Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
2a35e3b3e0ce2ebf79ce73e6f187e580N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2a35e3b3e0ce2ebf79ce73e6f187e580N.exe
Resource
win10v2004-20240709-en
General
-
Target
2a35e3b3e0ce2ebf79ce73e6f187e580N.exe
-
Size
2.6MB
-
MD5
2a35e3b3e0ce2ebf79ce73e6f187e580
-
SHA1
365ee986520f66f4231667b0b31e3e0836253cf9
-
SHA256
f64581d4deefd87bb1930dac2da3e38b8aeb8c93ed12e88d535ddd0191f9e9b3
-
SHA512
af15d9b93f16600ddb2e98973545afac29505ea46e4312d973558819aa037e40354b8c22b67be8c478a0061e411a6a80ad00f06272c61f781bff5599b0a90849
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBsB/bS:sxX7QnxrloE5dpUpjb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe -
Executes dropped EXE 2 IoCs
pid Process 2160 ecxbod.exe 2536 devdobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvG9\\devdobsys.exe" 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBQS\\bodxsys.exe" 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe 2160 ecxbod.exe 2536 devdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2160 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 30 PID 1908 wrote to memory of 2160 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 30 PID 1908 wrote to memory of 2160 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 30 PID 1908 wrote to memory of 2160 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 30 PID 1908 wrote to memory of 2536 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 31 PID 1908 wrote to memory of 2536 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 31 PID 1908 wrote to memory of 2536 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 31 PID 1908 wrote to memory of 2536 1908 2a35e3b3e0ce2ebf79ce73e6f187e580N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a35e3b3e0ce2ebf79ce73e6f187e580N.exe"C:\Users\Admin\AppData\Local\Temp\2a35e3b3e0ce2ebf79ce73e6f187e580N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\SysDrvG9\devdobsys.exeC:\SysDrvG9\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD53a7ec8b03a5147ff4d1e1153cfda8626
SHA1dad6785a9cbbcb1cd37c83de98c6b9dd48e6d27b
SHA25695a5ca2410545e2ba6445b4c788d0f1e74739f828e99a5dbf9b169e334c9df13
SHA5124132b17f99e174fce15d724106f4f8ce626dbd26713529251764a90fc591914c704dde2824fd68c33517ce9bcdda248be7cec4b486cda97aa0aa2586b31e77bb
-
Filesize
2.6MB
MD5df387a497970d580a6a304074e88482c
SHA12b14128c1b22b7f0b8c0b2e6243eb21f8ad3bda2
SHA256ca010665696767f7913d9c58489d79d08725054bc95ec0a836292acc8343f686
SHA512a868751aee3843b5085d14467221ce0a2e071285742727865739de0716a94fa0937b9726cc45ee7ee2fd9e4608753397cd08e5333ad890572106b463552267dc
-
Filesize
2.6MB
MD58a84b6031538e4a7067dba4573c43032
SHA1f11ad4301f07a9ff6b3b3724e8089d91e2b7c750
SHA2562a1c3b3e6799a45858480fa3fe7da72e1e28322e89631233320fc3b7f267c27c
SHA512a1ecc1fa8a2ce3da43c5527b9a63c75e7e6c80262e221a7dd3cd6bc4a6081a061aeda0b22734ab756adcaafa0654dfd2ba4346204cedb3eb0e68f6307b87c66b
-
Filesize
170B
MD531862b69cbea8e70a697893cf4858c2a
SHA1c6efd2bc051392876243c1ce4ca9edea4279ae5d
SHA256811deac8f4e649ee5b4d40f2fcfd297b08e78ba177d3ea6c23ef522e68789d94
SHA5120b9b63809c921a8739cd766c2ac53a8583a5141f73822647b95e82083070001a0d8c4d616793573220cab437455731931e6bb177209bb494148165f566204fda
-
Filesize
202B
MD5e0452b9fe937150c592c42d29ea874b8
SHA1a62030244f36d553a5745d6295b029506edaa75f
SHA256062a2c20a419339fa855a294165b2cfad742c5daf03b2c7e62b51b7613eff0b2
SHA5128c3804e0c6ff726b230e6eb311eb0c682672c6acec6285d73464afe72e319d82ff56d738b78a169385d9797e25562f8a30b1a4fc4d752f08012007c4b0b01cec
-
Filesize
2.6MB
MD549610cbefb7e4acc1c211601c67edcdd
SHA150ed818934af83cd061afdf28825205abfb21838
SHA256e7ac44ef56f720d5851966eb80663379c1f5da9072792f8680ccf6e2284ffed2
SHA512dbc514bfc27c901c20b25aabe731c7397411c393a2e695177a7c0a2221643866eadb3b171d00a7d1a9b5c9d25e4b445c23b52e3b984a211e30da7e6f62bed3ae