Analysis
-
max time kernel
149s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe
Resource
win10v2004-20240802-en
General
-
Target
8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe
-
Size
3.2MB
-
MD5
b2aa23a9d63c0e21ca40ee9319acd429
-
SHA1
e27c188fb31b18e217b3bdedc294cb90eec39c62
-
SHA256
8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53
-
SHA512
8271d9d5899a015b08c2d887cce8fd7a15a1f494ea2b55d345982bb1be5f64c229e3fb098889abfb431466ab93a7d5ac5d01c087efac61080b22dd48da3150fb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBaB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUplbVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe -
Executes dropped EXE 2 IoCs
pid Process 3044 sysdevbod.exe 1944 devdobloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintXL\\dobdevloc.exe" 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvZ9\\devdobloc.exe" 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe 3044 sysdevbod.exe 3044 sysdevbod.exe 1944 devdobloc.exe 1944 devdobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3044 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 86 PID 2044 wrote to memory of 3044 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 86 PID 2044 wrote to memory of 3044 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 86 PID 2044 wrote to memory of 1944 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 87 PID 2044 wrote to memory of 1944 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 87 PID 2044 wrote to memory of 1944 2044 8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe"C:\Users\Admin\AppData\Local\Temp\8a54b37b52b2157d9b4db54ee42eb1c16c1bfcbe13ad4e1324d5dd8a4b602c53.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\SysDrvZ9\devdobloc.exeC:\SysDrvZ9\devdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD589a3679a3becd5dc3cce162ccb01f02c
SHA11a63700ad8dd3c481d3707a14672467e1a6293f5
SHA256fce1941452b63af48cea2b4a8b97c65e29a9dbce1d0f028fa90fe8c87cbc8b55
SHA51285e1d3706af2b077755c8e288eaa0bff46adc84a1839c3684ac42946a210fa59650944ba87fd3993f2db87d4368bec172fb6dc7847295fc8520b26b32b961127
-
Filesize
3.2MB
MD54f4dc8b92c41ad1de36a9ad62a961ac0
SHA1c666cb7051f7a85622824376ade24840dc6b3174
SHA2561ad7aba0474cb7ec8a400f6848efca188a4dadcd769fe7858432705711d0057a
SHA512aaf0addf28f3dc0d6df8598ca6cce1c017bd149e7631e3cf43f51211d096fc9a33fc7d4e0796ee92f38af06a36aa37a9cbf670734e962afb3272ce95c989cef5
-
Filesize
3.2MB
MD5238db7df09efd53b0e3f11e0ebb16eb9
SHA1775f7c29a00922bc170e3c7f444e36a5e4f75ffe
SHA2561981c776c5b2ec37871ba7d52d2ea4252d21acc2c16fe312dd3488828743b1ad
SHA512198802ab83e16dcf809ecfb32664b6a79b7ee1cb168ef6f2cf2dc766fc8bc39516bdac83d2bd5244d00e2058ecbf415d530a1ba638553b81bf5d97ceb92bf294
-
Filesize
207B
MD5c8d522c77f5ddef15b8f2db4a0d8423b
SHA1e4a85cb23a6fbb77d4f758a2603e61ebf9cbbd6f
SHA256ec0ce132a83cdaf3c19836af63c1b5553374d19d4f5b066552cf16962b39523d
SHA512efc37cf4685b40a7c3c60b88fd448ad2a915997afb8fcc35167e90aa3aa447f0acf6e43fe135f1eed6203d2d865812d979bfd2867bf6a3cbec8b198a8d9fda17
-
Filesize
175B
MD5854c232a225269e045136916e2759f2a
SHA1564348ad6adce6180bda0ec75a03a87556a3cd6f
SHA256f6d944c370540b226e5881c645fb3bb8426f423859a6fa3599a4c374890a3e4d
SHA512fc280dfb61ef4cdb6c7250bc52d3554656ff4c2b8bb8a26218eed7591ba91dfd372a0c63dd6321b22a7cf466002478c7ffc18acc426595ad6c45eddb10d28076
-
Filesize
3.2MB
MD53f9a8f8676053aa60c470b8a68e40c17
SHA18f836c028d8584cfa81fd1f13f9260565a1dd6e2
SHA256909f18bceccf66c58395d05b96d94aca5489ccdfc51225f95ef2d55ffa2aa1f0
SHA512e1c84c99f7073f8921c52bcbe1b2b8d35d36ee1824e5c1a712a698bad44abf7fc837b8103b2639f1d627f185fb0db38b642e6a6d6e78e715e8449094dbcfec97