Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 03:36

General

  • Target

    443d0e9efbd05dc2761753c077069060N.exe

  • Size

    2.7MB

  • MD5

    443d0e9efbd05dc2761753c077069060

  • SHA1

    57f21bf26cfe7762eeca442a55723ba6c0a9a3d9

  • SHA256

    bc3f378ce15ab212fb89368d475798e0377eead4630fcc8935ca3daca48bda06

  • SHA512

    27624815a881aceb03fef90f0124ed57ec20845c074a879b3564ba192b0605a37ff835c5afdcfb1f0d10b872367042f703418bead9d56df0a0201eb5b4150de0

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBz9w4S+:+R0pI/IQlUoMPdmpSpf4X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\443d0e9efbd05dc2761753c077069060N.exe
    "C:\Users\Admin\AppData\Local\Temp\443d0e9efbd05dc2761753c077069060N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\FilesAL\xbodsys.exe
      C:\FilesAL\xbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    199B

    MD5

    2670da05c07ca40bbda6cd202ad63851

    SHA1

    5ed63926bc69953274eb4177c8709727e82dd60f

    SHA256

    2fbaa6f17dbe01592c90b8f11ede9a55fe66a4c28f6acb71a63f86f2bf78b513

    SHA512

    ef7826ce3097a55d0c44799ee7ba76873bd4f612b1cf64a13e0b93ebd2ba4e10a5e8cc81ec5ba64cae77d336ca4c75b3ebaebf74703d7453cc544fac6c8c77fe

  • C:\VidAP\bodxloc.exe

    Filesize

    2.7MB

    MD5

    b986ac3fd9a76ccca2fe25a411ade138

    SHA1

    9a97f9d4db80ef86d16769247d42589d1f30d740

    SHA256

    258e5b16d4b32a11daf9e99bc13d185b2ef802f86eadeb8d033793fe84ebc51a

    SHA512

    d7f6e38ab80265db730276efa532263a9924a5b11b9f8598ff1106c72ad759c879393cd5ed2a3875aff22504961e8603be7f234e73179036337a30a87972df56

  • \FilesAL\xbodsys.exe

    Filesize

    2.7MB

    MD5

    bcd261ad12e2b8bf7445a5b8dd4988b9

    SHA1

    8a5787ef1c2cc0ef4ad74252383fde9183de5197

    SHA256

    8d2e7e28c242d9bf8840a04fd1a5a2e9a6c211f6c612a75c330c738b50d58f79

    SHA512

    c28562bf12fce63caf8da25612b3d24681aa3e4fd7f3934eed09a3b1d91e8def76426d6a44aa31a5f7f79bd16c2e8383d38c0c12458069fcbfd679a7821d8b0b