Analysis

  • max time kernel
    119s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 07:52

General

  • Target

    a45ddba4515226bd7aca276437b32410N.exe

  • Size

    2.7MB

  • MD5

    a45ddba4515226bd7aca276437b32410

  • SHA1

    bb56982f6797cbda98f78d4707e300fbc32e04f5

  • SHA256

    03dc811a3e0f51e49a34ae82faa3ed4c57efda48663b246bb5ae46ba6d51e08d

  • SHA512

    cf623d2a4e980428feaeccaf5e5acfec88df0b6234bc2e1a8f040734f107c959f8f5ce37a9d555a4a382c7bd582b2b7554026b67f6dd7991cd8adb2463ae581b

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBT9w4Sx:+R0pI/IQlUoMPdmpSpb4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a45ddba4515226bd7aca276437b32410N.exe
    "C:\Users\Admin\AppData\Local\Temp\a45ddba4515226bd7aca276437b32410N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\UserDotNM\devbodec.exe
      C:\UserDotNM\devbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      PID:3096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZ8S\dobaec.exe

    Filesize

    2.7MB

    MD5

    89a84271ca8d374df165688cdde0cb2c

    SHA1

    d3430aa92d5efdf8b23bf90fcc8e3b8cc43d0529

    SHA256

    96c23bc1decec31aa28b4b06e86d751a40758732e923a277f6ef1e4ebff9ef9a

    SHA512

    1af528c40e6c9c822eaef58acb27d93424ce687fe13b23df819cce4850ae40907830c50a88c3b505e10c1d6dabd5e3c2f8a1f045eb9b9b8f1f67d95b54e589e3

  • C:\UserDotNM\devbodec.exe

    Filesize

    2.7MB

    MD5

    8db93048ca74b22c339c5980338afef3

    SHA1

    99e9c9b3975bb9d57c459402ad0d8963b6c5bdd6

    SHA256

    fd77f00a792080dbf4eff46099e21b478fc1ed6c9cdb4c59eb124b75b4c3afd3

    SHA512

    ee5608d99a3ebf40f4556067480b7e023bf61ef344f685fa491381dc2cc346270824c4ccf905c96787a4846216325681320794179e52ae2d604ed9c33de99ced

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    201B

    MD5

    23829bea0cd2b6d2562e814f159ac0be

    SHA1

    9a35ede939ffe1e304fac9d12b32dbc04f714dfd

    SHA256

    ca89379eeb3c437d05fea91b6d767ec367d302e5245d10d202cb656ba4682495

    SHA512

    6e0a2b65b3cb25a68a1554cd2cdb456ad0c873d928878ade9be5018e917ff05be8cdabad4b6d9a87ae2f79917ee3ee8fee0e52c15f6e972cbfafc1f6f66478d8