Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe
Resource
win10v2004-20240412-en
General
-
Target
6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe
-
Size
3.1MB
-
MD5
3197ff8e4e215a3160ac7dc8259af10c
-
SHA1
36596a2ec3bfe545a1e4c7ca5e9c6f2f3b839045
-
SHA256
6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1
-
SHA512
7e80b5f7974b9b68b9673686e4167723f4a67a5dc032bc3433860d7857abe171c215e92801bf1d570adfc8e766972698fa91938a69e638cb0306e63d413f619f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBOB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUp1bVz8eLFc
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe -
Executes dropped EXE 2 IoCs
pid Process 2408 locadob.exe 1320 devbodloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files6R\\devbodloc.exe" 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBNX\\dobaloc.exe" 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe 2408 locadob.exe 1320 devbodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2408 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 28 PID 2232 wrote to memory of 2408 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 28 PID 2232 wrote to memory of 2408 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 28 PID 2232 wrote to memory of 2408 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 28 PID 2232 wrote to memory of 1320 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 29 PID 2232 wrote to memory of 1320 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 29 PID 2232 wrote to memory of 1320 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 29 PID 2232 wrote to memory of 1320 2232 6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe"C:\Users\Admin\AppData\Local\Temp\6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Files6R\devbodloc.exeC:\Files6R\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD50122253bf3aeb81b8b7d53c34b1f9440
SHA15c3483c743bb541a01e1b7e1b163b4c3acd47b0f
SHA2569b105eefe8c77a4df8d3c766b432b4c19c7bf02aef437e13551f7e693542d07a
SHA512a4fe844df6ac053732d16064c28431377116ef07ddac07091d3e8a5b75f44107fc85859fc766312649d2fd1e5a168b330aa99d74d750e613d5371ae0097c9cf1
-
Filesize
3.1MB
MD52e3d386cf7bd3d29e0595e82c6308726
SHA1a5d7fbde53f988ae0a24bef09f355790c262cd46
SHA256e4877ee4bdd6407d81dcc51030be93dd081524cdde5ce30b1e8d4d80895a7cda
SHA51255af1a6eec1e6850dd99c01e8812eb2361cc61660b995bcba5a90058770e1caa54e39bbe9fb397ea0a54b4abd3ced3abfe8b0bec187921983c715e0010d0cad4
-
Filesize
3.1MB
MD5c78e11918dbb0db44f772cff4a5c5ddd
SHA149cdb2d4354ff7240e6179fb7d9524a39845a397
SHA256100a3fff221297b7e94395db6ebdf6eac55f12065309dcadd19dd696105dc80c
SHA512fc9fe732ef4c1d338f84c6a99de9c5792fe556274c250f460940dcee4fffbb7e60add02489b0524ba690deb1eca7ff97523a81614a98f46b0b2574448720b887
-
Filesize
170B
MD5aa5959bb9a5943656731ae096ddb8336
SHA1763850744466b532bf34f9cd2eb02402dfdf89d8
SHA256eef020ede5b177202cdd438feeb64d7d1674cba37e45cb75302923f43dc3d9eb
SHA5120c75412d4bd6959a90226aba37973ba3706fb4752fa37c7db5139918cc6b1ee842126e1d861ef7bd534305f57ab858841ed082df83ee89797f84ff77ff36a926
-
Filesize
202B
MD549c62b7a52319b8cc24c6f280a7a04df
SHA159dc5150e3290febaa8477fd6ab4f1e4b4d4445a
SHA256471f82ee5dbc497f1a8176105b8c6b7a845fc2bf6e1e15dc2e72bc1247443d18
SHA5127475644db630edb50b05530fcc4cde837da0cc4e1eb7ff10104231ff5f5f2b99f175d0c0de2ba8e92e2d7cfc57ce4abbddf8184748b4b06acd4fd396968fc2a7
-
Filesize
3.1MB
MD5f70d449ad2020c1f490fc24285906ea5
SHA1cef7d015be1e68596089e58256ac3b26bc39315d
SHA2562262e4c10163139dfa503203b5a6d942b85d0d7d6eb5c062dc10fb4c28ae81c3
SHA51296c9796cea25e9f04fee66276d4ad8900119937855ad85edb836fe6d9bcf0d3b4e82b408b1778670ea355e9171f7522bb288c8b714d3788fe2dbaa7b7aab8296