Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe
Resource
win10v2004-20240508-en
General
-
Target
90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe
-
Size
4.1MB
-
MD5
ceae603f17896e6da16aa5e79ea49967
-
SHA1
d2be7996c581f1ff700fa7312f28d9b23419dc97
-
SHA256
90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd
-
SHA512
fd4b28012fcf69a0895bbdbacdbe18a5020d9acad3f68508084a4901e8c545ac223340fe6a3ac0625bc46af4df65b4a234092c9c3042592bf70ea17eb7fc1e08
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpH4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmg5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4348 devbodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocJH\\devbodec.exe" 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZWY\\dobaec.exe" 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 4348 devbodec.exe 4348 devbodec.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4348 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 83 PID 3076 wrote to memory of 4348 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 83 PID 3076 wrote to memory of 4348 3076 90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe"C:\Users\Admin\AppData\Local\Temp\90f95b0ab9d26cda5e931446a3a99eb08b983bf6d5983409eba41931c92bf9bd.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\IntelprocJH\devbodec.exeC:\IntelprocJH\devbodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD50ed68d4c144def0b3609910bdfe0822e
SHA17c68fe37f842929dac8ef212e7d75efb8613fd0b
SHA256d1b4b6c6b38d558eb783b4b29364a24ff8534871467cde5566ec72b8c9cf8688
SHA512c74a741fdf260cfac14b3c4b2a4e1e30930e8e0309e86fab4eb99d7d26c24ba39013639faa6d5878c7806c1c3b1fa3878a5e7336da73003b3fa9938eb60e696a
-
Filesize
4.1MB
MD50c0c6535c78cb0118427b07837fb8591
SHA124b7af0d39faf73eea0240fa3534a54191d400cd
SHA256b8b1364b151b8fe4128e436a51b7cacd860156bb1ffbfcb33013cda050a4861b
SHA512d1831212660a276037e4e96b2e0c8bde4dc036324587667d46680d96989075c3a1e05add03de632d9cd517be9673794adc2efd31280ef24a57dd05963ef996c9
-
Filesize
203B
MD518a2f953153abd95d17e3c11800122a2
SHA1796afa206cc6708a8c05d252140bc83479c5c7fb
SHA256cdb62e5485a8150ad4a52ac477f6d216c08de2e2cc03f5f4b5ace38602716fcf
SHA5123333e972c1f84ae9e11a419487a13cba397d1be3fe186f2b269672f2becdc9ea9c04953deb2aa233e3269174fd34b62374e1acef3fa306ec0fb0dfcbffd24f02