Analysis

  • max time kernel
    119s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 10:39

General

  • Target

    c512351cd848f5c1ff6706b2d2ccd9d0N.exe

  • Size

    2.7MB

  • MD5

    c512351cd848f5c1ff6706b2d2ccd9d0

  • SHA1

    ab741a8f690d68d82bf1ebf475c0f176998b4fac

  • SHA256

    b0da0cf09e1ac40f3a38116b44750bcd7b6f0627f5a88bf7ba7b49f160825d56

  • SHA512

    baed205886ec97467fa6ab4240c1b1f30e6a967243fa6d82d2a2f68b6a1ca93f2378e05ad2c0bd9e184edf5ee3c0ea83619a2ccdf0966aa4e262ed5c4bf22136

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBH9w4S+:+R0pI/IQlUoMPdmpSpT4X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c512351cd848f5c1ff6706b2d2ccd9d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c512351cd848f5c1ff6706b2d2ccd9d0N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\IntelprocEZ\devdobsys.exe
      C:\IntelprocEZ\devdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\IntelprocEZ\devdobsys.exe

          Filesize

          2.7MB

          MD5

          1d3f8c1efcf3ec2ab9b5b8ceba67894d

          SHA1

          8eec63332753438a189364bb43fd46c2ebfc8e3d

          SHA256

          a3e3043ff7fa1f894a097e8696673c65c6c317710f1303a9fdbc6b580a3c945a

          SHA512

          1ad9ffa653dcbf2ed72e546d732b03c6826ac6a32a0fbed755b23575a3e3893c34b6459e28a5db41fdcd386e5de88bd57a0bf362c36474150fcafc52b718bdee

        • C:\KaVBV4\bodxloc.exe

          Filesize

          2.7MB

          MD5

          e993f04c3e3f22904c496abd06f72133

          SHA1

          647e38f2178b1d6d6408f4272113d298701a6420

          SHA256

          49dd79a210c756d695d6e731a53d67ea5fdae9c7e4804c548eb0047fb1073b28

          SHA512

          64d3352c106e317467ff53cb46df2512722d668614e22cb87a16612a44a061ecdaffa77cce2c240766230a8748ed636435886664648d91ea2e567318d956debc

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          206B

          MD5

          a4085c353494647a47850610b0e37555

          SHA1

          21160b5d3df80a1748deaf035c76ddffab9bd7d7

          SHA256

          5891efc15a7d3cc4d32fd85ab4aafe1c999666bf321bf366b3828e5dd4b59bd8

          SHA512

          b139f64fd8437d97b7432b1553d8852656281e0f49af07814cdcb318a3a990a1a7ee3be035bd6b6be1a9a0d32d8e0e79731dc0665f3a67588d39cf5435dd6276