Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 22:44

General

  • Target

    6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe

  • Size

    3.1MB

  • MD5

    3197ff8e4e215a3160ac7dc8259af10c

  • SHA1

    36596a2ec3bfe545a1e4c7ca5e9c6f2f3b839045

  • SHA256

    6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1

  • SHA512

    7e80b5f7974b9b68b9673686e4167723f4a67a5dc032bc3433860d7857abe171c215e92801bf1d570adfc8e766972698fa91938a69e638cb0306e63d413f619f

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBOB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUp1bVz8eLFc

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe
    "C:\Users\Admin\AppData\Local\Temp\6d7d84d45ef11ef3778a05eeece0d4a0d23a4d3c93060a46338ee3b4c961c2b1.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2408
    • C:\Files6R\devbodloc.exe
      C:\Files6R\devbodloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Files6R\devbodloc.exe

          Filesize

          3.1MB

          MD5

          0122253bf3aeb81b8b7d53c34b1f9440

          SHA1

          5c3483c743bb541a01e1b7e1b163b4c3acd47b0f

          SHA256

          9b105eefe8c77a4df8d3c766b432b4c19c7bf02aef437e13551f7e693542d07a

          SHA512

          a4fe844df6ac053732d16064c28431377116ef07ddac07091d3e8a5b75f44107fc85859fc766312649d2fd1e5a168b330aa99d74d750e613d5371ae0097c9cf1

        • C:\KaVBNX\dobaloc.exe

          Filesize

          3.1MB

          MD5

          2e3d386cf7bd3d29e0595e82c6308726

          SHA1

          a5d7fbde53f988ae0a24bef09f355790c262cd46

          SHA256

          e4877ee4bdd6407d81dcc51030be93dd081524cdde5ce30b1e8d4d80895a7cda

          SHA512

          55af1a6eec1e6850dd99c01e8812eb2361cc61660b995bcba5a90058770e1caa54e39bbe9fb397ea0a54b4abd3ced3abfe8b0bec187921983c715e0010d0cad4

        • C:\KaVBNX\dobaloc.exe

          Filesize

          3.1MB

          MD5

          c78e11918dbb0db44f772cff4a5c5ddd

          SHA1

          49cdb2d4354ff7240e6179fb7d9524a39845a397

          SHA256

          100a3fff221297b7e94395db6ebdf6eac55f12065309dcadd19dd696105dc80c

          SHA512

          fc9fe732ef4c1d338f84c6a99de9c5792fe556274c250f460940dcee4fffbb7e60add02489b0524ba690deb1eca7ff97523a81614a98f46b0b2574448720b887

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          170B

          MD5

          aa5959bb9a5943656731ae096ddb8336

          SHA1

          763850744466b532bf34f9cd2eb02402dfdf89d8

          SHA256

          eef020ede5b177202cdd438feeb64d7d1674cba37e45cb75302923f43dc3d9eb

          SHA512

          0c75412d4bd6959a90226aba37973ba3706fb4752fa37c7db5139918cc6b1ee842126e1d861ef7bd534305f57ab858841ed082df83ee89797f84ff77ff36a926

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          202B

          MD5

          49c62b7a52319b8cc24c6f280a7a04df

          SHA1

          59dc5150e3290febaa8477fd6ab4f1e4b4d4445a

          SHA256

          471f82ee5dbc497f1a8176105b8c6b7a845fc2bf6e1e15dc2e72bc1247443d18

          SHA512

          7475644db630edb50b05530fcc4cde837da0cc4e1eb7ff10104231ff5f5f2b99f175d0c0de2ba8e92e2d7cfc57ce4abbddf8184748b4b06acd4fd396968fc2a7

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe

          Filesize

          3.1MB

          MD5

          f70d449ad2020c1f490fc24285906ea5

          SHA1

          cef7d015be1e68596089e58256ac3b26bc39315d

          SHA256

          2262e4c10163139dfa503203b5a6d942b85d0d7d6eb5c062dc10fb4c28ae81c3

          SHA512

          96c9796cea25e9f04fee66276d4ad8900119937855ad85edb836fe6d9bcf0d3b4e82b408b1778670ea355e9171f7522bb288c8b714d3788fe2dbaa7b7aab8296