Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe
Resource
win10v2004-20240802-en
General
-
Target
335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe
-
Size
2.7MB
-
MD5
5e4489f2cd18598701012f0b38c2dfd7
-
SHA1
b1b5cbd4a75a9908e60eb2b5ee5485f00ee17d62
-
SHA256
335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b
-
SHA512
bb734ff1b0401123eb901bfec21deab8ad6a7d760f1fdeccfcd63063cb73c1a9501d4d62d495a335d8797e7644ede298a04d2122a6fee28bb110d237c26c8bda
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBn9w4Sx:+R0pI/IQlUoMPdmpSpL4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3288 devbodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesCI\\devbodsys.exe" 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxH1\\bodaloc.exe" 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 3288 devbodsys.exe 3288 devbodsys.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3288 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 84 PID 4228 wrote to memory of 3288 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 84 PID 4228 wrote to memory of 3288 4228 335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe"C:\Users\Admin\AppData\Local\Temp\335989acfdc955967db8819b848a4e3bf7ffb88f0fc6e0ac4fa1010a59eb9a4b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\FilesCI\devbodsys.exeC:\FilesCI\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD553fb269fe551376838830446d8aed5b3
SHA1082a1946669815d3493552033adb82630653e481
SHA256c4711e4fde5523d722ec171729eff949abf62bcc3858b3eb70d394ff7d1c30df
SHA512e84eaec9dc75af1a37e53a6fb0e3a57a9b2806716aeace36c745efb84435c2496988174d67e9d043cce86799e360a57659fc28b99bf160b2277e9ba3c9090dbe
-
Filesize
2.7MB
MD5eef751ac0c7176c586bcc1fa0b5355d3
SHA13343130c14b2554ad14a03caf0975d61cdf6f0f2
SHA2563e3285710bf32ea6f55276a704338b5fd18afb1378f0d646143e04feacec1af3
SHA51234dbc98105f89a34c081b48a64c73935c9e37b3563444303d6cc0a15f1b875701b2af6412ee893af028eef30fca1b25aea919a35a0b48c9f8998f311675f3b65
-
Filesize
206B
MD555ebe8782759ce6beab2bd166c3aabe0
SHA1b3ff9a0bbb1004f84ed04c91d1100713bceef7b8
SHA256f83c8345497de6a35e5a5ae35bcc26de8775752eaa0c116cf930a5834065d8ba
SHA512200b1400087d8061985ade26f6f566b409612fcf43154804510813cf12d883b06ade58744aa637b861c3bf41d5e67ec504e65bb4b287f7fde6f1a5f9cb7b7eed