Analysis
-
max time kernel
119s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
c512351cd848f5c1ff6706b2d2ccd9d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c512351cd848f5c1ff6706b2d2ccd9d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
c512351cd848f5c1ff6706b2d2ccd9d0N.exe
-
Size
2.7MB
-
MD5
c512351cd848f5c1ff6706b2d2ccd9d0
-
SHA1
ab741a8f690d68d82bf1ebf475c0f176998b4fac
-
SHA256
b0da0cf09e1ac40f3a38116b44750bcd7b6f0627f5a88bf7ba7b49f160825d56
-
SHA512
baed205886ec97467fa6ab4240c1b1f30e6a967243fa6d82d2a2f68b6a1ca93f2378e05ad2c0bd9e184edf5ee3c0ea83619a2ccdf0966aa4e262ed5c4bf22136
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBH9w4S+:+R0pI/IQlUoMPdmpSpT4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 244 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocEZ\\devdobsys.exe" c512351cd848f5c1ff6706b2d2ccd9d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBV4\\bodxloc.exe" c512351cd848f5c1ff6706b2d2ccd9d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c512351cd848f5c1ff6706b2d2ccd9d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 244 devdobsys.exe 244 devdobsys.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 244 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 87 PID 3700 wrote to memory of 244 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 87 PID 3700 wrote to memory of 244 3700 c512351cd848f5c1ff6706b2d2ccd9d0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c512351cd848f5c1ff6706b2d2ccd9d0N.exe"C:\Users\Admin\AppData\Local\Temp\c512351cd848f5c1ff6706b2d2ccd9d0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\IntelprocEZ\devdobsys.exeC:\IntelprocEZ\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD51d3f8c1efcf3ec2ab9b5b8ceba67894d
SHA18eec63332753438a189364bb43fd46c2ebfc8e3d
SHA256a3e3043ff7fa1f894a097e8696673c65c6c317710f1303a9fdbc6b580a3c945a
SHA5121ad9ffa653dcbf2ed72e546d732b03c6826ac6a32a0fbed755b23575a3e3893c34b6459e28a5db41fdcd386e5de88bd57a0bf362c36474150fcafc52b718bdee
-
Filesize
2.7MB
MD5e993f04c3e3f22904c496abd06f72133
SHA1647e38f2178b1d6d6408f4272113d298701a6420
SHA25649dd79a210c756d695d6e731a53d67ea5fdae9c7e4804c548eb0047fb1073b28
SHA51264d3352c106e317467ff53cb46df2512722d668614e22cb87a16612a44a061ecdaffa77cce2c240766230a8748ed636435886664648d91ea2e567318d956debc
-
Filesize
206B
MD5a4085c353494647a47850610b0e37555
SHA121160b5d3df80a1748deaf035c76ddffab9bd7d7
SHA2565891efc15a7d3cc4d32fd85ab4aafe1c999666bf321bf366b3828e5dd4b59bd8
SHA512b139f64fd8437d97b7432b1553d8852656281e0f49af07814cdcb318a3a990a1a7ee3be035bd6b6be1a9a0d32d8e0e79731dc0665f3a67588d39cf5435dd6276