Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
55f62bbd5be1c1c833dd9a1d34916a00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
55f62bbd5be1c1c833dd9a1d34916a00N.exe
Resource
win10v2004-20240709-en
General
-
Target
55f62bbd5be1c1c833dd9a1d34916a00N.exe
-
Size
2.7MB
-
MD5
55f62bbd5be1c1c833dd9a1d34916a00
-
SHA1
d44afe72a30234be686f34b7a84bc0c66d74a8b6
-
SHA256
3436e4d94e0fc1d5d6c678e5b04d227b99c437e5fe1a49549c62cad03777a649
-
SHA512
46a6dd8ab95adc7bc89d8adeef9b5d082298d9ce7c824408e513ca3b5c5a58c1ec64fa841328af170c329227c13e2965c8b3e3e951a51e0f0d9e5909685705b4
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBg9w4Sx:+R0pI/IQlUoMPdmpSp24
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesH2\\xdobsys.exe" 55f62bbd5be1c1c833dd9a1d34916a00N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ1T\\boddevec.exe" 55f62bbd5be1c1c833dd9a1d34916a00N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55f62bbd5be1c1c833dd9a1d34916a00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 2012 xdobsys.exe 2012 xdobsys.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 2012 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 87 PID 3936 wrote to memory of 2012 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 87 PID 3936 wrote to memory of 2012 3936 55f62bbd5be1c1c833dd9a1d34916a00N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\55f62bbd5be1c1c833dd9a1d34916a00N.exe"C:\Users\Admin\AppData\Local\Temp\55f62bbd5be1c1c833dd9a1d34916a00N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\FilesH2\xdobsys.exeC:\FilesH2\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5e6e701c6cded2b2fe118ba35cc766016
SHA1870994954c6debeadebf644592ed5005f9187df1
SHA2562addc892a3025c841aa780d9a46c0b1206ee12916573777ef73359f08fa256b9
SHA51208465559287b66ce9b06a6b9ac8d1e079d87d4fafad625122538f9c96643d455a5dc57cbf19cbe5ed7a7b26f99033aede3a83f70659ac658f48125a183b1e9aa
-
Filesize
3KB
MD5a1e5d914a4b78d0f377ebb20f4b1a72e
SHA17d7a4e76debe739781c2eeb132f7d7d7b86cba21
SHA256a33ace6a26353e6796f071da1660694215dc3a37cc03cdf3b25039861b3c578b
SHA512c89f69b89d2e89f5c8673313fde2e92e573748c6197d34a25ed35bfebcc4719a8db9152745b9c8b7812164ce0abca2c0d64ffd25354482eebde0f1f5108db328
-
Filesize
2.7MB
MD57d3e5c263f1477a294dbf29cbc849a07
SHA102eb013267df3b1d39a730efa7d50601d0085c12
SHA256c8466087b22874d54c5935065773f40229358a347dbaf36ea3e33a6cd86f146c
SHA512003faceb979c3a6b439ab0bb8926021f04c7728164f13d9d886ca3121348beeed7c708614abba9473ccddc98c00335712fe844cd20cbbb54694abdb5bc900e00
-
Filesize
201B
MD5ca49b4746a8cd831bfdecba5a18ba9b9
SHA1849a027b87b8301ac38f24bfd8c416feec50d995
SHA2561598ea3adde4363c4e3b742ebc74c8049d61dd44b1946645570e3ed41dcd622c
SHA51210a2316526a2a25a8c8e95455f632a0e868d21b93c99b1eeb4cf2d4b2a0d9ac590e019e0e8970375589e9c62ae1dbb04345b52e96328dc25d46f8e5ea9066459