Analysis

  • max time kernel
    119s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 05:11

General

  • Target

    4ff69e733b627741368024d52821a350N.exe

  • Size

    2.7MB

  • MD5

    4ff69e733b627741368024d52821a350

  • SHA1

    2e4507c50283f0f88523cebf4b6cdda22f4c5dc8

  • SHA256

    1cf44892d60f4698cb00cca833c100a9b1e5a8774186921c4580969dc211413f

  • SHA512

    326c38ba2f8b448fc11069b032cc4cb100cd90040d6e6356b8ddd8f894eac700815a7e4eaba9d29a79da6917d9f922443f12b8517c2e4cb4bda3836d948123bf

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBy9w4Sx:+R0pI/IQlUoMPdmpSp44

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff69e733b627741368024d52821a350N.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff69e733b627741368024d52821a350N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Intelproc91\xdobsys.exe
      C:\Intelproc91\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Intelproc91\xdobsys.exe

    Filesize

    2.7MB

    MD5

    40869ff59972eb6d41cab9f66b23e068

    SHA1

    9798c0ad066adc960e8db48e88650ecabb33b30a

    SHA256

    372097776eb233ac303c601fd568a5cba44b8ae84bc5a141fe811410ed4c0473

    SHA512

    cbfc910dcef5b15521cdb1581bdc4a4ae966131282248e6226ba1b02348f0f237c780a5f1287b73dcdba4fcc600d66255d0bafdfb5c1282475210badb02d3464

  • C:\MintLK\dobaec.exe

    Filesize

    2.7MB

    MD5

    a4443e0ffecfc36357b1766545ca13cd

    SHA1

    b32ba8609409c4be0295c1d33fb630f04bdf7d92

    SHA256

    49d8726a619bb6460f9b4a6c2b30732b61631b8e821a0632c0a722c3f288e339

    SHA512

    7b099225fbf41a8598d1769e151bfc86eec89179d0a87c00da358f2169af4deca3221382e62d77c7fefaf9f342d4eab8be2774b7e7bb53b326183d7255fc21bc

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    202B

    MD5

    9faa5aa7dd896fa629f2c64f2f1c7b98

    SHA1

    aa7c320ddf0ad21f71a078e096ccb954e3d234f0

    SHA256

    1be72af2fe452a7636f7c82b26b221ca654af4da02b89f32b3f9bcd8b006ddb5

    SHA512

    f18a0222c5528a09ab026a30a8919c44084d54b771fc11d4058936110345787db4106a8db597e8d01dd60662e836d8de3cc72f82573641a8ab6f703159f8944b