Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 21:32

General

  • Target

    3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe

  • Size

    2.6MB

  • MD5

    8141c1fe0804585aa560ad12d792015c

  • SHA1

    222ba96a6c9053553ab9d3220b6f2337482ab859

  • SHA256

    3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba

  • SHA512

    1b588df6aec944a9b5396158b2ccdc5c281f5716643bf374d7d768e2b4157e97438e6ec209c9d79f09f2e9870e961f43f4949b507cf23bcd8999da691a7036bd

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBHB/bS:sxX7QnxrloE5dpUpgb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe
    "C:\Users\Admin\AppData\Local\Temp\3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1968
    • C:\FilesW5\xdobloc.exe
      C:\FilesW5\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesW5\xdobloc.exe

    Filesize

    2.6MB

    MD5

    423899fc0466f39c3590114cc8e9a082

    SHA1

    0762592f7a5369fbb835ce9e35c3ffbb8eff804f

    SHA256

    fb7d17df82651dcf939ce97f79b01fe75dafd433ecba7a92de2dfa19834209a2

    SHA512

    17c0e1e34383bbf88f6d4c4810ffa92e78b2702c69c726d935fee0013180af71f7d6f95953aaa3a30f24e38aacac604f48767b293d75e77a37c3bb0e59ba655b

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    a4173e35dc571d9c0cd3570090108a07

    SHA1

    1d01aa740edc2602edd9539a06c3ebead1f14fa7

    SHA256

    56e8426f0c73b956f4ce6c5ffbf1b0e8bd252094b4187edd2324b5715b1e5825

    SHA512

    13e7af82cceb1c3df1db2f48f3736bd16a05e0394d37816440d149f5720f8b8090bf38442b008007176373f7b3f3ac1013bf4cb6837a619cd2d29bab4ab9cbff

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    f63d16efaea37d63bac1aeb26d59a4d4

    SHA1

    8162e8c9971eba89638baeed0402eb548afd8856

    SHA256

    9bd2030cffa9940339c4cb174ff3c21bae37ffdbb3fdf0d1f8d00782cf8ea538

    SHA512

    04ceada910f580dce407b2a7ae36056131d1ec970056ed3b182216381cd50b83c5e98499d4ce38572b03fcdc59f271dc86cb2b65c2eb232b6fd144021da3d6b9

  • C:\Vid6Y\bodasys.exe

    Filesize

    2.5MB

    MD5

    9f26f3f5db56987edadbc6249ffdb3b1

    SHA1

    e9eb30e0c69b54648975c10b48916b2029d682c4

    SHA256

    ca122d3ccd89e6b59adf38a9338c506af349dcb903fae497b33e0eea15255f66

    SHA512

    69d514197839bfcbe024698badb87effa77e21b48402ad485b7025d15196d86cb34b29b3729649d9f47b5fcf813c284daf1eb93e0294596a53ce1728ebfba8ec

  • C:\Vid6Y\bodasys.exe

    Filesize

    2.6MB

    MD5

    998862e1dc86a699d17f504b57d375a0

    SHA1

    056a2f09bb0a3fa978a697b8b1e43c4335cafd28

    SHA256

    efd85f7bc3833f67ac1888e06ed39514bc5921eb8245309299195492a6d749f8

    SHA512

    065f5b3a3e99d7fc9d53bf7c99314a533b65aefb0877c89be063173ac7d714ff046b2e1ba6705bbaa9bc90a0e0418b6746d1b019ff8f053a6a2cd98fa660f6d0

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe

    Filesize

    2.6MB

    MD5

    840cfab799e34b442d7b5ed9ca0cc9c8

    SHA1

    212cbc961396f16b5787b6afab23e6b722865f39

    SHA256

    f0e7b8640727c505938e6284cc2b565d67c2bf1c6e90aa9bef25f01a893a7b82

    SHA512

    cdec6b19b49d77b2a0d2a11b17778c65b06a9eee6de44c144dccc66c2315c064b4c9de8fb79edbca69612767888c44347fc2b1bc81fc5760005d4f96b99ef460