Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
73b3d60a696c2c66f3e3af06eadb31c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73b3d60a696c2c66f3e3af06eadb31c0N.exe
Resource
win10v2004-20240704-en
General
-
Target
73b3d60a696c2c66f3e3af06eadb31c0N.exe
-
Size
2.7MB
-
MD5
73b3d60a696c2c66f3e3af06eadb31c0
-
SHA1
68b82d49ff655d52054aa42bbba2d887d823b9cd
-
SHA256
7dead53d7d8d5e8f1603477133b4ee25fca08faa1ee69743ed4777161e66af20
-
SHA512
7c6eb3a5902347565ca4a60e9ff868ab6ff7163c1b1a455cadf601eaaa8c9429ee66d61414d32bc77efe471de430af7fd0fc50286c9fd6507f3664cfe98bd6e4
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBy9w4Sx:+R0pI/IQlUoMPdmpSps4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 732 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotCT\\devdobsys.exe" 73b3d60a696c2c66f3e3af06eadb31c0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintQP\\bodasys.exe" 73b3d60a696c2c66f3e3af06eadb31c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b3d60a696c2c66f3e3af06eadb31c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin&::+>+&9+7381&3-<9=90>&!38.9A=&>+<>�\8?&<91<+7=&>+<>?:&sysdevdob.exe 73b3d60a696c2c66f3e3af06eadb31c0N.exe File created C:\Users\Admin&::+>+&9+7381&3-<9=90>&!38.9A=&>+<>�\8?&<91<+7=&>+<>?:&sysdevdob.exe devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 732 devdobsys.exe 732 devdobsys.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3648 wrote to memory of 732 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 86 PID 3648 wrote to memory of 732 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 86 PID 3648 wrote to memory of 732 3648 73b3d60a696c2c66f3e3af06eadb31c0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b3d60a696c2c66f3e3af06eadb31c0N.exe"C:\Users\Admin\AppData\Local\Temp\73b3d60a696c2c66f3e3af06eadb31c0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\UserDotCT\devdobsys.exeC:\UserDotCT\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5863740fab4c4ad617b99443bb3d5af83
SHA1b6d81cfcdac7aa0359ad6eade45bba34f8fe194e
SHA256f850b0894ff34f2240ad300414e7ab8c0c8c6b1f632af2e6b67627bf0c06db97
SHA512a8f3700f57375d03f08660613c3b348ba49c5b431216df0318f43b391159f6cd675f1d1a6d3ab672761bedbf019196bf58f9891a5b31a32edf74b184db407fab
-
Filesize
2.7MB
MD56fbea006e8e2aa4b63a198f48c36a453
SHA129dce73d1d4f03459901c1dfb3347fc8aa2f2463
SHA2561c5175010d0eebe6fb14564fdfa2614d2026123ec2070d7b0ece78f7a7b17dea
SHA512f8a057c274567822e4096493bd2f6dbfba75ebdb633f2d808e937094dfb05ebc39247b1800e982781ef30e8eb457f80170e569c508518b3cc3a6d0224a09fabc
-
Filesize
206B
MD57f71435b0ee2682c049252cae2075507
SHA115007b2f1406b40c8719b3be14d62b4a3d46db9c
SHA256e7c141412f7a8311f823b81668f04c1c582b320d10aa4765dc40aa03d58e1458
SHA512f626ca891d816d876ee322a837951ae613981a96cfaabbdb5ef6280494fe4e2d42809d8c7ead3c3e898da9de1fd6d0fcea6ff85fc7eb8e03a2d93738055599fa