Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
827846ec3eac018ac435d773097961e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
827846ec3eac018ac435d773097961e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
827846ec3eac018ac435d773097961e0N.exe
-
Size
3.1MB
-
MD5
827846ec3eac018ac435d773097961e0
-
SHA1
dfad886295e6ad43700d49f4763452f5e84491be
-
SHA256
739f5ce1d49813d3ba06d897882509903cc840daf62d36486aa9524600e567c4
-
SHA512
6c14e0521ba16a7a24ac91fd1a29a539cacfdf16ed087c061fac64fa8ce575e2ef8ece730be56f3a5b6aebb991271f4368d6a792faba9096b7b4bbf8fc59779f
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBY9w4Su+LNfej:+R0pI/IQlUoMPdmpSpi4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 xdobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotG2\\xdobloc.exe" 827846ec3eac018ac435d773097961e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZIV\\boddevsys.exe" 827846ec3eac018ac435d773097961e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 827846ec3eac018ac435d773097961e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe 4852 xdobloc.exe 4852 xdobloc.exe 3356 827846ec3eac018ac435d773097961e0N.exe 3356 827846ec3eac018ac435d773097961e0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4852 3356 827846ec3eac018ac435d773097961e0N.exe 88 PID 3356 wrote to memory of 4852 3356 827846ec3eac018ac435d773097961e0N.exe 88 PID 3356 wrote to memory of 4852 3356 827846ec3eac018ac435d773097961e0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\827846ec3eac018ac435d773097961e0N.exe"C:\Users\Admin\AppData\Local\Temp\827846ec3eac018ac435d773097961e0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\UserDotG2\xdobloc.exeC:\UserDotG2\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e11352913ff8e70ebc7a57ff16cb3b75
SHA122bf1211f114147990794d6e2bfbc1b655ba8656
SHA256809b66fd2b874c9ca15b73ca2fb12387a4cc68214f184b632abe6b25e2575912
SHA51256a819c3653aa88029d81549ae6986caf74ab7097f1f88786d07764592b1591e093d90069daae0a452f0d888c7d115c14cbf68e51a81fe509202770e123d3a21
-
Filesize
3.1MB
MD5178ce337406b6b23f7606e08ef74c566
SHA1c9c1a9790ae831389246f326ce62bdf484649172
SHA25666f486feb66f0223b42a33b4c544c31413b08e1b39aeed111e749340f985c386
SHA51254cc323dce189a55be3b94cabd366c140b64a8b98eac6874491e3669c7ecd64ebd1c01a148d243a0afba2411fff25ba60ba2e17589bee8c3c16feda4e01aaaa0
-
Filesize
204B
MD55fde488c5acca1d132ec4312a997523c
SHA16bf0243cc114d9d7f05273fda01d39496f8eb286
SHA256f1c11aed500c6a9ef9be7b391dc6ed4edb5b2c6deafe1ea9ab205f800fd10006
SHA5124877a51b6e085e66790174836cd920542e9935890e522e7aaaefe87c5be1f39ae47157e12785fd10d81dbc36a520b0a8be8171adb01c6e336d0407ab1d856640