Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe
Resource
win10v2004-20240226-en
General
-
Target
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe
-
Size
4.1MB
-
MD5
097aff1595dcd066af8ab4fc543ff2d4
-
SHA1
dbbdd0fc0fa5458279b88e7fa760053f591e8ccb
-
SHA256
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299
-
SHA512
fabe8d4c7410edf25b07dce5c4f24ff67697d36ba6f9d9e11757bfc662e86a46396c739554afc4af0859030749a2f96e1da07e1d38eeea6d667014d0a8c0f64f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBTB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpYbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe -
Executes dropped EXE 2 IoCs
Processes:
locabod.exedevbodloc.exepid process 1652 locabod.exe 2060 devbodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesVA\\devbodloc.exe" 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid6Q\\bodxloc.exe" 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exelocabod.exedevbodloc.exepid process 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe 1652 locabod.exe 1652 locabod.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe 2060 devbodloc.exe 2060 devbodloc.exe 1652 locabod.exe 1652 locabod.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exedescription pid process target process PID 4000 wrote to memory of 1652 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe locabod.exe PID 4000 wrote to memory of 1652 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe locabod.exe PID 4000 wrote to memory of 1652 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe locabod.exe PID 4000 wrote to memory of 2060 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe devbodloc.exe PID 4000 wrote to memory of 2060 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe devbodloc.exe PID 4000 wrote to memory of 2060 4000 383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe devbodloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe"C:\Users\Admin\AppData\Local\Temp\383861ea4ddcdd44f3bd88a54bac775c8fb93b8ab4b769fd439314c3661df299.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\FilesVA\devbodloc.exeC:\FilesVA\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5312c2e3cfb51914ad738d29dcbae665b
SHA1343e91c8a0c6aa9bb57ca3d43a17e7063c2e4e31
SHA2569d064c42ee678fbf4f7ed8ccfb4f668e4c150ab53a8eaee36af6da5f1fc81861
SHA51294322de6c64464708aabd1d98038ffa78925f0662b6b3e213eabec73b7a423f1bb9be8e7f87ff88fbd875e295410d5228cad63aae1a18177ba9290961a351a37
-
Filesize
201B
MD560a7495c4ef448891e3a3262924f2caf
SHA1f15f1ddb6313b239a46581decdd5bae845e83450
SHA2563202f6d8f33ca40c3fc4eeadef1e5b6dce0a6761de5c066be09747ec59a34250
SHA5120ecea3d360ea1bc1a596523d4a44d73b80546d7cf09a626b4893fffeab69ca62b5e087489195634f1ace16e1fa6a86397f17826a6569768f26e95dee99b46d90
-
Filesize
169B
MD571401b6db4c87154c31c66210d3fa3b1
SHA16824ac2273f43e721f64caa68785a072860d17b0
SHA256e651bf4a6c1392df1c4136de83bf022237f629303cf3f816da384d1e0c88fa79
SHA5127744e062084d8a8a2756edce45fdf345e1c58aa4c82426511e07f1a93105a2fd5521c5354e8560f82cd7cf50b168dd58cadb4941107095386f97c23ac11e5117
-
Filesize
4.1MB
MD55003925d0a05b7e3b2bd5dbe69064dc3
SHA10e7ceb545b54a4b130b87a30969cb6ed7c7f5327
SHA256b6e1655204eccc4e00f1fd96e9124ae396d019aa89bbf7a1b3f4ca348f84e80d
SHA5127a7c1eb60acde411e1ae7ead5e0821c4e7b4e99e1b91feaaeefcff8c497f8b635adc84469a221eac1903171e8f0238f704cc0b6b9d8f2eb34b8f4562bf326394
-
Filesize
3.6MB
MD5c7a017f8e9177ca374fbfc1ca0a7f061
SHA1fd882760e597bb05ed51405efdb74c263bdbe9a8
SHA2566efdd7059e9f6da1584754cb416df8768c0e863e904f542a723c33936d66b0ad
SHA512a188954ae24313a66937e0b8cbb13c4630de3ac2c7273da77e9a8c40e604968ac0d14b9b1ac19bb63b538503240792931ea59fd87826c5f9bfa3ae5afffd1aa4
-
Filesize
4.1MB
MD56ee612e0c3ff9d5fb4c7232894e74fc4
SHA1d49d704bcaf4509e7121eb0774145e71dcd6faf3
SHA25695bad1c78076ac3f48736952cdfefb354c7e66d94c703dc223ca592267eab08d
SHA5121f966853432ed097c21a9ba1dfc01703196f786d7ec6763ffa88ccacf3fa6c2990d7b169739c9adda99c66d4bb5b99ac7a34eb97d5f97b9508643acbf4c482ab