Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 14:29

General

  • Target

    0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe

  • Size

    2.6MB

  • MD5

    862cb8e2382e60c026ddcc067449be40

  • SHA1

    9983c11623b540412b7457323ec7aabd3e3aa803

  • SHA256

    0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0d

  • SHA512

    185de46ef7d0fb87cf9504beb767f09a1f0d61122226a23d08b2428e6b1066bf8b123eacaec0f5127e48ec07b85b10a9900812d330165d133a78c204e724cc49

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBFB/bS:sxX7QnxrloE5dpUpWb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe
    "C:\Users\Admin\AppData\Local\Temp\0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2748
    • C:\SysDrvC7\aoptiloc.exe
      C:\SysDrvC7\aoptiloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\KaVB9Q\optixec.exe

    Filesize

    2.6MB

    MD5

    25ec93c7fa3ec84affdf95e87fb189b1

    SHA1

    eeef4cc1000b3a572c160428e46e39e7ed815a20

    SHA256

    31fd380d070c862635b82f9036da3382418ab11f3ef4b5573d3bf399d02f91bf

    SHA512

    bc5a7da9d4c1cd4a50721eaf66e601a35dcd10d010f37ce2eff2edbfd94b3c6b5deec81cde9881e1a29d7ad5641ffcda221ea3985615bd090426272c3c535077

  • C:\KaVB9Q\optixec.exe

    Filesize

    2.6MB

    MD5

    155aae7ddd52484453a9dc19b325ca10

    SHA1

    f37e95293dd9b045b035f010b010976afd683866

    SHA256

    8210109dd84a534dc3b296487c946a1d5429bc75e28a0f04603688d536818da6

    SHA512

    6b3e630cdc8f29b5ea3cf736712071c7e2eb78d090443e6470989270defc889444cd1cb02174c8ad054c668c5b769df4d98c364346faf3d3d11c41020ec5c153

  • C:\SysDrvC7\aoptiloc.exe

    Filesize

    2.6MB

    MD5

    c3baf79d7d6c0ee3127111221b218cf5

    SHA1

    1c1c164dcf761a58417ad579b28cbf59a1a9b776

    SHA256

    f7f4c060192cadaac2bb4c0fc42dfeccb7d0f1a5d34d98674091409619fa3c11

    SHA512

    ae543c1a25c770755af596d64d1e8022ba7d2394ad970cc5bd74edd0606a67d1e066c3a172ba50c25d15e8a002dd323211210b1d0d5899cfe2f33f86460b219b

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    169B

    MD5

    f81c23769ade714dd15b2d3ddcf7ddb9

    SHA1

    4da717d201812a7c070d5e8cff0ae8cbc1b97b88

    SHA256

    9922b50662cf87e2bcbdb8ba378f3ed600fb735f78378e22bd143f0387c30da0

    SHA512

    d36820ee6cfe07e6991faae80174d4af7eda39cf27ca76c9667b68d4c213560a20f0cbc27a3d0ee8c419094b4ac1c008bdeb9bf3ca96009f3a77d8b65f9e1bb5

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    201B

    MD5

    db627b9af0db314a33f25f2ad9ccbbb4

    SHA1

    dd8271a0af722b6130d932e96c9a7853c29fab87

    SHA256

    3125756ed822e3a03f5353a42bc810ad0a4bcc54ecf8892d91f5ab2c7bf23f62

    SHA512

    60589c003128c50e905d1175b760d96c7363c13618d12bf2b01447179079f20a2783c5265f04ba260c807f2445482fc40d922f8c777da2ed69bcb9e93792e321

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe

    Filesize

    2.6MB

    MD5

    55262f12b3d49c475b8c1d05053b534d

    SHA1

    2e9d2d9cfbea9ef67ac44c04e8d0f75d2a0681ed

    SHA256

    4ebfd3974c141628f9dbfb7dd799a50cfbf594d40b3d41fa988f125326f25274

    SHA512

    36cd9374e9d4e477c16488ffbb1a012555273f78654acb56ae83184b41233071a4edd04db6718db80f13d4de0f5afaac6b0d7d2156792f489fb1cc550b9fb803