Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
443d0e9efbd05dc2761753c077069060N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
443d0e9efbd05dc2761753c077069060N.exe
Resource
win10v2004-20240802-en
General
-
Target
443d0e9efbd05dc2761753c077069060N.exe
-
Size
2.7MB
-
MD5
443d0e9efbd05dc2761753c077069060
-
SHA1
57f21bf26cfe7762eeca442a55723ba6c0a9a3d9
-
SHA256
bc3f378ce15ab212fb89368d475798e0377eead4630fcc8935ca3daca48bda06
-
SHA512
27624815a881aceb03fef90f0124ed57ec20845c074a879b3564ba192b0605a37ff835c5afdcfb1f0d10b872367042f703418bead9d56df0a0201eb5b4150de0
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBz9w4S+:+R0pI/IQlUoMPdmpSpf4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1056 xbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 443d0e9efbd05dc2761753c077069060N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesAL\\xbodsys.exe" 443d0e9efbd05dc2761753c077069060N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidAP\\bodxloc.exe" 443d0e9efbd05dc2761753c077069060N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443d0e9efbd05dc2761753c077069060N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 443d0e9efbd05dc2761753c077069060N.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe 1056 xbodsys.exe 1868 443d0e9efbd05dc2761753c077069060N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1056 1868 443d0e9efbd05dc2761753c077069060N.exe 30 PID 1868 wrote to memory of 1056 1868 443d0e9efbd05dc2761753c077069060N.exe 30 PID 1868 wrote to memory of 1056 1868 443d0e9efbd05dc2761753c077069060N.exe 30 PID 1868 wrote to memory of 1056 1868 443d0e9efbd05dc2761753c077069060N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\443d0e9efbd05dc2761753c077069060N.exe"C:\Users\Admin\AppData\Local\Temp\443d0e9efbd05dc2761753c077069060N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\FilesAL\xbodsys.exeC:\FilesAL\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD52670da05c07ca40bbda6cd202ad63851
SHA15ed63926bc69953274eb4177c8709727e82dd60f
SHA2562fbaa6f17dbe01592c90b8f11ede9a55fe66a4c28f6acb71a63f86f2bf78b513
SHA512ef7826ce3097a55d0c44799ee7ba76873bd4f612b1cf64a13e0b93ebd2ba4e10a5e8cc81ec5ba64cae77d336ca4c75b3ebaebf74703d7453cc544fac6c8c77fe
-
Filesize
2.7MB
MD5b986ac3fd9a76ccca2fe25a411ade138
SHA19a97f9d4db80ef86d16769247d42589d1f30d740
SHA256258e5b16d4b32a11daf9e99bc13d185b2ef802f86eadeb8d033793fe84ebc51a
SHA512d7f6e38ab80265db730276efa532263a9924a5b11b9f8598ff1106c72ad759c879393cd5ed2a3875aff22504961e8603be7f234e73179036337a30a87972df56
-
Filesize
2.7MB
MD5bcd261ad12e2b8bf7445a5b8dd4988b9
SHA18a5787ef1c2cc0ef4ad74252383fde9183de5197
SHA2568d2e7e28c242d9bf8840a04fd1a5a2e9a6c211f6c612a75c330c738b50d58f79
SHA512c28562bf12fce63caf8da25612b3d24681aa3e4fd7f3934eed09a3b1d91e8def76426d6a44aa31a5f7f79bd16c2e8383d38c0c12458069fcbfd679a7821d8b0b