Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe
Resource
win10v2004-20240802-en
General
-
Target
2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe
-
Size
2.6MB
-
MD5
b66ffb4704a0d857d711cfce898cbcb0
-
SHA1
5a596c5156f922bbc8d72de5241af0ab8f30f3e8
-
SHA256
2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589
-
SHA512
b3e678552fa0797cee4373d2b776e1946d7b5695dcd943285717b16e28202cf9c7ab05f452653b8bdc61c7b99143b6825eedd2ed8f93fd2292a764f50571c7ad
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBvB/bS:sxX7QnxrloE5dpUp8b
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe -
Executes dropped EXE 2 IoCs
pid Process 4872 locabod.exe 1220 xdobsys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocEL\\xdobsys.exe" 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZUN\\dobaec.exe" 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe 4872 locabod.exe 4872 locabod.exe 1220 xdobsys.exe 1220 xdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4872 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 82 PID 1932 wrote to memory of 4872 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 82 PID 1932 wrote to memory of 4872 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 82 PID 1932 wrote to memory of 1220 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 83 PID 1932 wrote to memory of 1220 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 83 PID 1932 wrote to memory of 1220 1932 2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe"C:\Users\Admin\AppData\Local\Temp\2ae3c4d377f5f5e984b9d207d3a605a28f2750c3ee0acf60d4eea0fa91b65589N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\IntelprocEL\xdobsys.exeC:\IntelprocEL\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ddb1ef1bd578a2bf9ce25869d60e03be
SHA15b137958003e18ab80842163aa437acf1ef14599
SHA2569711e224dd167854a95c89bc6ebc8dd6203d0acae8da8a580e143f3172034c42
SHA51279733981dd62e4cf34ac820685dc611a25c747fb5ce4f5fd0bb195758829321789c52faaa789894a8eadc68cd76f70933ae0436c000bbdc90818fe72f336c29e
-
Filesize
1.1MB
MD561a11a08a0bd18838b64a911d7cfea8b
SHA1da32f2bf5b8feab18a8013e664d37237277d92c4
SHA25678497ec8e31107a61a85a9f41a574d06171a31108148e4f6b54a407e7941096e
SHA512684fcd4fb33eca991ebf838a310378caeb4bc05b8a4abb575bd3d55606abbada2e6573ac27b5cd2ad0eac8c06ee5d75b15200d267b63b338dc3bee6cb1d3e20c
-
Filesize
7KB
MD584c3a9ef71c6c32cc10faa7a3122fe8d
SHA144094cadec949c065d4321a4cb7bb4c11cd999f9
SHA256de832fdf2de3a5ef6ef5856b88230214e4a82f75e7bd75a06e26b26295f3f07b
SHA512f1a129f7aed7cc664d5863e93709d5db2f4f45caf6e6372303a8d02f820d81b54c422a04eb54ae98bd4ba94cd7035a4f0faa9a15bf71b5210f2274fb4f64ac3a
-
Filesize
203B
MD5657e962463b354647a4b93953f7b30fd
SHA141781dda31af4760059a334093acdf4be988beb6
SHA256a836bb4a9f5f113e18e930f845b606266c2545c10b6e9d78e6e10ef7f9bf9443
SHA5121a816d2998c62823d6da7e83b59f6a131f717b880336684d5122060d6ec0225191e5c0713d9a4d239a9c3ebcabb0a2db985905a8aac708bb0da2513498dcc346
-
Filesize
171B
MD5861716f62529104e56dbe8817809cd4a
SHA118a9086ae5d88b439baef4c67482c81a3f331861
SHA25608a4efb2e786a03ffbeea667555eb367ed15c9f0d70a6ef37334e405e16c0e13
SHA5126a817848543e1e5c7354bc442e8cfe9c61acd6ac4a8dc141f8933f2cecad94bc595dc23ebeae4738a5e44b481b2ade89e5a3e493f0345c6ffa3a3f48783ebe0e
-
Filesize
2.6MB
MD542ddddc731f843a7224d819c9e5272e5
SHA156b2da1ee7380113561e84d00246653c287174a0
SHA2569649109d167953de8c273347a782a72ea772584f45133b00dea11afb86edafd0
SHA512ec05d052b6fedbd04cd38e1f4f05f44ae3c74dcb3924f2029dd681df81aa07a5aa78c500f811e1c8a2f8f8fa89af6661b1c6be1235ef129fced6663294fe3b97