Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
01d493e7415a82b5a64160b87211f910N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01d493e7415a82b5a64160b87211f910N.exe
Resource
win10v2004-20240802-en
General
-
Target
01d493e7415a82b5a64160b87211f910N.exe
-
Size
2.6MB
-
MD5
01d493e7415a82b5a64160b87211f910
-
SHA1
f78e6f1a77993fe37b4fa697c55052e1673e641c
-
SHA256
2f449deb736202e157a39a58813c88dcd28382db43e325391b5cad190fbd132b
-
SHA512
aabd323df5fe5afb83440d9cefa2240d901b7e15360e70d74f9c1996e5662f5054354a7a766932c931174317c47bbcde1ad65d84b5d16f599c332dd6918c4749
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBWB/bS:sxX7QnxrloE5dpUpNb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 01d493e7415a82b5a64160b87211f910N.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 locxbod.exe 2784 xbodec.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 01d493e7415a82b5a64160b87211f910N.exe 2248 01d493e7415a82b5a64160b87211f910N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesN8\\xbodec.exe" 01d493e7415a82b5a64160b87211f910N.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidGM\\bodxsys.exe" 01d493e7415a82b5a64160b87211f910N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01d493e7415a82b5a64160b87211f910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 01d493e7415a82b5a64160b87211f910N.exe 2248 01d493e7415a82b5a64160b87211f910N.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe 2772 locxbod.exe 2784 xbodec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2772 2248 01d493e7415a82b5a64160b87211f910N.exe 30 PID 2248 wrote to memory of 2772 2248 01d493e7415a82b5a64160b87211f910N.exe 30 PID 2248 wrote to memory of 2772 2248 01d493e7415a82b5a64160b87211f910N.exe 30 PID 2248 wrote to memory of 2772 2248 01d493e7415a82b5a64160b87211f910N.exe 30 PID 2248 wrote to memory of 2784 2248 01d493e7415a82b5a64160b87211f910N.exe 31 PID 2248 wrote to memory of 2784 2248 01d493e7415a82b5a64160b87211f910N.exe 31 PID 2248 wrote to memory of 2784 2248 01d493e7415a82b5a64160b87211f910N.exe 31 PID 2248 wrote to memory of 2784 2248 01d493e7415a82b5a64160b87211f910N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe"C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\FilesN8\xbodec.exeC:\FilesN8\xbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a106ef989d435e82a2e95b5f3279c401
SHA12b20519be9c243e4a85a5273c05f51189efa683c
SHA256051a9e1e8b2d55aeafff60b33ff602323fb8569390458241ee9264ea702da926
SHA51276b659a5418337fcfad294528ce21fe85ee57bf1eafe945660f2877d3251ca10530d874dda8a5aeeb4fc8fd9b9627480c0a4c548c7805c5b21d9c2a8366bbb2b
-
Filesize
166B
MD54ced9b5e7d3b6712ba90b9dcffae1be9
SHA133658946d704c6a4057184e8d45a3b1d1d130ff9
SHA256b6669ba1d1f4020679f73703fb8c3b84209d271d650caf8bfa9d91d6c75232a1
SHA51212c9d2c35f2082c48922b6c44b7a7ee23bd0ce5c4fc055868f56e016908a6dd1c4479b67147f8c648a9761a53376588fe11196535c206f10bbe67911947709ab
-
Filesize
198B
MD53bdd233ad55970870e9526e0ec28249c
SHA1390c909a85d05e249f61e1738b2f8e615f338ef3
SHA25676d45398a291a56124cbc4718b0ee50139e5c9b6ab63217bc2353cd59d5b4026
SHA512a5be11481c22969b631fa2a517c60ab1fd82666d1f02a2bc1e461af38a84c6fa0bc748e605c3dfb550ff49659ebc5be8e2c6c13ad6b84b8155223349f54a7ee1
-
Filesize
2.6MB
MD5582f0f2a7620d73f5fa3bb3f4194835e
SHA1dc8863bcf7dea51a821d087836cde8945996c847
SHA2562f131d95aed20ad271d772df6f5abffc214435283fe7f62c7e407e088b0d1cda
SHA512a88a0bf6c72fb914de046f5a840b51e436dfd73afd36f5acdd76e471ffdaf8a6450574a65596ab5e0075d36da1b2798c5ef0bee7a70937bdb435f11756cdbae3
-
Filesize
2.6MB
MD58b4dc62e8f9f9953c2c05b460342ae32
SHA1d69d861c7d4b765c65473916f19c4d2d5569d6bb
SHA2564f17b083049f48b3ab7e522faa5addf78977f5625b797b988618a738e0854213
SHA512dfaa0bc4f47e8177dce5a8cfb027d5a1b39268c5b1b03851d33ee193b0d27e29efc8b5451a9b244e0e9a68b0e92e64dde13ada44fde32e8f6c10f5ac72db6766
-
Filesize
2.6MB
MD53a7c653deceeccce8942da821a05c13a
SHA1f3f1ebb783ee45ae17c8f708ea8ddde16b05a6bf
SHA256f454aaf9020ca803b4f241594230ad290c9adc2fb7e577186e27fd9fd5086235
SHA5128b1ed9b05f7abb9e610901cb982080b388c1db89c53b86cc7566cf0a0a92f4698cbf843da3d8afaf9d591e29acd0d5d74c1cd79f926375c4bcf699321cdcd291