a98bab13404cfbbd17bc8a39c
SHA51250c3a41d27cbff77cf700fd5ead151b1a88d579e9614ab85c5da0bbae47e452bffb13d9434e94b312960ab32dba2c82a2f475cb0603be7aaf3bf9d4824cb79ce
-
Filesize
2.6MB
MD5cd9e89c1b7ed8ab3fde8f035729b094a
SHA12c31bbc7197cbea92ce1c135edadfd39bc289316
SHA25625bad5de4a7e7afe44fbb0992c842150b9f7a614d9dd6ebc48764dd36a902507
SHA51226ddf08cd795badaa8a48df8bce755e4fe49e8b2d308d1ed82615f85e5019d75a57d8464530778987cbb148bb2e1c88ef4d65c015cc37b88627ce2148f12ebe2