Analysis
-
max time kernel
119s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
a45ddba4515226bd7aca276437b32410N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a45ddba4515226bd7aca276437b32410N.exe
Resource
win10v2004-20240709-en
General
-
Target
a45ddba4515226bd7aca276437b32410N.exe
-
Size
2.7MB
-
MD5
a45ddba4515226bd7aca276437b32410
-
SHA1
bb56982f6797cbda98f78d4707e300fbc32e04f5
-
SHA256
03dc811a3e0f51e49a34ae82faa3ed4c57efda48663b246bb5ae46ba6d51e08d
-
SHA512
cf623d2a4e980428feaeccaf5e5acfec88df0b6234bc2e1a8f040734f107c959f8f5ce37a9d555a4a382c7bd582b2b7554026b67f6dd7991cd8adb2463ae581b
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBT9w4Sx:+R0pI/IQlUoMPdmpSpb4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3096 devbodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotNM\\devbodec.exe" a45ddba4515226bd7aca276437b32410N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ8S\\dobaec.exe" a45ddba4515226bd7aca276437b32410N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a45ddba4515226bd7aca276437b32410N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodec.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\AdminD)XX,I\ID:WIUQVOD5QKZW[WN\D?QVLW_[D;\IZ\5MV]D8ZWOZIU[D;\IZ\]XDecxdob.exe a45ddba4515226bd7aca276437b32410N.exe File created C:\Users\AdminD)XX,I\ID:WIUQVOD5QKZW[WN\D?QVLW_[D;\IZ\5MV]D8ZWOZIU[D;\IZ\]XDecxdob.exe devbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe 3096 devbodec.exe 3096 devbodec.exe 568 a45ddba4515226bd7aca276437b32410N.exe 568 a45ddba4515226bd7aca276437b32410N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 568 wrote to memory of 3096 568 a45ddba4515226bd7aca276437b32410N.exe 90 PID 568 wrote to memory of 3096 568 a45ddba4515226bd7aca276437b32410N.exe 90 PID 568 wrote to memory of 3096 568 a45ddba4515226bd7aca276437b32410N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45ddba4515226bd7aca276437b32410N.exe"C:\Users\Admin\AppData\Local\Temp\a45ddba4515226bd7aca276437b32410N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\UserDotNM\devbodec.exeC:\UserDotNM\devbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD589a84271ca8d374df165688cdde0cb2c
SHA1d3430aa92d5efdf8b23bf90fcc8e3b8cc43d0529
SHA25696c23bc1decec31aa28b4b06e86d751a40758732e923a277f6ef1e4ebff9ef9a
SHA5121af528c40e6c9c822eaef58acb27d93424ce687fe13b23df819cce4850ae40907830c50a88c3b505e10c1d6dabd5e3c2f8a1f045eb9b9b8f1f67d95b54e589e3
-
Filesize
2.7MB
MD58db93048ca74b22c339c5980338afef3
SHA199e9c9b3975bb9d57c459402ad0d8963b6c5bdd6
SHA256fd77f00a792080dbf4eff46099e21b478fc1ed6c9cdb4c59eb124b75b4c3afd3
SHA512ee5608d99a3ebf40f4556067480b7e023bf61ef344f685fa491381dc2cc346270824c4ccf905c96787a4846216325681320794179e52ae2d604ed9c33de99ced
-
Filesize
201B
MD523829bea0cd2b6d2562e814f159ac0be
SHA19a35ede939ffe1e304fac9d12b32dbc04f714dfd
SHA256ca89379eeb3c437d05fea91b6d767ec367d302e5245d10d202cb656ba4682495
SHA5126e0a2b65b3cb25a68a1554cd2cdb456ad0c873d928878ade9be5018e917ff05be8cdabad4b6d9a87ae2f79917ee3ee8fee0e52c15f6e972cbfafc1f6f66478d8