Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 17:59

General

  • Target

    e82387b49d44264cfd7db3bf471d8b20N.exe

  • Size

    2.6MB

  • MD5

    e82387b49d44264cfd7db3bf471d8b20

  • SHA1

    ea313021c10c044f498917e1b1857c8c6bf33dd7

  • SHA256

    17d734017eaf64219118de0e64197f86874856476ce59bb451f7dc6f1bec3625

  • SHA512

    6ad5079b5248a4ec0d5795926a7600159a100ab904063484e10458e75c434b55c6a605522ef8617fe7efca41d8ff088f671ab489b0bad3e58febfac49022f889

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBPB/bS:sxX7QnxrloE5dpUpQb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e82387b49d44264cfd7db3bf471d8b20N.exe
    "C:\Users\Admin\AppData\Local\Temp\e82387b49d44264cfd7db3bf471d8b20N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:768
    • C:\SysDrvYB\xdobsys.exe
      C:\SysDrvYB\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZBK\dobaec.exe

    Filesize

    2.6MB

    MD5

    c65ef790a3b920e72019a5a082eae45b

    SHA1

    ad4694cec9a729746b1061f490652530938d8d4c

    SHA256

    1bc79fdba1d3925ec686778ab165ffce446cf0d46d379f3993c918e54e0259de

    SHA512

    4d7b28c8f564956da75ab384e67d696c6c63b6e146538402a239c47938e5d956436a1bffc77324e2afc4262063b8523c5fbcccd5a00e8cc9ef62c06f157f127c

  • C:\LabZBK\dobaec.exe

    Filesize

    7KB

    MD5

    c5a11c20435bf167b7ef33a92d131f4b

    SHA1

    c88559847d49a4715d86999f6bdf7f3a710b55a8

    SHA256

    186493aa3c8ae67d8a6672ff6b522c91a36ab2b4a1859de6cd024fde6cca526f

    SHA512

    a9ab8a378a0eb79b224d30ae559dff6a73633c0f999b60e3331479037dc18e3d1bae1bc28941f4b94b6ac102190b5899adc9a706d3a4af95dd8c65e897f34335

  • C:\SysDrvYB\xdobsys.exe

    Filesize

    2.6MB

    MD5

    5ff333386a453d4371d3be10a5e47682

    SHA1

    c95e4d49739a49c70d3a48f750bea0c2d8d708cb

    SHA256

    5073e2cc23b94f3fc314b4f3ba4eb1a8d5bfc223db71f21dbb77cbff6cea19c0

    SHA512

    c0bb5da10b0567af1e0bc26da6aeb463b94ce64dd4a2ac36424b3a695785349ddee798ca4a22f52115a6774aca2c581fbb8d7f02fb1d40d5157e1895569b9a38

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    200B

    MD5

    82d0c95c8e41c977f16a8058e1cf35d4

    SHA1

    443b82b7f6cacb114bdec5e556d4b670d1d3bb58

    SHA256

    f16c077a4abfd3989c7ed0649353d2337953633a4c356f0c7dccc717301d071c

    SHA512

    6f21a2621e5c9cf1d74eafdc72ec24244364320fae3d72ab943b0117ce8a96edf5ba012bcc15f68f7ae9aa03fc32d95b10e754a21e111440512b972b9737f648

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    168B

    MD5

    b4be5ded6c0e8f8f98e5f2cc42ed36f6

    SHA1

    240bc7bfa266b8084570a10f5eb9bab5bb53feb2

    SHA256

    525f98a5d978fe6ba36c54c186ccfdb4762da694daa9ce154c33771f88a9cffb

    SHA512

    16490ef8854fc734b87d1a5a4cb493c9950c062cf302d2eaf8d9475be365ba33e8a98413dde440282b92d8d9b904b8c7d1de4a3385e500b8b00458b417a9b627

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

    Filesize

    2.6MB

    MD5

    4f354e7b22385b739e3710b48c7ab996

    SHA1

    e5af9ec753fe0d67e3d503300955f6991ebaa660

    SHA256

    ba68b67dcc960c3e6f77f57823658d3e8dfcb6b32d93f0a9b926d92a30a48c83

    SHA512

    0bb1e0824af6c0e13ba72a7459595d28bd9ac83aed5b9e368d6b5dc0d14b56f195ee0e890110372cb19379cc862cac637b35de6437067a0106c51b740b87a806