Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe
Resource
win10v2004-20240709-en
General
-
Target
3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe
-
Size
2.6MB
-
MD5
8141c1fe0804585aa560ad12d792015c
-
SHA1
222ba96a6c9053553ab9d3220b6f2337482ab859
-
SHA256
3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba
-
SHA512
1b588df6aec944a9b5396158b2ccdc5c281f5716643bf374d7d768e2b4157e97438e6ec209c9d79f09f2e9870e961f43f4949b507cf23bcd8999da691a7036bd
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBHB/bS:sxX7QnxrloE5dpUpgb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe -
Executes dropped EXE 2 IoCs
pid Process 1968 locdevopti.exe 2276 xdobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesW5\\xdobloc.exe" 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid6Y\\bodasys.exe" 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe 1968 locdevopti.exe 2276 xdobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1968 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 29 PID 2320 wrote to memory of 1968 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 29 PID 2320 wrote to memory of 1968 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 29 PID 2320 wrote to memory of 1968 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 29 PID 2320 wrote to memory of 2276 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 30 PID 2320 wrote to memory of 2276 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 30 PID 2320 wrote to memory of 2276 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 30 PID 2320 wrote to memory of 2276 2320 3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe"C:\Users\Admin\AppData\Local\Temp\3bcbbf53f0666b927d0cb4e2e2cf26756c08532047cbd4fd90f44cb9974951ba.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\FilesW5\xdobloc.exeC:\FilesW5\xdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5423899fc0466f39c3590114cc8e9a082
SHA10762592f7a5369fbb835ce9e35c3ffbb8eff804f
SHA256fb7d17df82651dcf939ce97f79b01fe75dafd433ecba7a92de2dfa19834209a2
SHA51217c0e1e34383bbf88f6d4c4810ffa92e78b2702c69c726d935fee0013180af71f7d6f95953aaa3a30f24e38aacac604f48767b293d75e77a37c3bb0e59ba655b
-
Filesize
170B
MD5a4173e35dc571d9c0cd3570090108a07
SHA11d01aa740edc2602edd9539a06c3ebead1f14fa7
SHA25656e8426f0c73b956f4ce6c5ffbf1b0e8bd252094b4187edd2324b5715b1e5825
SHA51213e7af82cceb1c3df1db2f48f3736bd16a05e0394d37816440d149f5720f8b8090bf38442b008007176373f7b3f3ac1013bf4cb6837a619cd2d29bab4ab9cbff
-
Filesize
202B
MD5f63d16efaea37d63bac1aeb26d59a4d4
SHA18162e8c9971eba89638baeed0402eb548afd8856
SHA2569bd2030cffa9940339c4cb174ff3c21bae37ffdbb3fdf0d1f8d00782cf8ea538
SHA51204ceada910f580dce407b2a7ae36056131d1ec970056ed3b182216381cd50b83c5e98499d4ce38572b03fcdc59f271dc86cb2b65c2eb232b6fd144021da3d6b9
-
Filesize
2.5MB
MD59f26f3f5db56987edadbc6249ffdb3b1
SHA1e9eb30e0c69b54648975c10b48916b2029d682c4
SHA256ca122d3ccd89e6b59adf38a9338c506af349dcb903fae497b33e0eea15255f66
SHA51269d514197839bfcbe024698badb87effa77e21b48402ad485b7025d15196d86cb34b29b3729649d9f47b5fcf813c284daf1eb93e0294596a53ce1728ebfba8ec
-
Filesize
2.6MB
MD5998862e1dc86a699d17f504b57d375a0
SHA1056a2f09bb0a3fa978a697b8b1e43c4335cafd28
SHA256efd85f7bc3833f67ac1888e06ed39514bc5921eb8245309299195492a6d749f8
SHA512065f5b3a3e99d7fc9d53bf7c99314a533b65aefb0877c89be063173ac7d714ff046b2e1ba6705bbaa9bc90a0e0418b6746d1b019ff8f053a6a2cd98fa660f6d0
-
Filesize
2.6MB
MD5840cfab799e34b442d7b5ed9ca0cc9c8
SHA1212cbc961396f16b5787b6afab23e6b722865f39
SHA256f0e7b8640727c505938e6284cc2b565d67c2bf1c6e90aa9bef25f01a893a7b82
SHA512cdec6b19b49d77b2a0d2a11b17778c65b06a9eee6de44c144dccc66c2315c064b4c9de8fb79edbca69612767888c44347fc2b1bc81fc5760005d4f96b99ef460