Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe
Resource
win10v2004-20241007-en
General
-
Target
0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe
-
Size
2.6MB
-
MD5
862cb8e2382e60c026ddcc067449be40
-
SHA1
9983c11623b540412b7457323ec7aabd3e3aa803
-
SHA256
0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0d
-
SHA512
185de46ef7d0fb87cf9504beb767f09a1f0d61122226a23d08b2428e6b1066bf8b123eacaec0f5127e48ec07b85b10a9900812d330165d133a78c204e724cc49
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBFB/bS:sxX7QnxrloE5dpUpWb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe -
Executes dropped EXE 2 IoCs
pid Process 2748 ecxbod.exe 2968 aoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvC7\\aoptiloc.exe" 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB9Q\\optixec.exe" 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoptiloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe 2748 ecxbod.exe 2968 aoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2748 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 30 PID 2652 wrote to memory of 2748 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 30 PID 2652 wrote to memory of 2748 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 30 PID 2652 wrote to memory of 2748 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 30 PID 2652 wrote to memory of 2968 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 31 PID 2652 wrote to memory of 2968 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 31 PID 2652 wrote to memory of 2968 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 31 PID 2652 wrote to memory of 2968 2652 0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe"C:\Users\Admin\AppData\Local\Temp\0602411cf02e23aca4ea7054ac2396d48d26007de2fe9d81617b9d8ee8669b0dN.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\SysDrvC7\aoptiloc.exeC:\SysDrvC7\aoptiloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD525ec93c7fa3ec84affdf95e87fb189b1
SHA1eeef4cc1000b3a572c160428e46e39e7ed815a20
SHA25631fd380d070c862635b82f9036da3382418ab11f3ef4b5573d3bf399d02f91bf
SHA512bc5a7da9d4c1cd4a50721eaf66e601a35dcd10d010f37ce2eff2edbfd94b3c6b5deec81cde9881e1a29d7ad5641ffcda221ea3985615bd090426272c3c535077
-
Filesize
2.6MB
MD5155aae7ddd52484453a9dc19b325ca10
SHA1f37e95293dd9b045b035f010b010976afd683866
SHA2568210109dd84a534dc3b296487c946a1d5429bc75e28a0f04603688d536818da6
SHA5126b3e630cdc8f29b5ea3cf736712071c7e2eb78d090443e6470989270defc889444cd1cb02174c8ad054c668c5b769df4d98c364346faf3d3d11c41020ec5c153
-
Filesize
2.6MB
MD5c3baf79d7d6c0ee3127111221b218cf5
SHA11c1c164dcf761a58417ad579b28cbf59a1a9b776
SHA256f7f4c060192cadaac2bb4c0fc42dfeccb7d0f1a5d34d98674091409619fa3c11
SHA512ae543c1a25c770755af596d64d1e8022ba7d2394ad970cc5bd74edd0606a67d1e066c3a172ba50c25d15e8a002dd323211210b1d0d5899cfe2f33f86460b219b
-
Filesize
169B
MD5f81c23769ade714dd15b2d3ddcf7ddb9
SHA14da717d201812a7c070d5e8cff0ae8cbc1b97b88
SHA2569922b50662cf87e2bcbdb8ba378f3ed600fb735f78378e22bd143f0387c30da0
SHA512d36820ee6cfe07e6991faae80174d4af7eda39cf27ca76c9667b68d4c213560a20f0cbc27a3d0ee8c419094b4ac1c008bdeb9bf3ca96009f3a77d8b65f9e1bb5
-
Filesize
201B
MD5db627b9af0db314a33f25f2ad9ccbbb4
SHA1dd8271a0af722b6130d932e96c9a7853c29fab87
SHA2563125756ed822e3a03f5353a42bc810ad0a4bcc54ecf8892d91f5ab2c7bf23f62
SHA51260589c003128c50e905d1175b760d96c7363c13618d12bf2b01447179079f20a2783c5265f04ba260c807f2445482fc40d922f8c777da2ed69bcb9e93792e321
-
Filesize
2.6MB
MD555262f12b3d49c475b8c1d05053b534d
SHA12e9d2d9cfbea9ef67ac44c04e8d0f75d2a0681ed
SHA2564ebfd3974c141628f9dbfb7dd799a50cfbf594d40b3d41fa988f125326f25274
SHA51236cd9374e9d4e477c16488ffbb1a012555273f78654acb56ae83184b41233071a4edd04db6718db80f13d4de0f5afaac6b0d7d2156792f489fb1cc550b9fb803