Analysis
-
max time kernel
120s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
8d2885dfb42f76749e19af91852a2390N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d2885dfb42f76749e19af91852a2390N.exe
Resource
win10v2004-20240709-en
General
-
Target
8d2885dfb42f76749e19af91852a2390N.exe
-
Size
3.1MB
-
MD5
8d2885dfb42f76749e19af91852a2390
-
SHA1
cc8978ce74556bd98ba2555b6912c04df608f09b
-
SHA256
ec50d372a29bfc21c87d4462a3aa358f6803dc35fff6bfd3236e61aaa5a25644
-
SHA512
32fd9e9e2765e41023a8f424bcfaa52012a42272e742a6597d0174ef043c2988a812191b6da07a5a59907d037c13ed951cefe9ed25eb6ba9dbbe8da07a14b2f3
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBp9w4Su+LNfej:+R0pI/IQlUoMPdmpSpx4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 devbodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintXG\\dobxsys.exe" 8d2885dfb42f76749e19af91852a2390N.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc04\\devbodsys.exe" 8d2885dfb42f76749e19af91852a2390N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d2885dfb42f76749e19af91852a2390N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 5012 devbodsys.exe 5012 devbodsys.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe 1652 8d2885dfb42f76749e19af91852a2390N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5012 1652 8d2885dfb42f76749e19af91852a2390N.exe 88 PID 1652 wrote to memory of 5012 1652 8d2885dfb42f76749e19af91852a2390N.exe 88 PID 1652 wrote to memory of 5012 1652 8d2885dfb42f76749e19af91852a2390N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d2885dfb42f76749e19af91852a2390N.exe"C:\Users\Admin\AppData\Local\Temp\8d2885dfb42f76749e19af91852a2390N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Intelproc04\devbodsys.exeC:\Intelproc04\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5007cf2b53f6a0f36336d32a8fcff6c4e
SHA1be6cd1afb1d7ce398d6648b0f57ebaefcb1c8055
SHA256ca5a910694fe0870962dfdc8c2dec1c28ace4ff5d998f6d308e222fd5e9aba37
SHA5127c0b92023eeea4095860aed6ab76e57592e6a2eba44f727ce809d3aa7435eb28b751ef4332a726fb23a7d7ab56a3e055c44bfa358b621e08ece0fc3e75a51f08
-
Filesize
3.1MB
MD5ecc03873d0ae2942f9ad15da9c3cfe23
SHA13fc4fd445319731884b516382f9cf4474253d501
SHA2566cd951c3d886faf1de1b8edd2687205f0f640b1d4aa9dc4de83400d6665da808
SHA51268ecef5a4cbc3520d1eb49fdc3aece75b606d78fc965e02271a511b393c674364683f59e5914cad0b835cd88ea5db6fc1c23768dd698c955e8205e772708e908
-
Filesize
209B
MD5b975005f461850bf7eeccea9618dcbe3
SHA18be26b5d3872517adbf9389ee846d0ac707fc7f2
SHA256f181ef1480341f05e65456b47ba42f117f241d6ffa810fb219ccd1d0501347e2
SHA51207a3f69a43e2aae9f47aee396ca631e13f0900111a2b9841f4949499823b7a64d15553768cdaa6265a84970879dce0a0d8996a5a817462bece6eb21ef2538077