Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe
Resource
win10v2004-20240508-en
General
-
Target
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe
-
Size
4.1MB
-
MD5
a79ae264c094f4fa71a7916e00e3d723
-
SHA1
75e9656a5590919ca495cb8f0a2444c4924fd0ed
-
SHA256
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2
-
SHA512
af5a4f351ac5707cbff8512752d45045cb65d553bc54d578dd7eaa05b0f4a73013166a08ae2722fb31bd92e7849c45b3918027e41a7cda7725b890e3e7a74387
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpr4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmc5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
devbodsys.exepid process 1732 devbodsys.exe -
Loads dropped DLL 1 IoCs
Processes:
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exepid process 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesXM\\devbodsys.exe" d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB8Z\\boddevloc.exe" d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exedevbodsys.exepid process 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe 1732 devbodsys.exe 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exedescription pid process target process PID 2340 wrote to memory of 1732 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe devbodsys.exe PID 2340 wrote to memory of 1732 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe devbodsys.exe PID 2340 wrote to memory of 1732 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe devbodsys.exe PID 2340 wrote to memory of 1732 2340 d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe devbodsys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe"C:\Users\Admin\AppData\Local\Temp\d297372f6aa980a6c073350ac4a65ca2f79559785fd92bbfb36d2d03daf5add2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\FilesXM\devbodsys.exeC:\FilesXM\devbodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\KaVB8Z\boddevloc.exeFilesize
4.1MB
MD5d70be431f9c19a54f3fab0003af7b415
SHA190d54a631ebea91b7b6093b697de86d6a96b84f8
SHA2565496a6825cc311343f2c01565ccf306cf41abcf3e7ed48fa6d171ec0a529c593
SHA51247b8842ff7c5d9941967415d829f4157bafa7077c054dcc0fe343613c3796437f27218b818de14ad52aa6fd5483ab7e2edd3d5f3714f61165d391455096f004e
-
C:\Users\Admin\253086396416_6.1_Admin.iniFilesize
206B
MD5db1d47b2eef2ecdc94f6f4a165c5ba5a
SHA182a5f1312226805259dd9062da1d573ace9facc0
SHA25611c3b3859d379342c1e4ccb3595755e11c4620059c87dc73cda32d98c609ff5e
SHA512e5ff595bd0b24d221a55f23630472cd807be72dde90b8bdcbc7a8fcd8c718aa1d379574977bdeb8a1ce55fab95a03ce4d49f23027aa295450a57b194da0df583
-
\FilesXM\devbodsys.exeFilesize
4.1MB
MD5d610cb2359ff219e1948103a004c402f
SHA19284b84b6298d55fd6e005e8d31c61bb1ec67615
SHA256537e7cdc60bfe3935d9edef98b87bfb8cd44481f78e442a74827eca64d5cb0f5
SHA51231b8099ecfc93d7d38afbf1a1136b0d561941ccd161510823ef5957438c31bd3b2f762df8833dda1cb3737aa4109065e6709f6445d0369de41fca1957ec62d74