Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
12fb9625ee3d41450c3970da3f0cd0b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12fb9625ee3d41450c3970da3f0cd0b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
12fb9625ee3d41450c3970da3f0cd0b0N.exe
-
Size
2.7MB
-
MD5
12fb9625ee3d41450c3970da3f0cd0b0
-
SHA1
9b81575739c3730858d01394017733d123d2d671
-
SHA256
d13d277ae6803395b9be657d5f748f0fafeff7d59125a7dadd9994319fc02610
-
SHA512
b4adfacbb8c136fd13bd84a69e7e3a1d2437529c488ad67322b5100713d3f885ce2c0221210a63e4817c8d279706821c84c2040721220aee7c21e5bc39256ff5
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBV9w4S+:+R0pI/IQlUoMPdmpSpF4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1292 devbodloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocSA\\devbodloc.exe" 12fb9625ee3d41450c3970da3f0cd0b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintRV\\dobxloc.exe" 12fb9625ee3d41450c3970da3f0cd0b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12fb9625ee3d41450c3970da3f0cd0b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\AdminI.]]1NaNI?\NZV[TI:VP_\`\SaIDV[Q\d`I@aN_a :R[bI=_\T_NZ`I@aN_ab]Isysxopti.exe 12fb9625ee3d41450c3970da3f0cd0b0N.exe File created C:\Users\AdminI.]]1NaNI?\NZV[TI:VP_\`\SaIDV[Q\d`I@aN_a devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 1292 devbodloc.exe 1292 devbodloc.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 1292 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 88 PID 4612 wrote to memory of 1292 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 88 PID 4612 wrote to memory of 1292 4612 12fb9625ee3d41450c3970da3f0cd0b0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\12fb9625ee3d41450c3970da3f0cd0b0N.exe"C:\Users\Admin\AppData\Local\Temp\12fb9625ee3d41450c3970da3f0cd0b0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\IntelprocSA\devbodloc.exeC:\IntelprocSA\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD519e3a99ccc7bffec8833c3112ace2ab2
SHA164c670a39ca67ac4ca73d2b9a116c4743b8e3c15
SHA2569cd156705679753f4268e2ffe757f7076efabc659d6dbe95f5e5f76efe1f2463
SHA5124c33100993c3e10783dadf670bdc57ef19a023eaf4ebb5e711617c145bec19ea1dfb19dd6580b2cdca8dd5f57dff664c472bb8799f25d08b58754394e4c36d16
-
Filesize
111KB
MD5a1e993e40dd74019d52aa4bdabf41064
SHA1febe01b64e766e8bd5f59317426127ad9d011f76
SHA256fafb4b374cc41543a3ad13ab6ea05fe95282ccfd571129b868c72d3f54a9306d
SHA5129f114ed5ce71db52ee79179edf39a5b732ce43f9080d1e871551f7d6bc1c11cee4240d7c3f5beba677433d3b05fd8bd7e81c43dbc5ba1f3b68ce0a34c1aed967
-
Filesize
208B
MD59f197a87d6fa867f59caf2e9b99018bd
SHA1dd53d3cddd0473828b5907baad9ec85c27ed9dd4
SHA2561ded14f2076d8f313c1f81cba5078c62907f6f4355526e7f5904c844c23421f7
SHA512f3c7c1878c347749640367b5f73658591437a80f4494f1c4441c6c071c166ffd2a60d77f879db39d44521577ea688f335e8f6eafd3afaeecd724cc1b27028283