Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
a4b44b8589fcc5413f6373b7791e16a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4b44b8589fcc5413f6373b7791e16a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
a4b44b8589fcc5413f6373b7791e16a0N.exe
-
Size
2.6MB
-
MD5
a4b44b8589fcc5413f6373b7791e16a0
-
SHA1
e244e6246b7aa32527a4797b891b996b756a9c2a
-
SHA256
eb25ee3805922c31aae5a1f8c166d80847dc4e272db4a90e5f737049680caaa4
-
SHA512
44471e08879de600a6cc8e6477d730499df09d7ec1791c99dad9537fef43929cd5ef568d9ecf57dac10d3a23969582e55f786dba125dad8f69b0923d1f4509f5
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB4B/bS:sxX7QnxrloE5dpUpHb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe a4b44b8589fcc5413f6373b7791e16a0N.exe -
Executes dropped EXE 2 IoCs
pid Process 2404 locdevbod.exe 2440 adobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax6Q\\bodaec.exe" a4b44b8589fcc5413f6373b7791e16a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvFY\\adobloc.exe" a4b44b8589fcc5413f6373b7791e16a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4b44b8589fcc5413f6373b7791e16a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe 2404 locdevbod.exe 2440 adobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2404 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 30 PID 2112 wrote to memory of 2404 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 30 PID 2112 wrote to memory of 2404 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 30 PID 2112 wrote to memory of 2404 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 30 PID 2112 wrote to memory of 2440 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 31 PID 2112 wrote to memory of 2440 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 31 PID 2112 wrote to memory of 2440 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 31 PID 2112 wrote to memory of 2440 2112 a4b44b8589fcc5413f6373b7791e16a0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b44b8589fcc5413f6373b7791e16a0N.exe"C:\Users\Admin\AppData\Local\Temp\a4b44b8589fcc5413f6373b7791e16a0N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\SysDrvFY\adobloc.exeC:\SysDrvFY\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD564841c752998f4e66788a8b23acd28af
SHA1235244de2c1a82d98954af761ed3b2afb74c5c54
SHA256b0317741e85333b3ccc7d7a74d2bfcadd304e6c9f9e59d59035a29285594a12e
SHA512831104f37ce057e209578f616b6a6d1d2e3e5387457de81c189994f80e22ccfdf66bbbb38a06211450a88051a2d111b7ba42332e8c3a5d1c95664b4adf815eec
-
Filesize
2.6MB
MD540ba91a56d5891b5e7fd706dbfe9c627
SHA183836bb9e2ea5a41137fd7de846b9293e04fa16b
SHA256e8384840a65e18436edd30a4d89a6bb46c30a22cc3e8bace06ee73047f728587
SHA51227e3bc5f40a7306d3851f41bcd436f5423fd00645459bd82dd7aab929ead40ff441df42643f9bb6d5fbea75cc00d418018d4e10759d6bdb2e06647cc577ab30f
-
Filesize
171B
MD5e6e7d2463fbb62670de256a604648ac7
SHA1c14a7126b586527d373d9205f95156cea027c18c
SHA25680d02d3b10ffd00019aa318faf65bfe0fac24a8843c7a77ddd4d257c9084da19
SHA512a93a35255ac6d0ec363f89bc5c77cb18f5a630622e3efc558e31e90271be2d9661ad8947b4e894d62c7486371bc917218a8c871961b63bcd46c8ebdb70652955
-
Filesize
203B
MD599481a3336a1b667db5616b880fde418
SHA1577055b017b4cb46d87c9dd92af6b583fa0b8840
SHA2561c4cacfa1b51f5a59dd7cbbbc6ab25c7f7463d80e3ace310dddbdf5bf5694b41
SHA512390e84ddd9adfb58c94689c9f0a7f4bffa6c1f0484bcb94b874e96e06445e0e0162e780f7e54f2ee61dfc6f666bd8f4c75196ad0ba7ee2c2d3b5189d3ee81a2b
-
Filesize
2.6MB
MD53a0774e3c75179c34bcc1ccba3cc0cab
SHA1335b5ef832406ce15976ec0ba6923827eb44f8dc
SHA25692483f04ae25e0160711a39fdc98889b6a3c56cc996f742dcbfe353330d58e75
SHA512fe625c7be5fc89d38d46f023aebcda56dc7d7de0dc2d39b246d81a8d4712e8b9f49b8c73619922610da53f71843a1b4f722b6c473ad11d1dd2aaf526c504c69d