Analysis
-
max time kernel
120s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
918de7f8d7ccc02a27e45511ce7e7cd0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
918de7f8d7ccc02a27e45511ce7e7cd0N.exe
Resource
win10v2004-20240709-en
General
-
Target
918de7f8d7ccc02a27e45511ce7e7cd0N.exe
-
Size
2.7MB
-
MD5
918de7f8d7ccc02a27e45511ce7e7cd0
-
SHA1
3b0ee89c63d7b0532c7b2a120ae6feb019ca4aeb
-
SHA256
f2756e7541e9aea73071bc92cb1ae845e8149985f0817e35f58abaae46f45be4
-
SHA512
461bf27aba337039b8706b9fe5396309fecae3f5f34bb701fc7f501e2ecccc6bd55186ad19321fc41eb3b8f85ef41996a3edd2085848e24eb20b67add91d4aa0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBb9w4Sx:+R0pI/IQlUoMPdmpSpn4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1464 xbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidCU\\boddevsys.exe" 918de7f8d7ccc02a27e45511ce7e7cd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotLB\\xbodsys.exe" 918de7f8d7ccc02a27e45511ce7e7cd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 918de7f8d7ccc02a27e45511ce7e7cd0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 1464 xbodsys.exe 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1464 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 31 PID 1780 wrote to memory of 1464 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 31 PID 1780 wrote to memory of 1464 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 31 PID 1780 wrote to memory of 1464 1780 918de7f8d7ccc02a27e45511ce7e7cd0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\918de7f8d7ccc02a27e45511ce7e7cd0N.exe"C:\Users\Admin\AppData\Local\Temp\918de7f8d7ccc02a27e45511ce7e7cd0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\UserDotLB\xbodsys.exeC:\UserDotLB\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD599686347c20f8e2e47e555c9c5e951c7
SHA179c6dfd9c5eb35fb2feea6fed59d0f363bdcbb74
SHA2568dffad65c1cd5266a3b634b8e5f008a0493199ee02390d26d0e88599e58b9f27
SHA512976b0927bde5d704aaddca732627d0ec8ce58adf146c732b0c52b2eb098b730e169860ce5ef6797292ff5e7933874dc04669ff65c5abd8145e295ec8fcf89508
-
Filesize
2.7MB
MD5f88a58977cdb61563dfa996cbb83dbfe
SHA1aafd193e8d019752843e4effbfafced1d405e3b8
SHA256b3399580549bac4e353611760c25054fd09c5ceffaf1e8d89e2ec95633587b05
SHA51226120b55f221b02aae64cbd602d121bf49c8673a27da85307795c5bf3a8141e51f63ace99e48d5a933d943c2323b416d268a755e9ac10d69e16cf17d48736b3b
-
Filesize
2.7MB
MD5b206d871081367e4aa84eea40d7566b7
SHA1e4565c673c715536164a97ec836f55624df6f748
SHA2564cd70e2d97ff3ead2943f1617428ebe69fcbf943e859e18c92faac71268c056d
SHA5123edc0f1735f8e7c535caa056a7f71e85b98d980abbaaaf95681573f2920a81e06675f7576ced732754cb933d8a381d99bbb56cf3365cce0ba26fedc3419b0b2c