Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 19:46

General

  • Target

    548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe

  • Size

    2.6MB

  • MD5

    becef067a84724f23bd4d4697203c4d0

  • SHA1

    ceae1f1da1519238f2939c87d757ae4bec2973eb

  • SHA256

    548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36

  • SHA512

    b15e65f7561759f74169e4d59058e22453db2094e7d63f8a0318f146eb378ab5f5c10626c52db5bf66f0fbba0f0ec2f0804b6fc131eea3b00d290ae3620100c9

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBDB/bS:sxX7QnxrloE5dpUpkb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe
    "C:\Users\Admin\AppData\Local\Temp\548be8b074415e8bb93f69a3b0f0c269ef82b7fb98f148d6cf6179809e10bc36N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2828
    • C:\AdobeUQ\devbodloc.exe
      C:\AdobeUQ\devbodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AdobeUQ\devbodloc.exe

    Filesize

    2.6MB

    MD5

    1e4976dc5e822c0511c7b55950433293

    SHA1

    4b5e1b1aa2381f03a3ed01ab4191b2203a5ede3e

    SHA256

    4779333c07f804081d2b9f028d1b93db526e0e4ab58a37e67165d2a0d09f1f44

    SHA512

    8cf1454a9490921bc242a8290c6a832a1a3a166e7f8644d6fc42491797597bf0b3eac519bc93a0e0600c4b6d280ff38b7f978308687d1f393fe1e215e60c418e

  • C:\KaVBPR\dobxec.exe

    Filesize

    2.6MB

    MD5

    238654861ea847728d85512a7babd514

    SHA1

    fafff92dc3b063566f5d77b704067f1eec631458

    SHA256

    077621c0b2fc4b1ddc8061aae1ae7c7df772b2ef46b54d2349c7474b9e5d9cf8

    SHA512

    f360592ccf92badcda86a0f19857ec13aaae8d279987cda1b02f3d99c3f20853e6033425a391c878925f14469eb06a25954184c0e33286d247f342fa182e5dd0

  • C:\KaVBPR\dobxec.exe

    Filesize

    2.6MB

    MD5

    42e210a899cef8fb1dfd1ed6d2365833

    SHA1

    f7f711b551b8a3d080034d5eb6b8dca7b54dcc4c

    SHA256

    800d2986e2eef00fc92e2b73386452bc6ad43f9d1a7458f4d89e66edd152e23d

    SHA512

    83206924f38a8e29beabdf8b0b0fe29f274d493a47405cca8f691168a42d3fef1bf8a808808d70127d31eb521ca8fa9d946ae37fe882c9b9a238ae45f812cf5c

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    f0606d58a0b6b2e2c7332e4fde5229dd

    SHA1

    5183fd75d5e2253321c005d5f2259c335512c220

    SHA256

    1d659b391f4cd5c01fa7e32ad709938052c872fe5b5ef482ffcd3584f4821fe6

    SHA512

    7a2edee0147fcb370538e7a3aa433f50810f17fd48f9509dd253a1de6835c1162c2945957c8aeb4acf85589e523a579fc3d7b34780617b768240d15da9d303b0

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    cd9e7f00e67b1b70745cc59d40d25542

    SHA1

    74ea65b6fb2ea0dc98aa5802826e036b6c772da5

    SHA256

    e3b7c0d8a434e9ecd91820eaea4ef36783e236b72732a15f51edc475c40a9143

    SHA512

    e88b05b8d32c7f4c9f558c925933ade6b3ddc1d657e997850a8c4863d95426c27f88946c610cd9a4a62b1449b22fe98fa588656045303e890f996ceaa0a002c8

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

    Filesize

    2.6MB

    MD5

    b4191b45fcd3dfd845ea9c51f256a5d6

    SHA1

    ba2771ae107794a33bb1aebc0217911f759a6017

    SHA256

    7b2bfaae49b67064fbd3cd5a476316341e98ab6928bea3d4f07aa42245b64011

    SHA512

    a36d2bf5ddaadb07a13501e754f532a175b3e77bff640b9b1c58cb31d8105dca026aa9f00a3636daf4330aa91d1676219afc37725a47aff36e6e7721b79e5dbe