Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 05:42

General

  • Target

    158356ef887e9e9901760c933cd85740N.exe

  • Size

    2.6MB

  • MD5

    158356ef887e9e9901760c933cd85740

  • SHA1

    738d9d49671ca8e88cd4eb6ea2e3ff0b34b37769

  • SHA256

    835de684255c31fb62160d82f1973e49f132a6f4476d055233356db3088aa73e

  • SHA512

    ba11b8d3b1a42c0a5bda0894c7d5e620443eaff5a75497d2f712fa36dde878ba605e14a41404f1f6987d701cf4ebb6ced4de536caae0953f893ccf7ae98b2371

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB6B/bS:sxX7QnxrloE5dpUpBb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158356ef887e9e9901760c933cd85740N.exe
    "C:\Users\Admin\AppData\Local\Temp\158356ef887e9e9901760c933cd85740N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4060
    • C:\UserDotCX\abodsys.exe
      C:\UserDotCX\abodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\GalaxEF\optidevec.exe

    Filesize

    2.6MB

    MD5

    25475ece93964c760d789b98b54f780d

    SHA1

    90ca28dc72f65bda9919b9f285bd002e9db8ab66

    SHA256

    812a676ecfc0bf4055a820c1d14886b402b9eea77986140af47c680806a7e3c3

    SHA512

    fa27c67c58e08ad9b1c9e50189d4842674934fcfc17355ccf8edf7737413ab15b891bf576191e905be1680e33fc331b0b7da6fdca4a6a1b4bc0f9987a11af148

  • C:\GalaxEF\optidevec.exe

    Filesize

    2.6MB

    MD5

    3d0359363343c1e48c78f9a01f86bcfe

    SHA1

    f9c4215fc916f49885aa7602bee073a61d93e01d

    SHA256

    57b136117bfa19659224f7e77408a2487aab3a8c0e76ae7029c7257be237dced

    SHA512

    1ba08b0301c16e9070cf6054f3417e5956f9676c5e07acd9f36d074a9779e417239134e4c49a9d2b90b3f2dc6911505a22d1174e2efcefe05b44207f78df353d

  • C:\UserDotCX\abodsys.exe

    Filesize

    987KB

    MD5

    aaa99fb767f59055899588f9f04fad5e

    SHA1

    719d21725a8b7448659c8683affaf94bf3cc0d1e

    SHA256

    381bc3421af97a8b1b680d5a2e5d94cb0713a5647c4738086f44b8e570dee94a

    SHA512

    e2742e517bebcfe80d2401505a0494531101761bdc06e184bf0173d24e3ab7e6cee823bfe1fd22b8eb431ae1a3b783387d1da427c9a672bee8e03e782302f92a

  • C:\UserDotCX\abodsys.exe

    Filesize

    2.6MB

    MD5

    a201f310df9f042736da545b2aa0598e

    SHA1

    ff67156f32d67bc9e8a1562b91a4e0cf3ad4d5aa

    SHA256

    0d3e6e144f8f42cf9ae83b0a280e7285f6d6dac61eebacbbcec8f01da061cd8b

    SHA512

    46ff4e28418d23440f47fe76d2606143dfc7303e247769778ff18b2a3d40f0d0b34709debd091ce86fe7be12e3a41b2d423880fc3fe3557ae06a78d5c7ad25be

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    205B

    MD5

    9b6be05515d1ef63edcc6d9c87b2b868

    SHA1

    9ee6a6cab1e325c97ab3b532d1ace6b252a6fccb

    SHA256

    7b96723858f0772367e5ab93901a3b451ddc60f7e127294e06827c820a00825d

    SHA512

    79632b0043a045f1fd4cdd970d2d09230c18d0096b4c25c44839d6a26438a7fb727aff9b1e90002a0a9cf512a45e0cfa51d5aa603b248024dd02f8f932b94f2f

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    173B

    MD5

    58dba994fc3bb98fa1cb4e589f95a9f7

    SHA1

    7003b617d0c500cba795e84eae5ee41bbedbb6d4

    SHA256

    1b26509348fd1d7506de5bed0687f982bda5a91fed874d5eb94afbfa8e4b1824

    SHA512

    dd0ee08e04ddbef18c0df438054fcdcc783c722b3d4a6cade7cc4e721aee140c0ed6d47c2393f03bd72f437a3938c5fbfd6f6c6479450e807332e9d2d4f6b48e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxdob.exe

    Filesize

    2.6MB

    MD5

    bba1b7f92f89e62c8246ed80a67da989

    SHA1

    4343795d63cbd5f33aa0c8b03a65089af7cee269

    SHA256

    446b9f353e4a953b2eba75a56614806e9193bc4c7e65e962b2becb88a5ffe946

    SHA512

    0ebc15138c322b33f1e75ff5bb589f4b300127b8f842b786d6c8cb74c0074c70ba2a9fdb1240266804e228605b8225ddb526f4ec392aeb762237f251fbc4d2e8