Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
73b3d60a696c2c66f3e3af06eadb31c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73b3d60a696c2c66f3e3af06eadb31c0N.exe
Resource
win10v2004-20240704-en
General
-
Target
73b3d60a696c2c66f3e3af06eadb31c0N.exe
-
Size
2.7MB
-
MD5
73b3d60a696c2c66f3e3af06eadb31c0
-
SHA1
68b82d49ff655d52054aa42bbba2d887d823b9cd
-
SHA256
7dead53d7d8d5e8f1603477133b4ee25fca08faa1ee69743ed4777161e66af20
-
SHA512
7c6eb3a5902347565ca4a60e9ff868ab6ff7163c1b1a455cadf601eaaa8c9429ee66d61414d32bc77efe471de430af7fd0fc50286c9fd6507f3664cfe98bd6e4
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBy9w4Sx:+R0pI/IQlUoMPdmpSps4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1856 devdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotAS\\devdobloc.exe" 73b3d60a696c2c66f3e3af06eadb31c0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxT4\\optidevloc.exe" 73b3d60a696c2c66f3e3af06eadb31c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b3d60a696c2c66f3e3af06eadb31c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobloc.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin&::+>+&9+7381&3-<9=90>&!38.9A=&>+<>�\8?&<91<+7=&>+<>?:&locdevdob.exe devdobloc.exe File created C:\Users\Admin&::+>+&9+7381&3-<9=90>&!38.9A=&>+<>�\8?&<91<+7=&>+<>?:&locdevdob.exe 73b3d60a696c2c66f3e3af06eadb31c0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 1856 devdobloc.exe 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1856 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 30 PID 2508 wrote to memory of 1856 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 30 PID 2508 wrote to memory of 1856 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 30 PID 2508 wrote to memory of 1856 2508 73b3d60a696c2c66f3e3af06eadb31c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b3d60a696c2c66f3e3af06eadb31c0N.exe"C:\Users\Admin\AppData\Local\Temp\73b3d60a696c2c66f3e3af06eadb31c0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\UserDotAS\devdobloc.exeC:\UserDotAS\devdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD560721d1e7e3122c96fce877c29d70f5d
SHA14835fd370f160911d7013d60944de895fbd54c10
SHA256d6f4c1532cc2469a146d60478ff19ee33091e37d4a5bcf8fa4d5065655c9fa5e
SHA512bfdda040de17a56d168c3cf4813732294b0c8fcf8a1261ec78cd2f9c6fba4c9e929c6d533c8fb82a16d561c11bacf0aa0d3a7fe5b8fdef147d1b02d407fd4bde
-
Filesize
210B
MD56550cb133570c330f3de8895dca2fb34
SHA12e1a78ea4fe526608d614d86e83d48276e700bdd
SHA25681d7237596369a74cf90b746f8c19294a97342b88e808fc933ddd638bb0b13e0
SHA512fda834923842387e838c6711711e1aec3eda52dd6bdd644a922072b7d3c834206bda2138e4de1d53ed0592c73c9135977b2a243520313a3cd2c50e4c4fdd9c41
-
Filesize
2.7MB
MD5b5825777d8c4ad2621d4acf598dff018
SHA1b20e78525868b079040ffa5217a37ab069285257
SHA2563b0e3101c135f97d0e48b7f558aa4a37c70adfcb27f0fa2390f0c6f73c7a3a8c
SHA512a4e4447df06c35a72c4aa53d3eeb2284641c71ba6f884e48bc66b9795e084c65e004964a2220a0c748d1fd5e30e53a81b7f98a15291d13cbeefe6b0eb2c56c99