Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 10:30

General

  • Target

    b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe

  • Size

    2.6MB

  • MD5

    4be4cf1d7701bb2a386c452ec9577130

  • SHA1

    5d6cccb56d87dbafcff675f88328f0990f7efee4

  • SHA256

    b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1

  • SHA512

    6f8c709d8fd57295ab94571163f24180ffb73e727e6db918ecd02bc144000127d2fd4adfa030a31fbddbf5c692e68d8e48256f41f78fcacd3e06b380b5343d01

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LByB/bS:sxX7QnxrloE5dpUpxb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe
    "C:\Users\Admin\AppData\Local\Temp\b5a6c06aef9a854803c89f08624cf3e71c68df02c166299dd8fd14f3ffe622c1N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2508
    • C:\SysDrvQ7\abodloc.exe
      C:\SysDrvQ7\abodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZRH\optixloc.exe

    Filesize

    2.6MB

    MD5

    a0c0a0eb3163c7a7190129acb2320bdb

    SHA1

    a48109c2e9973c7efc18a3d9883bc3f33234743e

    SHA256

    33be630f628c9bc7a763435fdcd4e17e2e1cc295a58c513eb21acff0748756af

    SHA512

    105d25c6a62053cd8198996da5be0cc4b491852d205a3ae9fab72c58cecf3bb4aef84d0156dd81a449d2d57ec5c407de7470a6cc9e3732dbacf03bd5b3ee79a4

  • C:\LabZRH\optixloc.exe

    Filesize

    693KB

    MD5

    e3c9ac9a2da1e326be73a2aa841da884

    SHA1

    e505567b91fd8ba136d127becb00ed80ae6aa044

    SHA256

    61057e088c9468bc7c8469f640aba0dd32d6878b00c34b146621ec6635ead683

    SHA512

    109f5fca5e095c59265dcb8c3e64de5c66c6684a8b8df6e537850e7c105bcb075f86ce40bdb259568a8bff6b0804dbbba2e3c0edc24cf3e6550fe1dff917e7be

  • C:\SysDrvQ7\abodloc.exe

    Filesize

    2.6MB

    MD5

    7d61d6a69bcfeb97be1c0c6e1395ba9b

    SHA1

    0f59dbe6f66f5e4f0189f9a0267e7f6032e19152

    SHA256

    f5915238e6043c64689766df7a02c255cff4510ab682b84d421ca234dd8d68b5

    SHA512

    f6fe52176b6b3fccdb691a8577e5776e34708de816a3423c0dee3951de6191105f5108f832e61dc15ee9f596c4a3726bc347195130065ace6dbc049f12cce778

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    201B

    MD5

    240efbf74dfda21dd3aebb3e8d349b62

    SHA1

    8924b8bd737c4a75cfa73738fe76e63862bda40f

    SHA256

    ec4121bc08693da5e0238c932f11c50bd797b211d4d9c42d9a836fa3536099e8

    SHA512

    9bce167b905cefdc3e965c8858138c39b3562f41bd395ff149f883968e830ec019584e09985eea848b04ed8c5533e56c5560782370f231a08ddeb2f07d3677ed

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    169B

    MD5

    dc1f0e7eecc185b1e94c3cd75d5db4df

    SHA1

    c7507c5bcdbb85e4c550d2109abec0e5da53787f

    SHA256

    4e4128c604208368d69b41017bd16f04eca1876cff6feb2067baa166f67eabf5

    SHA512

    742fb5eb623b048adc4dd18dd2bc2ffabfae04578bebaba26666c0fe1ec87bb4ef88c1cd26a3bf3d1dca9943d47c64800d01fd0dd5020fc7c780505c569e52a0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe

    Filesize

    2.6MB

    MD5

    f98a1fc8470f9b787b7c3a907c8f5af5

    SHA1

    5b3417d3a653df043073141e2b1cae3b0ac4eac5

    SHA256

    2fb62f24d8a09e95bfd790c6551fe8a042bcc80c721ece0e57685974a4c31f64

    SHA512

    3581c80685290085df8e43e3248737888fc43e25ba73c0fc8b294c7aa809e5bfc4d7166b7e489e10a1ca1eead5104707e3babfc3e0d6530fd9baf6ee7bf3ee79