Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe
Resource
win10v2004-20241007-en
General
-
Target
a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe
-
Size
2.6MB
-
MD5
5837741bd00efb728cd93cfcf6ac01a1
-
SHA1
a3dc0e5bc0c7228a15a3094703d7da6516f75305
-
SHA256
a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f
-
SHA512
4d4639a14be10aabe68218d6164cfc7854413043edec805ce00860ec775540989f24dfdeb8789e8f426c5ab9fba588ac5a28639d2103201789b10e20862d2380
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUpYb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 sysxbod.exe 1740 xbodloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot61\\xbodloc.exe" a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBB7\\dobdevloc.exe" a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe 2352 sysxbod.exe 1740 xbodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2352 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 30 PID 1064 wrote to memory of 2352 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 30 PID 1064 wrote to memory of 2352 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 30 PID 1064 wrote to memory of 2352 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 30 PID 1064 wrote to memory of 1740 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 31 PID 1064 wrote to memory of 1740 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 31 PID 1064 wrote to memory of 1740 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 31 PID 1064 wrote to memory of 1740 1064 a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe"C:\Users\Admin\AppData\Local\Temp\a701bdb1ba79117b1313008bbc4e700464c920f41c91dbb8e408a54b2d74461f.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\UserDot61\xbodloc.exeC:\UserDot61\xbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD564af141cc66f901ad3d86aedbead85d7
SHA1faeb5f702cedf2ea3c5b1896e93777263420c2b2
SHA2566ef05f9e9e492bdf40d5f04a599ff686ae1874d3c48ce2ff9a6a3e1f0817354c
SHA512f3ee09abc8c5db292c735c429531fe8740cff885b2b46fae07b0909836c0a54d7321f4027b92c3bd68c1baf202cffff57979a3624fc1d71d86523a841908faf9
-
Filesize
2.6MB
MD5c3f9ae86cd5390fbda471be3471fb6e5
SHA1db511c9e424906fdc474d6b613fb110ae828ff73
SHA256e8cdb17f5ff76317f2be20a087a2c501da31e5626c2cc57cbe09bd4812080f12
SHA5128d515fa570bdcffb8dde5666ec41d52674c2f20c44845911637602de723ee173ac1939fc4c7ed9198ee9da64bf13c854d98cd51e218933a2e3125d00cb27794d
-
Filesize
2.6MB
MD51c924baab2f937da4579ea529ba679c9
SHA1921e95970300fa91260b0e5da745cc60064c4dc1
SHA25632f743f0f3264109f6caed32f29600cdf89e877d1138405f81f885ea0e993398
SHA512a39659c34101e33070bc4b7b812590bdf9a81ad90bbb9eb675bc7abee2d86b6f797c07861896136de49272ca764d022dd32a7624d685df21f0b229c940ea75a1
-
Filesize
172B
MD547e9fcbe48e30aad18c36b85c027b609
SHA18f275ee0ed7c1506134388d9415275e90d5644a3
SHA25641cadfcf2bc63a4f4c0b5939a79d7b95e22342530731fcfcc285b46ef3e61927
SHA512c319c44c086ebde46ca16feb6c73523c6b41fd7f1c886d9884eda8b7928f5da2a463c97585820d834149a535514f7867946bc6627ef7951910528f561eccc438
-
Filesize
204B
MD593232699cb546ce5bfae899c5f555795
SHA18bf5f20d6fc0773f377e981ca024d1d7e5d985ff
SHA2563aed530eda3fc26a135184ceced8bda1e1ad442d52b4c606d6662fdd5ab507d3
SHA5129070abf535f68bd91ac324e4e7c26049f0a3600b45c8b83716d19a478e4c180f0fb003cf9c659bf155e34f488ea0ee00e7b611695afe2245e1dcf6baa6ad580d
-
Filesize
2.6MB
MD5e1f08d3e0f4a0d0763c1b69611db1479
SHA1753a13fede4842865f6e365a6d726d5ca12dccce
SHA256bfa708855af0ab2a22af5383da4e7ec4f940e2e2edfe7dca491001797ca05f7f
SHA5127bf01fc45e95d3b4acb73fb4c944986876dd7c5062618d705c7a8db905e0641efd070e25a0f568ed0136379297f4266a53b112dcc8374a9d1f1a04321ac4d6cb