Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe
Resource
win10v2004-20241007-en
General
-
Target
5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe
-
Size
2.6MB
-
MD5
41d9fd84231478a2d52c3c01badc7aa2
-
SHA1
b0da3b7a523f402776676792b7175cc559b62619
-
SHA256
5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef
-
SHA512
5d18d03ce2bfec3114785082d310939642ed250c91b56b6e88ec4f8d505f9b9b5e1110cf4189b058d965c20fb996bf2ad5c27e69028c929bf19d29d08778ab47
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBKB/bS:sxX7QnxrloE5dpUpJb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe -
Executes dropped EXE 2 IoCs
pid Process 116 locabod.exe 3736 devdobloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot8N\\devdobloc.exe" 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidB8\\bodasys.exe" 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe 116 locabod.exe 116 locabod.exe 3736 devdobloc.exe 3736 devdobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4012 wrote to memory of 116 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 86 PID 4012 wrote to memory of 116 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 86 PID 4012 wrote to memory of 116 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 86 PID 4012 wrote to memory of 3736 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 87 PID 4012 wrote to memory of 3736 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 87 PID 4012 wrote to memory of 3736 4012 5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe"C:\Users\Admin\AppData\Local\Temp\5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\UserDot8N\devdobloc.exeC:\UserDot8N\devdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50c49d15c51bd287ba53fde329564e5c8
SHA1f30d55067e79d9c3f8dc70323d09bed22bcab560
SHA2568eebd46beb14e81c31083baeb8b058a532dd037d6c4865c9aecba7640c15dbec
SHA512c941b8fda829c1f086737c0f0f0e13561f7851d49b0aa94261e2be3c6bea6803d693f4272a74b81acda5ef991af9e054d0afdc4637b7188e75f1ca4e5a38010a
-
Filesize
203B
MD5817ec1ff02d23cea94da2a048721c42a
SHA1848e3f1bb48d70dd2861588321952d59715aee86
SHA25602a3fb4fa1a451ebb24ac1ff37c03f2ae21ca3f5718491c35b291adb99a23672
SHA51216dcd00b1fac6bacba39b238ed643e5385012ad1a3695213f9c7360935e338ab8cecf5c15132964f38f81e21aa849674fd9292549fe3d5de3878aa9e32b669bb
-
Filesize
171B
MD5a615abd6eb55a6c671f1f53e0d4da692
SHA1c823193f1847417919d8daba204177a6dc0af4ab
SHA25638b74fd197b8e893eb7e9acc96eadc7c3760dc2861f961f465ed08523ec3edae
SHA5123ab8c7f7d48ccb72b337bdea08b32678322d23244d9b1bf3cadd654bc378140aaf7417400cdd74f3fe7604262cc274fa23b9eccc94597848c3f987da80f63fd1
-
Filesize
2.6MB
MD5c1d10f124fa3bbd7a304bed6d13e660b
SHA194b7b71cc74c061b6efbf8de1956cd69a73c9298
SHA256f71cee8e57340e7c8ac6b75a21a1d0f178496195719fe6d1f2d830bd60a73509
SHA512a7d2b7a90456cc6d304ab257cbff76b9c9582204a6edd947d808bf7224317e4b0ffbef7d2b43b00db692005336b3700ffc315684611ce56df70413a6a7bd43da
-
Filesize
2.1MB
MD52f6290fb4d45db30b9861722ac18af21
SHA1a74a7567729dba9d8d962f99fffd3306505c400e
SHA2568bc06ee6721d0198f711172287f6b2a069d4f4629021910a7801d6ab87ca39c9
SHA5122012b06698355c9b7668d3e2f9369efb77610d54a1c0b1478d3beacf3d31d137afc9cf18e875b144d838d6238d5de41efb3b8816e5e88e02d3032bd33dfefb86
-
Filesize
1.1MB
MD5abbd8b880beeac0786923d81d32e4f91
SHA1f9ba5179730358759c3e3d5e996fb18da1fb37d7
SHA25689d247173525268457cd181f8d21c01196c1ffa4cba0276417671a404808944d
SHA5123f7c8b3b2e3a6cc83816840e00e0a80012a634ccb4168061c6f3f749f381cfcf839cbd8dbe0e5ce18e6bd16d55e8ae8f0ae7b38a1a6e8fd8ed348b63e26e99a7