Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe
Resource
win10v2004-20240802-en
General
-
Target
548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe
-
Size
2.6MB
-
MD5
becef067a84724f23bd4d4697203c4d0
-
SHA1
ceae1f1da1519238f2939c87d757ae4bec2973eb
-
SHA256
548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36
-
SHA512
b15e65f7561759f74169e4d59058e22453db2094e7d63f8a0318f146eb378ab5f5c10626c52db5bf66f0fbba0f0ec2f0804b6fc131eea3b00d290ae3620100c9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBDB/bS:sxX7QnxrloE5dpUpkb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 locxopti.exe 2796 devbodloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeUQ\\devbodloc.exe" 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBPR\\dobxec.exe" 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe 2828 locxopti.exe 2796 devbodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2828 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 30 PID 2216 wrote to memory of 2828 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 30 PID 2216 wrote to memory of 2828 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 30 PID 2216 wrote to memory of 2828 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 30 PID 2216 wrote to memory of 2796 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 31 PID 2216 wrote to memory of 2796 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 31 PID 2216 wrote to memory of 2796 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 31 PID 2216 wrote to memory of 2796 2216 548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe"C:\Users\Admin\AppData\Local\Temp\548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\AdobeUQ\devbodloc.exeC:\AdobeUQ\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51e4976dc5e822c0511c7b55950433293
SHA14b5e1b1aa2381f03a3ed01ab4191b2203a5ede3e
SHA2564779333c07f804081d2b9f028d1b93db526e0e4ab58a37e67165d2a0d09f1f44
SHA5128cf1454a9490921bc242a8290c6a832a1a3a166e7f8644d6fc42491797597bf0b3eac519bc93a0e0600c4b6d280ff38b7f978308687d1f393fe1e215e60c418e
-
Filesize
2.6MB
MD5238654861ea847728d85512a7babd514
SHA1fafff92dc3b063566f5d77b704067f1eec631458
SHA256077621c0b2fc4b1ddc8061aae1ae7c7df772b2ef46b54d2349c7474b9e5d9cf8
SHA512f360592ccf92badcda86a0f19857ec13aaae8d279987cda1b02f3d99c3f20853e6033425a391c878925f14469eb06a25954184c0e33286d247f342fa182e5dd0
-
Filesize
2.6MB
MD542e210a899cef8fb1dfd1ed6d2365833
SHA1f7f711b551b8a3d080034d5eb6b8dca7b54dcc4c
SHA256800d2986e2eef00fc92e2b73386452bc6ad43f9d1a7458f4d89e66edd152e23d
SHA51283206924f38a8e29beabdf8b0b0fe29f274d493a47405cca8f691168a42d3fef1bf8a808808d70127d31eb521ca8fa9d946ae37fe882c9b9a238ae45f812cf5c
-
Filesize
170B
MD5f0606d58a0b6b2e2c7332e4fde5229dd
SHA15183fd75d5e2253321c005d5f2259c335512c220
SHA2561d659b391f4cd5c01fa7e32ad709938052c872fe5b5ef482ffcd3584f4821fe6
SHA5127a2edee0147fcb370538e7a3aa433f50810f17fd48f9509dd253a1de6835c1162c2945957c8aeb4acf85589e523a579fc3d7b34780617b768240d15da9d303b0
-
Filesize
202B
MD5cd9e7f00e67b1b70745cc59d40d25542
SHA174ea65b6fb2ea0dc98aa5802826e036b6c772da5
SHA256e3b7c0d8a434e9ecd91820eaea4ef36783e236b72732a15f51edc475c40a9143
SHA512e88b05b8d32c7f4c9f558c925933ade6b3ddc1d657e997850a8c4863d95426c27f88946c610cd9a4a62b1449b22fe98fa588656045303e890f996ceaa0a002c8
-
Filesize
2.6MB
MD5b4191b45fcd3dfd845ea9c51f256a5d6
SHA1ba2771ae107794a33bb1aebc0217911f759a6017
SHA2567b2bfaae49b67064fbd3cd5a476316341e98ab6928bea3d4f07aa42245b64011
SHA512a36d2bf5ddaadb07a13501e754f532a175b3e77bff640b9b1c58cb31d8105dca026aa9f00a3636daf4330aa91d1676219afc37725a47aff36e6e7721b79e5dbe