Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 21:41

General

  • Target

    5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe

  • Size

    2.6MB

  • MD5

    41d9fd84231478a2d52c3c01badc7aa2

  • SHA1

    b0da3b7a523f402776676792b7175cc559b62619

  • SHA256

    5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef

  • SHA512

    5d18d03ce2bfec3114785082d310939642ed250c91b56b6e88ec4f8d505f9b9b5e1110cf4189b058d965c20fb996bf2ad5c27e69028c929bf19d29d08778ab47

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBKB/bS:sxX7QnxrloE5dpUpJb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe
    "C:\Users\Admin\AppData\Local\Temp\5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:116
    • C:\UserDot8N\devdobloc.exe
      C:\UserDot8N\devdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\UserDot8N\devdobloc.exe

    Filesize

    2.6MB

    MD5

    0c49d15c51bd287ba53fde329564e5c8

    SHA1

    f30d55067e79d9c3f8dc70323d09bed22bcab560

    SHA256

    8eebd46beb14e81c31083baeb8b058a532dd037d6c4865c9aecba7640c15dbec

    SHA512

    c941b8fda829c1f086737c0f0f0e13561f7851d49b0aa94261e2be3c6bea6803d693f4272a74b81acda5ef991af9e054d0afdc4637b7188e75f1ca4e5a38010a

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    817ec1ff02d23cea94da2a048721c42a

    SHA1

    848e3f1bb48d70dd2861588321952d59715aee86

    SHA256

    02a3fb4fa1a451ebb24ac1ff37c03f2ae21ca3f5718491c35b291adb99a23672

    SHA512

    16dcd00b1fac6bacba39b238ed643e5385012ad1a3695213f9c7360935e338ab8cecf5c15132964f38f81e21aa849674fd9292549fe3d5de3878aa9e32b669bb

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    a615abd6eb55a6c671f1f53e0d4da692

    SHA1

    c823193f1847417919d8daba204177a6dc0af4ab

    SHA256

    38b74fd197b8e893eb7e9acc96eadc7c3760dc2861f961f465ed08523ec3edae

    SHA512

    3ab8c7f7d48ccb72b337bdea08b32678322d23244d9b1bf3cadd654bc378140aaf7417400cdd74f3fe7604262cc274fa23b9eccc94597848c3f987da80f63fd1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

    Filesize

    2.6MB

    MD5

    c1d10f124fa3bbd7a304bed6d13e660b

    SHA1

    94b7b71cc74c061b6efbf8de1956cd69a73c9298

    SHA256

    f71cee8e57340e7c8ac6b75a21a1d0f178496195719fe6d1f2d830bd60a73509

    SHA512

    a7d2b7a90456cc6d304ab257cbff76b9c9582204a6edd947d808bf7224317e4b0ffbef7d2b43b00db692005336b3700ffc315684611ce56df70413a6a7bd43da

  • C:\VidB8\bodasys.exe

    Filesize

    2.1MB

    MD5

    2f6290fb4d45db30b9861722ac18af21

    SHA1

    a74a7567729dba9d8d962f99fffd3306505c400e

    SHA256

    8bc06ee6721d0198f711172287f6b2a069d4f4629021910a7801d6ab87ca39c9

    SHA512

    2012b06698355c9b7668d3e2f9369efb77610d54a1c0b1478d3beacf3d31d137afc9cf18e875b144d838d6238d5de41efb3b8816e5e88e02d3032bd33dfefb86

  • C:\VidB8\bodasys.exe

    Filesize

    1.1MB

    MD5

    abbd8b880beeac0786923d81d32e4f91

    SHA1

    f9ba5179730358759c3e3d5e996fb18da1fb37d7

    SHA256

    89d247173525268457cd181f8d21c01196c1ffa4cba0276417671a404808944d

    SHA512

    3f7c8b3b2e3a6cc83816840e00e0a80012a634ccb4168061c6f3f749f381cfcf839cbd8dbe0e5ce18e6bd16d55e8ae8f0ae7b38a1a6e8fd8ed348b63e26e99a7