Analysis

  • max time kernel
    119s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 04:31

General

  • Target

    73b3d60a696c2c66f3e3af06eadb31c0N.exe

  • Size

    2.7MB

  • MD5

    73b3d60a696c2c66f3e3af06eadb31c0

  • SHA1

    68b82d49ff655d52054aa42bbba2d887d823b9cd

  • SHA256

    7dead53d7d8d5e8f1603477133b4ee25fca08faa1ee69743ed4777161e66af20

  • SHA512

    7c6eb3a5902347565ca4a60e9ff868ab6ff7163c1b1a455cadf601eaaa8c9429ee66d61414d32bc77efe471de430af7fd0fc50286c9fd6507f3664cfe98bd6e4

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBy9w4Sx:+R0pI/IQlUoMPdmpSps4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b3d60a696c2c66f3e3af06eadb31c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\73b3d60a696c2c66f3e3af06eadb31c0N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\UserDotCT\devdobsys.exe
      C:\UserDotCT\devdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      PID:732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MintQP\bodasys.exe

          Filesize

          32KB

          MD5

          863740fab4c4ad617b99443bb3d5af83

          SHA1

          b6d81cfcdac7aa0359ad6eade45bba34f8fe194e

          SHA256

          f850b0894ff34f2240ad300414e7ab8c0c8c6b1f632af2e6b67627bf0c06db97

          SHA512

          a8f3700f57375d03f08660613c3b348ba49c5b431216df0318f43b391159f6cd675f1d1a6d3ab672761bedbf019196bf58f9891a5b31a32edf74b184db407fab

        • C:\UserDotCT\devdobsys.exe

          Filesize

          2.7MB

          MD5

          6fbea006e8e2aa4b63a198f48c36a453

          SHA1

          29dce73d1d4f03459901c1dfb3347fc8aa2f2463

          SHA256

          1c5175010d0eebe6fb14564fdfa2614d2026123ec2070d7b0ece78f7a7b17dea

          SHA512

          f8a057c274567822e4096493bd2f6dbfba75ebdb633f2d808e937094dfb05ebc39247b1800e982781ef30e8eb457f80170e569c508518b3cc3a6d0224a09fabc

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          206B

          MD5

          7f71435b0ee2682c049252cae2075507

          SHA1

          15007b2f1406b40c8719b3be14d62b4a3d46db9c

          SHA256

          e7c141412f7a8311f823b81668f04c1c582b320d10aa4765dc40aa03d58e1458

          SHA512

          f626ca891d816d876ee322a837951ae613981a96cfaabbdb5ef6280494fe4e2d42809d8c7ead3c3e898da9de1fd6d0fcea6ff85fc7eb8e03a2d93738055599fa