Analysis
-
max time kernel
120s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
e82387b49d44264cfd7db3bf471d8b20N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e82387b49d44264cfd7db3bf471d8b20N.exe
Resource
win10v2004-20240709-en
General
-
Target
e82387b49d44264cfd7db3bf471d8b20N.exe
-
Size
2.6MB
-
MD5
e82387b49d44264cfd7db3bf471d8b20
-
SHA1
ea313021c10c044f498917e1b1857c8c6bf33dd7
-
SHA256
17d734017eaf64219118de0e64197f86874856476ce59bb451f7dc6f1bec3625
-
SHA512
6ad5079b5248a4ec0d5795926a7600159a100ab904063484e10458e75c434b55c6a605522ef8617fe7efca41d8ff088f671ab489b0bad3e58febfac49022f889
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUpQb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe e82387b49d44264cfd7db3bf471d8b20N.exe -
Executes dropped EXE 2 IoCs
pid Process 768 locabod.exe 3652 xdobsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvYB\\xdobsys.exe" e82387b49d44264cfd7db3bf471d8b20N.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZBK\\dobaec.exe" e82387b49d44264cfd7db3bf471d8b20N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e82387b49d44264cfd7db3bf471d8b20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 e82387b49d44264cfd7db3bf471d8b20N.exe 856 e82387b49d44264cfd7db3bf471d8b20N.exe 856 e82387b49d44264cfd7db3bf471d8b20N.exe 856 e82387b49d44264cfd7db3bf471d8b20N.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe 768 locabod.exe 768 locabod.exe 3652 xdobsys.exe 3652 xdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 856 wrote to memory of 768 856 e82387b49d44264cfd7db3bf471d8b20N.exe 87 PID 856 wrote to memory of 768 856 e82387b49d44264cfd7db3bf471d8b20N.exe 87 PID 856 wrote to memory of 768 856 e82387b49d44264cfd7db3bf471d8b20N.exe 87 PID 856 wrote to memory of 3652 856 e82387b49d44264cfd7db3bf471d8b20N.exe 90 PID 856 wrote to memory of 3652 856 e82387b49d44264cfd7db3bf471d8b20N.exe 90 PID 856 wrote to memory of 3652 856 e82387b49d44264cfd7db3bf471d8b20N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82387b49d44264cfd7db3bf471d8b20N.exe"C:\Users\Admin\AppData\Local\Temp\e82387b49d44264cfd7db3bf471d8b20N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\SysDrvYB\xdobsys.exeC:\SysDrvYB\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5c65ef790a3b920e72019a5a082eae45b
SHA1ad4694cec9a729746b1061f490652530938d8d4c
SHA2561bc79fdba1d3925ec686778ab165ffce446cf0d46d379f3993c918e54e0259de
SHA5124d7b28c8f564956da75ab384e67d696c6c63b6e146538402a239c47938e5d956436a1bffc77324e2afc4262063b8523c5fbcccd5a00e8cc9ef62c06f157f127c
-
Filesize
7KB
MD5c5a11c20435bf167b7ef33a92d131f4b
SHA1c88559847d49a4715d86999f6bdf7f3a710b55a8
SHA256186493aa3c8ae67d8a6672ff6b522c91a36ab2b4a1859de6cd024fde6cca526f
SHA512a9ab8a378a0eb79b224d30ae559dff6a73633c0f999b60e3331479037dc18e3d1bae1bc28941f4b94b6ac102190b5899adc9a706d3a4af95dd8c65e897f34335
-
Filesize
2.6MB
MD55ff333386a453d4371d3be10a5e47682
SHA1c95e4d49739a49c70d3a48f750bea0c2d8d708cb
SHA2565073e2cc23b94f3fc314b4f3ba4eb1a8d5bfc223db71f21dbb77cbff6cea19c0
SHA512c0bb5da10b0567af1e0bc26da6aeb463b94ce64dd4a2ac36424b3a695785349ddee798ca4a22f52115a6774aca2c581fbb8d7f02fb1d40d5157e1895569b9a38
-
Filesize
200B
MD582d0c95c8e41c977f16a8058e1cf35d4
SHA1443b82b7f6cacb114bdec5e556d4b670d1d3bb58
SHA256f16c077a4abfd3989c7ed0649353d2337953633a4c356f0c7dccc717301d071c
SHA5126f21a2621e5c9cf1d74eafdc72ec24244364320fae3d72ab943b0117ce8a96edf5ba012bcc15f68f7ae9aa03fc32d95b10e754a21e111440512b972b9737f648
-
Filesize
168B
MD5b4be5ded6c0e8f8f98e5f2cc42ed36f6
SHA1240bc7bfa266b8084570a10f5eb9bab5bb53feb2
SHA256525f98a5d978fe6ba36c54c186ccfdb4762da694daa9ce154c33771f88a9cffb
SHA51216490ef8854fc734b87d1a5a4cb493c9950c062cf302d2eaf8d9475be365ba33e8a98413dde440282b92d8d9b904b8c7d1de4a3385e500b8b00458b417a9b627
-
Filesize
2.6MB
MD54f354e7b22385b739e3710b48c7ab996
SHA1e5af9ec753fe0d67e3d503300955f6991ebaa660
SHA256ba68b67dcc960c3e6f77f57823658d3e8dfcb6b32d93f0a9b926d92a30a48c83
SHA5120bb1e0824af6c0e13ba72a7459595d28bd9ac83aed5b9e368d6b5dc0d14b56f195ee0e890110372cb19379cc862cac637b35de6437067a0106c51b740b87a806