Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 01:45 UTC

General

  • Target

    855dcca669144d13c8b07ea5bbfd6760N.exe

  • Size

    2.6MB

  • MD5

    855dcca669144d13c8b07ea5bbfd6760

  • SHA1

    0d0350a79c13baacdf1bbf05ffdf0573692a45fc

  • SHA256

    cb709e197edd5aaaeb940f757f8bb7e23a0b1e11d5e34561200b38635b0bddea

  • SHA512

    81053959908c5d6b20f21cbd2063c9017cc4b4af1a8065b9a150bf87f4a8d4e0e010321621dc6ac09863f1f38778c6fcb30be32432a6403982661a54fef7036f

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB2B/bS:sxX7QnxrloE5dpUpdb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\855dcca669144d13c8b07ea5bbfd6760N.exe
    "C:\Users\Admin\AppData\Local\Temp\855dcca669144d13c8b07ea5bbfd6760N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2440
    • C:\IntelprocYG\abodec.exe
      C:\IntelprocYG\abodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Galax44\dobaec.exe

    Filesize

    2.6MB

    MD5

    a1118f0d75e30a40ffbeaa12015fb240

    SHA1

    88a93969373840f6c72880eb96da2c2c67e9aaf4

    SHA256

    38cffa408d9470a5b06af579be2294498b87ba311d8d91b5f5925203ecaa7231

    SHA512

    8b03bd3f47b370da80d6ee2bd68cd21fcf18a007602b5c496ed65b73e1b70865d2d31c4814c5b7da2fa6b6f2ea586eab8b068c872474786fab3cd806aab29e85

  • C:\Galax44\dobaec.exe

    Filesize

    2.6MB

    MD5

    d34e11675ac41098389140fd19e9cf30

    SHA1

    33d2adaeb8d8e77f1592beb9c5241d6da432fbf6

    SHA256

    63c1333ec68452826b1ed3801f7e453c4d098c3eb33a6329208c8c9bcb7a2db7

    SHA512

    5b5f7ee84ffbaf8d7900662bc586c46182ff0324a411432c3ad0141c2099acd8a5d4e9e9bddd4ce493ebc8df526a7d764247e7e00717d726cdbbd40b83c2b9e7

  • C:\IntelprocYG\abodec.exe

    Filesize

    69KB

    MD5

    aecc98b37d7f490adb3a54862b96df3e

    SHA1

    42f7ace5f99889bbbe721c5abdd736a72bdc54c5

    SHA256

    c19873eafd6b127da338fbb8e5ac49eb9fd2d6f976d053cea6ff021fba3eb459

    SHA512

    77a1ba45d06b3f2c569a5b77e519ae088133d115c0224924d8dd666cb850682079a706b885395bf48f7d76039310165ee9cebe3eebb6b6058d422545eedb382f

  • C:\IntelprocYG\abodec.exe

    Filesize

    2.6MB

    MD5

    28434db2d2df4d405e1e9d2b2c5dae33

    SHA1

    500e5d6ebdfac120d94255710da32d486ca74b33

    SHA256

    05ba80c1091cedbbba076f1e1d104d0b4f8794d9d909b71e2aa1376b0bc6161d

    SHA512

    fb7f7ff5987526a3c307127867d2b459d3181ede3a0f15f51c808e7865a6380112e3f31dd550dfd5c677a756d7a46fd83d903e37c4623793363ff76fa1446a7a

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    171B

    MD5

    1cf2a0f69312637c1370f53220cc35c7

    SHA1

    91701558ae0b57b7b5f47ecd4a45c39b75998711

    SHA256

    068581361f92c616e7f7de5f864a52ecf6570bce5de32019135a5e236127c8c3

    SHA512

    b6085e78a2ef5c54bc219033626b6668620ab2595a8214238b3ca7bd5b2f190449653b391e05631872fee27d52f3ce0c3e48dca6f4b15fae2cab7f3eac0120d0

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    203B

    MD5

    c14f118cc79831419a9de19ba9c0051a

    SHA1

    e7e412418c2b9bbd5cbeadf237926c784bfce53a

    SHA256

    f6ce17908c2c5afb1c0405a65b3cff0558d172e91b7706fa355a3feb29ebf9a8

    SHA512

    bf600b3a33fbe12103ca6e7cb945da4246abfab0097a6eaffbf2fca191674ecb5bf694274c88995ac06fe8a76da2c2287b91b6812bc522e98801178bf8abc1ed

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

    Filesize

    2.6MB

    MD5

    783baafef436fe35a77748f53c029a2d

    SHA1

    cfc06f708055faa1ff42ae98d01c069bba38c2d4

    SHA256

    dcf5d33d9696f69166bf7fd8a8b5f42b07cceee991308f1c85bb8f7b564c2ef8

    SHA512

    b9a51f664069f71bc5abeed3663e31e528d68e9b711fa6487b65ff34dcd33244e3c6fee62e2396aefb88993f3960bdefaf05e216fbf3b280062ab607c4482a6b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.