Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe
Resource
win10v2004-20240709-en
General
-
Target
40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe
-
Size
2.8MB
-
MD5
8112936847b2fe4d5935e0198f79208f
-
SHA1
6a6ecf649cf44c328c35660d12d80336f018f791
-
SHA256
40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159
-
SHA512
822b5d128c10f041132e372a9474a967c15a8c3b8a4e7ec51bfb71db74b06cc6b0289f9fa514f26d8104dfe9e0c6a4fe7032803d3e4b494113ef6f5fd2557751
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBpB/bSqz8:sxX7QnxrloE5dpUpebVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe -
Executes dropped EXE 2 IoCs
pid Process 2840 locdevdob.exe 4632 devbodsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocWU\\devbodsys.exe" 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ43\\dobxsys.exe" 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe 2840 locdevdob.exe 2840 locdevdob.exe 4632 devbodsys.exe 4632 devbodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2840 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 85 PID 2936 wrote to memory of 2840 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 85 PID 2936 wrote to memory of 2840 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 85 PID 2936 wrote to memory of 4632 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 86 PID 2936 wrote to memory of 4632 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 86 PID 2936 wrote to memory of 4632 2936 40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe"C:\Users\Admin\AppData\Local\Temp\40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\IntelprocWU\devbodsys.exeC:\IntelprocWU\devbodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5f5b7fc2f47bed295c81661848ed9b720
SHA1e9009e3f5257ab58532bd303eafd4b5006c8a892
SHA256184a6e58f4c01d0f2736d4af57a1c104a74c2d287510029e4f639cf33001ebbf
SHA51232b446a8eff00bfbece48a8c05f0b79f5c0795ce89c95bb035e8b95109ac553ea1eabb30574947b39f0a7fcc150daf6baa279b260b9ccdfeef6da6c8016cdc15
-
Filesize
2.8MB
MD53dcbb00e297345e16df0d6600c9d67f0
SHA173dfb5d175e83dfc96060e708b902c251d530248
SHA256b57b3055a55e3e5fd1c400bd40573495cbf8667c48718daaeb53bc101e914deb
SHA51297b33421dcd54b71362b56815a269a1120832c66245d15bc2fd740d10046a68dc883dfc62cd090eaead81ce9665d7c44d2d75362b7ef37fbc7891fb2b8b0f97a
-
Filesize
14KB
MD55ffab038d17d47771c031d3b701e0cc5
SHA174d331d26e5210e7e523c750b0080e1641bb61f5
SHA2561b2bb8b0c13c9e1418b1e48501e2a62606e0e890934e027d746c196943068982
SHA512fad3e0cee5656b4fb350050395b6d8039f870087a145394dfc2eab77587a10e53b2e421be937a90a9a80244cbd3096e07f785a35d7df3b5efb0e258ca75678ec
-
Filesize
442KB
MD5375fc69e97c2ba80504cdcf38a5fc1c2
SHA130d6b65963cde126f84ceb99f5fc5b17169c23f9
SHA25646d8b5b18e3f2118af086c35381cda3309132e356044fe3792fc94eef94fdc58
SHA5120d5bf229e2cc63ecc0df857c5019955f2cddf893ee850e8f8a2d90cccaf0613e24466dcd1b5cb1924d94412b4d694699868eb6354fff1170cae7fd13a443225c
-
Filesize
208B
MD5b3bd2c5529a62ef431e8fadd95705277
SHA1655c0b0c0eafa7943a99fe308d1ca8968bb0cd96
SHA2561071cccb239a4588fd4475ddcf94b2965a9971505ad49ad0bb498ff9f94265a6
SHA5122673cad663a2878099f83f266ff1c9f6e768598fe2fb1e6dca282406d5199ac90181ad66f5f8f372e9e07045e4428d99a7d4fb562e537f63137d4da756fd14ab
-
Filesize
176B
MD54b6f1f85ba5e458b7d7705c26886b47d
SHA19268a51dac8155a0dfc8fc9a526ca4c026b845e7
SHA256942c0b9615186712a5fab55ab7b3ab8832f1f1ed42ba0ddb766fc717e52e9c47
SHA5122a77dc9df1338243fa07ea6aaf1e8caa0088c0966b19768776217b4e6cb01c16c8c4044fef5f4d717062c0efdcef179518373e4aed5091df01a7d1529d7f0d42
-
Filesize
2.8MB
MD5cfa6772baaa7d208a64398a97d0b9c23
SHA11ebac9ac5d88f10662a82537f9c0ee2a76a7028b
SHA25638540ac3a504b7fc194fc95531c4e4167a06082623878a8113e98efcb2d704d3
SHA512f40899d31ba93ed84f1c29ae89735eeeab5f60352e1f7965835ada2391e56b80d5fc19e74e873f7bc16cd463662a06ff8796afde945f93fd1035ed5ec2f10f37