Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 12:42

General

  • Target

    01d493e7415a82b5a64160b87211f910N.exe

  • Size

    2.6MB

  • MD5

    01d493e7415a82b5a64160b87211f910

  • SHA1

    f78e6f1a77993fe37b4fa697c55052e1673e641c

  • SHA256

    2f449deb736202e157a39a58813c88dcd28382db43e325391b5cad190fbd132b

  • SHA512

    aabd323df5fe5afb83440d9cefa2240d901b7e15360e70d74f9c1996e5662f5054354a7a766932c931174317c47bbcde1ad65d84b5d16f599c332dd6918c4749

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBWB/bS:sxX7QnxrloE5dpUpNb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe
    "C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2772
    • C:\FilesN8\xbodec.exe
      C:\FilesN8\xbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesN8\xbodec.exe

    Filesize

    2.6MB

    MD5

    a106ef989d435e82a2e95b5f3279c401

    SHA1

    2b20519be9c243e4a85a5273c05f51189efa683c

    SHA256

    051a9e1e8b2d55aeafff60b33ff602323fb8569390458241ee9264ea702da926

    SHA512

    76b659a5418337fcfad294528ce21fe85ee57bf1eafe945660f2877d3251ca10530d874dda8a5aeeb4fc8fd9b9627480c0a4c548c7805c5b21d9c2a8366bbb2b

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    166B

    MD5

    4ced9b5e7d3b6712ba90b9dcffae1be9

    SHA1

    33658946d704c6a4057184e8d45a3b1d1d130ff9

    SHA256

    b6669ba1d1f4020679f73703fb8c3b84209d271d650caf8bfa9d91d6c75232a1

    SHA512

    12c9d2c35f2082c48922b6c44b7a7ee23bd0ce5c4fc055868f56e016908a6dd1c4479b67147f8c648a9761a53376588fe11196535c206f10bbe67911947709ab

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    198B

    MD5

    3bdd233ad55970870e9526e0ec28249c

    SHA1

    390c909a85d05e249f61e1738b2f8e615f338ef3

    SHA256

    76d45398a291a56124cbc4718b0ee50139e5c9b6ab63217bc2353cd59d5b4026

    SHA512

    a5be11481c22969b631fa2a517c60ab1fd82666d1f02a2bc1e461af38a84c6fa0bc748e605c3dfb550ff49659ebc5be8e2c6c13ad6b84b8155223349f54a7ee1

  • C:\VidGM\bodxsys.exe

    Filesize

    2.6MB

    MD5

    582f0f2a7620d73f5fa3bb3f4194835e

    SHA1

    dc8863bcf7dea51a821d087836cde8945996c847

    SHA256

    2f131d95aed20ad271d772df6f5abffc214435283fe7f62c7e407e088b0d1cda

    SHA512

    a88a0bf6c72fb914de046f5a840b51e436dfd73afd36f5acdd76e471ffdaf8a6450574a65596ab5e0075d36da1b2798c5ef0bee7a70937bdb435f11756cdbae3

  • C:\VidGM\bodxsys.exe

    Filesize

    2.6MB

    MD5

    8b4dc62e8f9f9953c2c05b460342ae32

    SHA1

    d69d861c7d4b765c65473916f19c4d2d5569d6bb

    SHA256

    4f17b083049f48b3ab7e522faa5addf78977f5625b797b988618a738e0854213

    SHA512

    dfaa0bc4f47e8177dce5a8cfb027d5a1b39268c5b1b03851d33ee193b0d27e29efc8b5451a9b244e0e9a68b0e92e64dde13ada44fde32e8f6c10f5ac72db6766

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

    Filesize

    2.6MB

    MD5

    3a7c653deceeccce8942da821a05c13a

    SHA1

    f3f1ebb783ee45ae17c8f708ea8ddde16b05a6bf

    SHA256

    f454aaf9020ca803b4f241594230ad290c9adc2fb7e577186e27fd9fd5086235

    SHA512

    8b1ed9b05f7abb9e610901cb982080b388c1db89c53b86cc7566cf0a0a92f4698cbf843da3d8afaf9d591e29acd0d5d74c1cd79f926375c4bcf699321cdcd291