Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 07:53

General

  • Target

    a4b44b8589fcc5413f6373b7791e16a0N.exe

  • Size

    2.6MB

  • MD5

    a4b44b8589fcc5413f6373b7791e16a0

  • SHA1

    e244e6246b7aa32527a4797b891b996b756a9c2a

  • SHA256

    eb25ee3805922c31aae5a1f8c166d80847dc4e272db4a90e5f737049680caaa4

  • SHA512

    44471e08879de600a6cc8e6477d730499df09d7ec1791c99dad9537fef43929cd5ef568d9ecf57dac10d3a23969582e55f786dba125dad8f69b0923d1f4509f5

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB4B/bS:sxX7QnxrloE5dpUpHb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4b44b8589fcc5413f6373b7791e16a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a4b44b8589fcc5413f6373b7791e16a0N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2404
    • C:\SysDrvFY\adobloc.exe
      C:\SysDrvFY\adobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Galax6Q\bodaec.exe

    Filesize

    2.6MB

    MD5

    64841c752998f4e66788a8b23acd28af

    SHA1

    235244de2c1a82d98954af761ed3b2afb74c5c54

    SHA256

    b0317741e85333b3ccc7d7a74d2bfcadd304e6c9f9e59d59035a29285594a12e

    SHA512

    831104f37ce057e209578f616b6a6d1d2e3e5387457de81c189994f80e22ccfdf66bbbb38a06211450a88051a2d111b7ba42332e8c3a5d1c95664b4adf815eec

  • C:\SysDrvFY\adobloc.exe

    Filesize

    2.6MB

    MD5

    40ba91a56d5891b5e7fd706dbfe9c627

    SHA1

    83836bb9e2ea5a41137fd7de846b9293e04fa16b

    SHA256

    e8384840a65e18436edd30a4d89a6bb46c30a22cc3e8bace06ee73047f728587

    SHA512

    27e3bc5f40a7306d3851f41bcd436f5423fd00645459bd82dd7aab929ead40ff441df42643f9bb6d5fbea75cc00d418018d4e10759d6bdb2e06647cc577ab30f

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    171B

    MD5

    e6e7d2463fbb62670de256a604648ac7

    SHA1

    c14a7126b586527d373d9205f95156cea027c18c

    SHA256

    80d02d3b10ffd00019aa318faf65bfe0fac24a8843c7a77ddd4d257c9084da19

    SHA512

    a93a35255ac6d0ec363f89bc5c77cb18f5a630622e3efc558e31e90271be2d9661ad8947b4e894d62c7486371bc917218a8c871961b63bcd46c8ebdb70652955

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    203B

    MD5

    99481a3336a1b667db5616b880fde418

    SHA1

    577055b017b4cb46d87c9dd92af6b583fa0b8840

    SHA256

    1c4cacfa1b51f5a59dd7cbbbc6ab25c7f7463d80e3ace310dddbdf5bf5694b41

    SHA512

    390e84ddd9adfb58c94689c9f0a7f4bffa6c1f0484bcb94b874e96e06445e0e0162e780f7e54f2ee61dfc6f666bd8f4c75196ad0ba7ee2c2d3b5189d3ee81a2b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe

    Filesize

    2.6MB

    MD5

    3a0774e3c75179c34bcc1ccba3cc0cab

    SHA1

    335b5ef832406ce15976ec0ba6923827eb44f8dc

    SHA256

    92483f04ae25e0160711a39fdc98889b6a3c56cc996f742dcbfe353330d58e75

    SHA512

    fe625c7be5fc89d38d46f023aebcda56dc7d7de0dc2d39b246d81a8d4712e8b9f49b8c73619922610da53f71843a1b4f722b6c473ad11d1dd2aaf526c504c69d