Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe
Resource
win10v2004-20240508-en
General
-
Target
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe
-
Size
2.7MB
-
MD5
b2ae7c0208e76e8f143aa32ab0fc4408
-
SHA1
e802692454c0032326f220802df9aac8daad8a74
-
SHA256
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9
-
SHA512
6c1a45739c9be96098260790c1c02df4c85725963d3d394e9ffe529ed07434a99777e0d67ddb292b8df6371354412562bce3616ee4663b1e8866cfe0c8a8c4b8
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB69w4S+:+R0pI/IQlUoMPdmpSpg4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xdobsys.exepid process 2212 xdobsys.exe -
Loads dropped DLL 1 IoCs
Processes:
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exepid process 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotED\\xdobsys.exe" d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintH4\\dobaloc.exe" d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exexdobsys.exepid process 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe 2212 xdobsys.exe 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exedescription pid process target process PID 2824 wrote to memory of 2212 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe xdobsys.exe PID 2824 wrote to memory of 2212 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe xdobsys.exe PID 2824 wrote to memory of 2212 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe xdobsys.exe PID 2824 wrote to memory of 2212 2824 d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe xdobsys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe"C:\Users\Admin\AppData\Local\Temp\d4102851589cf205e8fe1c2c49cb08b02c5bbdd175218fec44fbca3f94c731c9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\UserDotED\xdobsys.exeC:\UserDotED\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MintH4\dobaloc.exeFilesize
2.7MB
MD50512b283fe5510eeaa7e47ef6519d109
SHA127283d500f8afb883782ff47eb893a575be3f6db
SHA256eabc2ec6b83f4993d1c08e6e0f172435bb6ecf365752aee84e787d99003cf523
SHA5129f0fc026c61724087da56155ceccefedc95a2be8808c5a747e7f70b8e4a022adc5acfbca26d5a2777599230d390de5e0ddfcd771ae726e8df319a3de92e3ac71
-
C:\Users\Admin\253086396416_6.1_Admin.iniFilesize
203B
MD5e17f3be62de87994bc88ed8bc16037f6
SHA1cd9d33f4ec7e04b96b9ba6c64b00bbfd92ad507f
SHA25658ed46315041738b339fa30c93b622f457a209b84aa02adf1031ff55694663d8
SHA5122c8ddb15e095c8168fb596a8682b9aa68e6c83e6eced78383fde3e225a836efbdae3e666b9adad5078d538c8a491bf3631afb919545ab49b5ada416b78cc2059
-
\UserDotED\xdobsys.exeFilesize
2.7MB
MD5676f8fa8747297e7566ff25b2d9dcf84
SHA159a0286a72fac14e08e64fa851ae4e64f0b09e05
SHA2560119158077d1fc2ae8be507aba5a65f4d68b8cf114bad3eb7748b745719ca6e5
SHA512c6e5c55b37e2b48e7c4e1336d1184a599f9780ce332f8d466b1c80276985df4c924cb5060dd7ac5105107ec98b51f0cbef6f39432f5d39b7ea3b9cb5650270e0