Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe
Resource
win10v2004-20240508-en
General
-
Target
fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe
-
Size
4.1MB
-
MD5
9b813683e9c38940244cde4701914b7e
-
SHA1
0cbee4e8a113a7bad4cf2330cba16c600229b52c
-
SHA256
fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e
-
SHA512
a8a362cd736d195d26f7a2ccce8fe465951dceb38d45be52a9542fee2162c5ef6b0043f165ccb8ebc1cfb0f8478573f389cfbec5ed925bcca9271a67e70122e8
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpO4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmJ5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 devdobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotKU\\devdobloc.exe" fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZBL\\optidevsys.exe" fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1680 devdobloc.exe 1680 devdobloc.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1680 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 91 PID 1916 wrote to memory of 1680 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 91 PID 1916 wrote to memory of 1680 1916 fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe"C:\Users\Admin\AppData\Local\Temp\fce1ed5d7860308765e969e6534f319c71b34eaeefc7c24021b37dd8ae0e873e.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\UserDotKU\devdobloc.exeC:\UserDotKU\devdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD567cafe9abf25afd9aa433feeef5d3d8a
SHA1a8cefb5ed1e9b6cd7062e0e58191bc9f8cd9ed60
SHA256619ff6b2a6225e6e5f893b39cf603765972dee6e267a0d425b1def0603720ded
SHA512ad92056b120253845de59aefecd444d9e967321cffc6b57f3a7c5b781d82654426bbb6f9dc4b9ca6b378046c3be8cbbfbd2f853b92b88b162809dd5b62092995
-
Filesize
4.1MB
MD5cf18b9ca2a72d7e21dafb9d18bf5afa3
SHA18e125f1d2ee856d34c24462dac9716dc85544b65
SHA2567dfb902fc43c1401a4551f849da59713a0e61347ea605744b76c17d623c1da2d
SHA5121da4b40d08216a80231790d498a6f27be587130817f8910de4d8f81925ae4c99676beb36a52b9614e7a7705892bda7069a66bd4f5d514f17555b5e8004fbf12f
-
Filesize
209B
MD5650b2154ac569a5709db4fa37a5c5311
SHA1c2002c5b00f7d6ed03a568a85f00b519113c4081
SHA256bd7f5b7422dcec0b8213874b889d2a47b3aa27103e4ab29b1dc414d2ce0fe16f
SHA5127971d417db01c5fb69a81ab1588a9c30de5218b603d4b151c811950fe96412302754e7476096ffd490e9610daed2cfdef24fe8290a255ab2c3895a8a1458c650