Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
bd306605d20ad2c97f6c9b3cdf3baf70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd306605d20ad2c97f6c9b3cdf3baf70N.exe
Resource
win10v2004-20240802-en
General
-
Target
bd306605d20ad2c97f6c9b3cdf3baf70N.exe
-
Size
2.7MB
-
MD5
bd306605d20ad2c97f6c9b3cdf3baf70
-
SHA1
8bafffd195931d9545c795df1023823adec6018a
-
SHA256
bca031d4a3cb2f67ea0cbc1da4ffebe2266661166ca38b568e4f4560bddb213f
-
SHA512
0f84044a85980615a1f209dc2e890bb08319752d5f374147c7bef5b1c01e1cdbbadd37ba18f873e00c5336a5d273361ceb7383b13563cbbb8c3901b4b2258e32
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBI9w4Sx:+R0pI/IQlUoMPdmpSpC4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv15\\xdobsys.exe" bd306605d20ad2c97f6c9b3cdf3baf70N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidBN\\boddevloc.exe" bd306605d20ad2c97f6c9b3cdf3baf70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd306605d20ad2c97f6c9b3cdf3baf70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 2020 xdobsys.exe 2020 xdobsys.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2020 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 86 PID 1576 wrote to memory of 2020 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 86 PID 1576 wrote to memory of 2020 1576 bd306605d20ad2c97f6c9b3cdf3baf70N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd306605d20ad2c97f6c9b3cdf3baf70N.exe"C:\Users\Admin\AppData\Local\Temp\bd306605d20ad2c97f6c9b3cdf3baf70N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\SysDrv15\xdobsys.exeC:\SysDrv15\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5aa5acc29abd4c5b8ce288469cdbce12f
SHA14fc181dee76b9aafa5e8aa68e983b5daaffabefb
SHA256b3160f7bac9c4e005c5dffb006690e28a745792fbbb2c4183c8cbe051a611bdf
SHA5129b96d082a76f2d1e2ccabb3ce2076ce19e3457a8d1343710efb00a49886398cc263d9dfe202a890c3db23a9b901950a5ca92d0c2ab0ad9d7d67ecb4ba04737d9
-
Filesize
202B
MD5cf7207dc32c7865de316fd61f025e9bc
SHA1470825c48ea4a572388d7d730aa5526a44312cff
SHA25670721400b5693021257bc92b5c7bc1af5a5d6e89e19b8552767b2f9caf25a5e8
SHA512d9b78cfd9f82dafa1b0fcbaeee2cc76c114294b9dfe19b72957f88995cef11f41240c581190bb2ca7ba94a92fd275a2eaf109744ba71a2697c2fdcbe30e64088
-
Filesize
2.7MB
MD5bccd6054ae795a2f6fa5e72e0160d8c8
SHA182fb0fcbf92ab4dc813c665a914d0935e4d0e106
SHA256ce5a8f2979c7ece57e4ba7ad49a5a9a7762acd77536ee4705871fc0416dd08b1
SHA512bd3d4cad08fdb93cce0bab642d91a77ac015247aa76feb4753c179565141e2577c8f711c1f951a01e29c464a71fa2872c0ea63a040fd690ae706cdec7ab54b96