Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
4ff69e733b627741368024d52821a350N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ff69e733b627741368024d52821a350N.exe
Resource
win10v2004-20240709-en
General
-
Target
4ff69e733b627741368024d52821a350N.exe
-
Size
2.7MB
-
MD5
4ff69e733b627741368024d52821a350
-
SHA1
2e4507c50283f0f88523cebf4b6cdda22f4c5dc8
-
SHA256
1cf44892d60f4698cb00cca833c100a9b1e5a8774186921c4580969dc211413f
-
SHA512
326c38ba2f8b448fc11069b032cc4cb100cd90040d6e6356b8ddd8f894eac700815a7e4eaba9d29a79da6917d9f922443f12b8517c2e4cb4bda3836d948123bf
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBy9w4Sx:+R0pI/IQlUoMPdmpSp44
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc91\\xdobsys.exe" 4ff69e733b627741368024d52821a350N.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintLK\\dobaec.exe" 4ff69e733b627741368024d52821a350N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff69e733b627741368024d52821a350N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe 1784 xdobsys.exe 1784 xdobsys.exe 4840 4ff69e733b627741368024d52821a350N.exe 4840 4ff69e733b627741368024d52821a350N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1784 4840 4ff69e733b627741368024d52821a350N.exe 87 PID 4840 wrote to memory of 1784 4840 4ff69e733b627741368024d52821a350N.exe 87 PID 4840 wrote to memory of 1784 4840 4ff69e733b627741368024d52821a350N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff69e733b627741368024d52821a350N.exe"C:\Users\Admin\AppData\Local\Temp\4ff69e733b627741368024d52821a350N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Intelproc91\xdobsys.exeC:\Intelproc91\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD540869ff59972eb6d41cab9f66b23e068
SHA19798c0ad066adc960e8db48e88650ecabb33b30a
SHA256372097776eb233ac303c601fd568a5cba44b8ae84bc5a141fe811410ed4c0473
SHA512cbfc910dcef5b15521cdb1581bdc4a4ae966131282248e6226ba1b02348f0f237c780a5f1287b73dcdba4fcc600d66255d0bafdfb5c1282475210badb02d3464
-
Filesize
2.7MB
MD5a4443e0ffecfc36357b1766545ca13cd
SHA1b32ba8609409c4be0295c1d33fb630f04bdf7d92
SHA25649d8726a619bb6460f9b4a6c2b30732b61631b8e821a0632c0a722c3f288e339
SHA5127b099225fbf41a8598d1769e151bfc86eec89179d0a87c00da358f2169af4deca3221382e62d77c7fefaf9f342d4eab8be2774b7e7bb53b326183d7255fc21bc
-
Filesize
202B
MD59faa5aa7dd896fa629f2c64f2f1c7b98
SHA1aa7c320ddf0ad21f71a078e096ccb954e3d234f0
SHA2561be72af2fe452a7636f7c82b26b221ca654af4da02b89f32b3f9bcd8b006ddb5
SHA512f18a0222c5528a09ab026a30a8919c44084d54b771fc11d4058936110345787db4106a8db597e8d01dd60662e836d8de3cc72f82573641a8ab6f703159f8944b