Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 01:13

General

  • Target

    a68adf4fea103c5f43036b7da7dae4ba8484ad32b7b83266bcf8147817b7b592.exe

  • Size

    2.6MB

  • MD5

    0c78f8752b54e17f04b38f0fd76b6e9d

  • SHA1

    61ebea8924e0dece82793998454dff1e1e33b2e1

  • SHA256

    a68adf4fea103c5f43036b7da7dae4ba8484ad32b7b83266bcf8147817b7b592

  • SHA512

    c1e02b8b2613a843dac795f80e27dcbe74d3c14968347dafe8f4f913adb4e74bd05cd524c6a555fbe6ee4734664c94ccfd86a9e4db3fb74fefb01b6c7e3b7121

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBZB/bS:sxX7QnxrloE5dpUpKb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a68adf4fea103c5f43036b7da7dae4ba8484ad32b7b83266bcf8147817b7b592.exe
    "C:\Users\Admin\AppData\Local\Temp\a68adf4fea103c5f43036b7da7dae4ba8484ad32b7b83266bcf8147817b7b592.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3080
    • C:\IntelprocVM\devbodloc.exe
      C:\IntelprocVM\devbodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocVM\devbodloc.exe

    Filesize

    206KB

    MD5

    eeac235b928d0fba3fa52837f42132cd

    SHA1

    2dd961d50771d81b29f4177fa1cab6d442bbc46a

    SHA256

    7b01accfd28116618def125470fd0bfcdd1b151e98888b3027fde945566d5b5c

    SHA512

    683cbb61657f3f79a5edd3385a8cfc5bbe364d54760e65eb3d52a0657d1d8b56eaffdebcc9f6037ab49a48355fe8c63b036a3e2289950615e7917972e56eb45d

  • C:\IntelprocVM\devbodloc.exe

    Filesize

    2.6MB

    MD5

    df81b4b7f3d7979116712f5c2298a063

    SHA1

    395eed967aaaf0adfad0ea41732522f9e5898bb2

    SHA256

    b36ec98b43c0b0e250b5ac062b6d6dabf307b5efc57964e29e6165af76fdab8c

    SHA512

    a79b3bf17242e164c301cc4a2891708d9657ef827356587fe6fc8c766c08bbaed0bc2d7c545160c3669b8a78441236abb3130f2f6fcb4b9cf5e3c0ba0e2eda24

  • C:\KaVBEE\optidevsys.exe

    Filesize

    2.6MB

    MD5

    9f899faa89cf3a02f5a427a89348b437

    SHA1

    b06ee5a392e713fe4f47536634d6ee04ee8f0326

    SHA256

    313405c385006fee1eb5b88f7e5e10da4c2e4dcab2cbbaeade2204fcdbbb846e

    SHA512

    621c25bd9fd312452a4abddafb1d7e2748536c6b4d53b331acca84437d28f08c3f437c891bdcf23d08e0ef82b517620fcd6b00f84f2b1b4cb16d1e26bdfa8e6a

  • C:\KaVBEE\optidevsys.exe

    Filesize

    2.6MB

    MD5

    1619a90cc345539397b07fbe3b6d665e

    SHA1

    dde490af08d64bd88888cfa07ba4fc48ae6de75b

    SHA256

    ad49c12a0d20b80326a5e45f32d33257db1305daeabef555ff6ecad8aa5825a9

    SHA512

    103df3f09ae97edf2d7bec407d089ef851bca3941e6d16cd9bd6bc1da73d8e50f9b0aa04c5338b718a878524cef779ef3892afa6820021a3bb85e56e2d4861d0

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    209B

    MD5

    22ef96908025583faed980994726fa5a

    SHA1

    7ca3b50f18160db7f12f9bf8785783d0b223423c

    SHA256

    760086432c0870a8b34ddf96482c90911e7ef4ece9f15548a900c698a2652a42

    SHA512

    adf84926e943fd0f9b3fbea51a566711c40383918e99413b6d77d35aa538ebe5543df15d2fc44622ad708cebc7c13958d73e605082020cb88747981f492a3d08

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    177B

    MD5

    a595a83ebde3dc9565c215100d986691

    SHA1

    34e3d85b78f52a415ec0a47c24b4c9e7e30012cb

    SHA256

    02b34af7460b374e5630b6ca5c5a64586cdba4e95049abf5045e700236684cee

    SHA512

    f1dd4a8f50a9806670604a660bd0994ff4b336113b6f1c3a1ef7cdb67316c405832c2df6b52c78ad2553ec82f62c88657125778da8f3dd2b61d01064499e1a69

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

    Filesize

    2.6MB

    MD5

    329161a9ba0bf3bbfde7a3c108f943b6

    SHA1

    907a345c03d3a595e7db078c54ef31b574ae9ea5

    SHA256

    50631c4b50d7f5b2dbe8ff44b492ecaae8af576c3597f849f38d486ec8f2d5a2

    SHA512

    94e7d8fea1b0663b61aea7b64aad0f8369a64f81397a57859374fc932f571b4e443502c49741e8d0443d49345e579b0c2beccd5e2af9247751e1515d88cb932e