Overview
overview
10Static
static
10VirusSign....f3.exe
windows7-x64
10VirusSign....f3.exe
windows10-2004-x64
10VirusSign....ff.exe
windows7-x64
7VirusSign....ff.exe
windows10-2004-x64
7VirusSign....2d.exe
windows7-x64
1VirusSign....2d.exe
windows10-2004-x64
1VirusSign....31.exe
windows7-x64
VirusSign....31.exe
windows10-2004-x64
VirusSign....67.exe
windows7-x64
1VirusSign....67.exe
windows10-2004-x64
10VirusSign....f9.exe
windows7-x64
10VirusSign....f9.exe
windows10-2004-x64
10VirusSign....76.exe
windows7-x64
10VirusSign....76.exe
windows10-2004-x64
10VirusSign....45.exe
windows7-x64
1VirusSign....45.exe
windows10-2004-x64
1VirusSign....3a.exe
windows7-x64
10VirusSign....3a.exe
windows10-2004-x64
10VirusSign....2b.exe
windows7-x64
7VirusSign....2b.exe
windows10-2004-x64
7VirusSign....74.exe
windows7-x64
1VirusSign....74.exe
windows10-2004-x64
1VirusSign....9e.exe
windows7-x64
7VirusSign....9e.exe
windows10-2004-x64
7VirusSign....22.exe
windows7-x64
7VirusSign....22.exe
windows10-2004-x64
7VirusSign....ef.exe
windows7-x64
7VirusSign....ef.exe
windows10-2004-x64
7VirusSign....f3.exe
windows7-x64
3VirusSign....f3.exe
windows10-2004-x64
3VirusSign....d8.exe
windows7-x64
1VirusSign....d8.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral3
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral5
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral11
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral29
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
-
Size
4.0MB
-
MD5
03ba9978296204d2048fb184e546932b
-
SHA1
63fc0f70834a1868681c1ac8bf9dca778221816c
-
SHA256
0af366e7b4fa57f57a14aec07cd5c2991809e96b3d240c9440c1c6e59576a16e
-
SHA512
4f6c5cb0048ae1d3a8b39c7dcd2fb3901402dac55309efe453b69b7ded5efa8085f27144e766eeddb1c9d38a857dfa7b2bf1cbd6fc52d65348dd76bb3cab3ed4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBJB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpabVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe 03ba9978296204d2048fb184e546932b.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 locdevdob.exe 2096 xbodec.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 03ba9978296204d2048fb184e546932b.exe 2204 03ba9978296204d2048fb184e546932b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc1I\\xbodec.exe" 03ba9978296204d2048fb184e546932b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZO3\\optidevloc.exe" 03ba9978296204d2048fb184e546932b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2204 03ba9978296204d2048fb184e546932b.exe 2204 03ba9978296204d2048fb184e546932b.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe 3028 locdevdob.exe 2096 xbodec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3028 2204 03ba9978296204d2048fb184e546932b.exe 28 PID 2204 wrote to memory of 3028 2204 03ba9978296204d2048fb184e546932b.exe 28 PID 2204 wrote to memory of 3028 2204 03ba9978296204d2048fb184e546932b.exe 28 PID 2204 wrote to memory of 3028 2204 03ba9978296204d2048fb184e546932b.exe 28 PID 2204 wrote to memory of 2096 2204 03ba9978296204d2048fb184e546932b.exe 29 PID 2204 wrote to memory of 2096 2204 03ba9978296204d2048fb184e546932b.exe 29 PID 2204 wrote to memory of 2096 2204 03ba9978296204d2048fb184e546932b.exe 29 PID 2204 wrote to memory of 2096 2204 03ba9978296204d2048fb184e546932b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\03ba9978296204d2048fb184e546932b.exe"C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\03ba9978296204d2048fb184e546932b.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Intelproc1I\xbodec.exeC:\Intelproc1I\xbodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD57d2417ee9949ae388b46ebf4b93c09d7
SHA10405d026e1471ed4aa4ce1f75806be62049e1416
SHA25653dfde1f935374a9d725f73ee06fbe1aedb985ab28b4578c8d90a42b90482412
SHA512a9cece2c8f40a234313e081bdd88b7fec68e68f744ec906b97bf426b955af21e5337821304a5005fcf867e1accb36b85feac4b3b0b3f5f7bfa79ffc10ef8c1ef
-
Filesize
4.0MB
MD506626406dd524ec36782617321197a13
SHA14fa8201102c35f79aeb7cd17cbae29fb14b536d4
SHA256ff0eda7512ffa442994a9b77598691531ffefa859a87f18eab21ae13dfa32e0f
SHA5127472d95ea7e697787e13d96f42f0e8478d2baf4ecdaec6f7a652051a3838089d38e404e056cfcfc1e3f8dca3913b2214694d24ca30449fef8b1a43fb3167a3d4
-
Filesize
176B
MD5d8fc55f2b25ff1bdba323aa4d24bad4f
SHA1cec6ce67b68b33b389189e2f04ab95efb4b7a31a
SHA256c190cdac2bfe4a670eea29a447cdd131beacc9c0b3eb8fa1749c2f34d8ab4d46
SHA5123c013eafd135bc69230523041cc983a35d7b875f55103c3d1949fb20783d5b8afa0aac45e70bb3e16bfa2d474c854209876a9a961a8855968fa36ad5c58f7639
-
Filesize
208B
MD5667b72ef787f46f8d1eaa99394c010b0
SHA18c32fe8de2d66af8c07fb1f51f71a5445c6683ea
SHA25638f8b1cf789577022283069cae8ddf6088f7fc92e57e2af9ae670f8b8b80c8be
SHA51216af98b8f36c2663cba74e513e9a735120b1ac46e02010e7e4c645d7f935033ef97d4ac00fbf743461167f77453ba73a3539b03e1c66e6069a6a0c34a2fc39c1
-
Filesize
4.0MB
MD5398b476e32a2658fe697e48a59467ab1
SHA16e7aabb366a864688aafd9cb389e976c9e1ad3a5
SHA2563913e4f96d1381339bbd19fcf0f3c7dde5a8e29e1a0aa2898bfee41ceb308866
SHA5125dba52c56b34b18474abe8d85d328801fb3e2638418bfdeaabffc42760f147f5b58ec50b6a9ca9124826398d8d74e58e94515f9387daa2a87739da2fb04249fa