Analysis

  • max time kernel
    119s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 18:11

General

  • Target

    bd306605d20ad2c97f6c9b3cdf3baf70N.exe

  • Size

    2.7MB

  • MD5

    bd306605d20ad2c97f6c9b3cdf3baf70

  • SHA1

    8bafffd195931d9545c795df1023823adec6018a

  • SHA256

    bca031d4a3cb2f67ea0cbc1da4ffebe2266661166ca38b568e4f4560bddb213f

  • SHA512

    0f84044a85980615a1f209dc2e890bb08319752d5f374147c7bef5b1c01e1cdbbadd37ba18f873e00c5336a5d273361ceb7383b13563cbbb8c3901b4b2258e32

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBI9w4Sx:+R0pI/IQlUoMPdmpSpC4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd306605d20ad2c97f6c9b3cdf3baf70N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd306605d20ad2c97f6c9b3cdf3baf70N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\SysDrv15\xdobsys.exe
      C:\SysDrv15\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\SysDrv15\xdobsys.exe

    Filesize

    2.7MB

    MD5

    aa5acc29abd4c5b8ce288469cdbce12f

    SHA1

    4fc181dee76b9aafa5e8aa68e983b5daaffabefb

    SHA256

    b3160f7bac9c4e005c5dffb006690e28a745792fbbb2c4183c8cbe051a611bdf

    SHA512

    9b96d082a76f2d1e2ccabb3ce2076ce19e3457a8d1343710efb00a49886398cc263d9dfe202a890c3db23a9b901950a5ca92d0c2ab0ad9d7d67ecb4ba04737d9

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    202B

    MD5

    cf7207dc32c7865de316fd61f025e9bc

    SHA1

    470825c48ea4a572388d7d730aa5526a44312cff

    SHA256

    70721400b5693021257bc92b5c7bc1af5a5d6e89e19b8552767b2f9caf25a5e8

    SHA512

    d9b78cfd9f82dafa1b0fcbaeee2cc76c114294b9dfe19b72957f88995cef11f41240c581190bb2ca7ba94a92fd275a2eaf109744ba71a2697c2fdcbe30e64088

  • C:\VidBN\boddevloc.exe

    Filesize

    2.7MB

    MD5

    bccd6054ae795a2f6fa5e72e0160d8c8

    SHA1

    82fb0fcbf92ab4dc813c665a914d0935e4d0e106

    SHA256

    ce5a8f2979c7ece57e4ba7ad49a5a9a7762acd77536ee4705871fc0416dd08b1

    SHA512

    bd3d4cad08fdb93cce0bab642d91a77ac015247aa76feb4753c179565141e2577c8f711c1f951a01e29c464a71fa2872c0ea63a040fd690ae706cdec7ab54b96