Analysis

  • max time kernel
    120s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 06:15

General

  • Target

    8d2885dfb42f76749e19af91852a2390N.exe

  • Size

    3.1MB

  • MD5

    8d2885dfb42f76749e19af91852a2390

  • SHA1

    cc8978ce74556bd98ba2555b6912c04df608f09b

  • SHA256

    ec50d372a29bfc21c87d4462a3aa358f6803dc35fff6bfd3236e61aaa5a25644

  • SHA512

    32fd9e9e2765e41023a8f424bcfaa52012a42272e742a6597d0174ef043c2988a812191b6da07a5a59907d037c13ed951cefe9ed25eb6ba9dbbe8da07a14b2f3

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBp9w4Su+LNfej:+R0pI/IQlUoMPdmpSpx4JkNfej

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d2885dfb42f76749e19af91852a2390N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d2885dfb42f76749e19af91852a2390N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Intelproc04\devbodsys.exe
      C:\Intelproc04\devbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Intelproc04\devbodsys.exe

          Filesize

          3.1MB

          MD5

          007cf2b53f6a0f36336d32a8fcff6c4e

          SHA1

          be6cd1afb1d7ce398d6648b0f57ebaefcb1c8055

          SHA256

          ca5a910694fe0870962dfdc8c2dec1c28ace4ff5d998f6d308e222fd5e9aba37

          SHA512

          7c0b92023eeea4095860aed6ab76e57592e6a2eba44f727ce809d3aa7435eb28b751ef4332a726fb23a7d7ab56a3e055c44bfa358b621e08ece0fc3e75a51f08

        • C:\MintXG\dobxsys.exe

          Filesize

          3.1MB

          MD5

          ecc03873d0ae2942f9ad15da9c3cfe23

          SHA1

          3fc4fd445319731884b516382f9cf4474253d501

          SHA256

          6cd951c3d886faf1de1b8edd2687205f0f640b1d4aa9dc4de83400d6665da808

          SHA512

          68ecef5a4cbc3520d1eb49fdc3aece75b606d78fc965e02271a511b393c674364683f59e5914cad0b835cd88ea5db6fc1c23768dd698c955e8205e772708e908

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          209B

          MD5

          b975005f461850bf7eeccea9618dcbe3

          SHA1

          8be26b5d3872517adbf9389ee846d0ac707fc7f2

          SHA256

          f181ef1480341f05e65456b47ba42f117f241d6ffa810fb219ccd1d0501347e2

          SHA512

          07a3f69a43e2aae9f47aee396ca631e13f0900111a2b9841f4949499823b7a64d15553768cdaa6265a84970879dce0a0d8996a5a817462bece6eb21ef2538077