Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 21:48

General

  • Target

    40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe

  • Size

    2.8MB

  • MD5

    8112936847b2fe4d5935e0198f79208f

  • SHA1

    6a6ecf649cf44c328c35660d12d80336f018f791

  • SHA256

    40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159

  • SHA512

    822b5d128c10f041132e372a9474a967c15a8c3b8a4e7ec51bfb71db74b06cc6b0289f9fa514f26d8104dfe9e0c6a4fe7032803d3e4b494113ef6f5fd2557751

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBpB/bSqz8:sxX7QnxrloE5dpUpebVz8

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe
    "C:\Users\Admin\AppData\Local\Temp\40d511e1a42b30fe70c3eea20f8b3ce5dddd5c9c77e7086952fb0d4686e0a159.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2840
    • C:\IntelprocWU\devbodsys.exe
      C:\IntelprocWU\devbodsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocWU\devbodsys.exe

    Filesize

    388KB

    MD5

    f5b7fc2f47bed295c81661848ed9b720

    SHA1

    e9009e3f5257ab58532bd303eafd4b5006c8a892

    SHA256

    184a6e58f4c01d0f2736d4af57a1c104a74c2d287510029e4f639cf33001ebbf

    SHA512

    32b446a8eff00bfbece48a8c05f0b79f5c0795ce89c95bb035e8b95109ac553ea1eabb30574947b39f0a7fcc150daf6baa279b260b9ccdfeef6da6c8016cdc15

  • C:\IntelprocWU\devbodsys.exe

    Filesize

    2.8MB

    MD5

    3dcbb00e297345e16df0d6600c9d67f0

    SHA1

    73dfb5d175e83dfc96060e708b902c251d530248

    SHA256

    b57b3055a55e3e5fd1c400bd40573495cbf8667c48718daaeb53bc101e914deb

    SHA512

    97b33421dcd54b71362b56815a269a1120832c66245d15bc2fd740d10046a68dc883dfc62cd090eaead81ce9665d7c44d2d75362b7ef37fbc7891fb2b8b0f97a

  • C:\LabZ43\dobxsys.exe

    Filesize

    14KB

    MD5

    5ffab038d17d47771c031d3b701e0cc5

    SHA1

    74d331d26e5210e7e523c750b0080e1641bb61f5

    SHA256

    1b2bb8b0c13c9e1418b1e48501e2a62606e0e890934e027d746c196943068982

    SHA512

    fad3e0cee5656b4fb350050395b6d8039f870087a145394dfc2eab77587a10e53b2e421be937a90a9a80244cbd3096e07f785a35d7df3b5efb0e258ca75678ec

  • C:\LabZ43\dobxsys.exe

    Filesize

    442KB

    MD5

    375fc69e97c2ba80504cdcf38a5fc1c2

    SHA1

    30d6b65963cde126f84ceb99f5fc5b17169c23f9

    SHA256

    46d8b5b18e3f2118af086c35381cda3309132e356044fe3792fc94eef94fdc58

    SHA512

    0d5bf229e2cc63ecc0df857c5019955f2cddf893ee850e8f8a2d90cccaf0613e24466dcd1b5cb1924d94412b4d694699868eb6354fff1170cae7fd13a443225c

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    208B

    MD5

    b3bd2c5529a62ef431e8fadd95705277

    SHA1

    655c0b0c0eafa7943a99fe308d1ca8968bb0cd96

    SHA256

    1071cccb239a4588fd4475ddcf94b2965a9971505ad49ad0bb498ff9f94265a6

    SHA512

    2673cad663a2878099f83f266ff1c9f6e768598fe2fb1e6dca282406d5199ac90181ad66f5f8f372e9e07045e4428d99a7d4fb562e537f63137d4da756fd14ab

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    176B

    MD5

    4b6f1f85ba5e458b7d7705c26886b47d

    SHA1

    9268a51dac8155a0dfc8fc9a526ca4c026b845e7

    SHA256

    942c0b9615186712a5fab55ab7b3ab8832f1f1ed42ba0ddb766fc717e52e9c47

    SHA512

    2a77dc9df1338243fa07ea6aaf1e8caa0088c0966b19768776217b4e6cb01c16c8c4044fef5f4d717062c0efdcef179518373e4aed5091df01a7d1529d7f0d42

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe

    Filesize

    2.8MB

    MD5

    cfa6772baaa7d208a64398a97d0b9c23

    SHA1

    1ebac9ac5d88f10662a82537f9c0ee2a76a7028b

    SHA256

    38540ac3a504b7fc194fc95531c4e4167a06082623878a8113e98efcb2d704d3

    SHA512

    f40899d31ba93ed84f1c29ae89735eeeab5f60352e1f7965835ada2391e56b80d5fc19e74e873f7bc16cd463662a06ff8796afde945f93fd1035ed5ec2f10f37