Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe
Resource
win10v2004-20240508-en
General
-
Target
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe
-
Size
2.7MB
-
MD5
e9e77430a750d8a67d6d79b4613ac1b4
-
SHA1
3e73a41f3f307fa30324c709579127cda31c41de
-
SHA256
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3
-
SHA512
fb98d4b1eb529795221d857317a052079ce85f3e60935411419ee96e5b254477d1470579c2498c1dbf62f099a7a6813cb42ba18e723d5ab2bd0669ba9639b18a
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBX9w4Sx:+R0pI/IQlUoMPdmpSpf4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
devdobsys.exepid process 2692 devdobsys.exe -
Loads dropped DLL 1 IoCs
Processes:
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exepid process 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvSY\\devdobsys.exe" 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidTK\\bodaloc.exe" 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exedevdobsys.exepid process 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe 2692 devdobsys.exe 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exedescription pid process target process PID 2264 wrote to memory of 2692 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe devdobsys.exe PID 2264 wrote to memory of 2692 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe devdobsys.exe PID 2264 wrote to memory of 2692 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe devdobsys.exe PID 2264 wrote to memory of 2692 2264 179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe devdobsys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe"C:\Users\Admin\AppData\Local\Temp\179ca6727f97a98d028ea98d2280f5bf58d1a8289208698a072cee6873f0fbf3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\SysDrvSY\devdobsys.exeC:\SysDrvSY\devdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD599c6cebc8fb8fed2364cc0a45be7f73c
SHA1e11d26040bd22fa93fda964fc5463f367bd6c749
SHA256f9677137fa17583c68073a7abb7561747a4138f278160279e157eca51d6312be
SHA5122d3cebbb35c7acea7c1ac22939dfe6c3ab1fd4f72ff725f156ab544f21f8315dd946aa1718178da88459bd9eab59c6a7dd01bf73a5c7660d9e0c72f22e63a51a
-
Filesize
2.7MB
MD5d13e256a8273797b456f1086a6f000a1
SHA11e10fbe59810bb5e59aed54bbab3165dc01e54f8
SHA25602d8eddefbfae6e44d67c9decf3d3d3b9bb9ef2ca48b9ca63b94d77c8b23eb3f
SHA5129982e1147b6765814e65199a2774dbe1daa6805302e4e01b927b9a4faa723c052ef841d6634b9365cdd672862e04cf32075df788bf39027f02f237c022dbf68f
-
Filesize
2.7MB
MD5f4049711dd3d1badf1d77e41cf662de6
SHA13c96ed7052a1d3769be739ceebcc2c99582b290a
SHA256cf818c3bb420fe1abcfcf23a173344493e38deccd5167d562f993989763ce502
SHA512b0484e9212d69212d70aa626851a9d1d071d8526cd3120aece0a244aa365526fabaee790e7a03e178e98bdde60cacf8cfc7c7f28739012179ffbce744e8ec780