Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
150cafcb48071abd1d1f06d890a3b650N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
150cafcb48071abd1d1f06d890a3b650N.exe
Resource
win10v2004-20240802-en
General
-
Target
150cafcb48071abd1d1f06d890a3b650N.exe
-
Size
2.7MB
-
MD5
150cafcb48071abd1d1f06d890a3b650
-
SHA1
4e45e62dc0537258cad375b160895c5194fbdcfb
-
SHA256
487d1887468e42df7b8383012f99277fcbbcd2a88815080ccd22620b5fb54d96
-
SHA512
76926e6dded63c486a3b57c1462b3343cc78d86bf609cb19c4723097fd7b1689584a99ad4cee771e961b311279486060ecfd7b0a08411ab7442269575274cc24
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBy9w4Sx:+R0pI/IQlUoMPdmpSp84
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 devdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 150cafcb48071abd1d1f06d890a3b650N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidBI\\bodxsys.exe" 150cafcb48071abd1d1f06d890a3b650N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe0T\\devdobec.exe" 150cafcb48071abd1d1f06d890a3b650N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 150cafcb48071abd1d1f06d890a3b650N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe 2740 devdobec.exe 2692 150cafcb48071abd1d1f06d890a3b650N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2740 2692 150cafcb48071abd1d1f06d890a3b650N.exe 30 PID 2692 wrote to memory of 2740 2692 150cafcb48071abd1d1f06d890a3b650N.exe 30 PID 2692 wrote to memory of 2740 2692 150cafcb48071abd1d1f06d890a3b650N.exe 30 PID 2692 wrote to memory of 2740 2692 150cafcb48071abd1d1f06d890a3b650N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\150cafcb48071abd1d1f06d890a3b650N.exe"C:\Users\Admin\AppData\Local\Temp\150cafcb48071abd1d1f06d890a3b650N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Adobe0T\devdobec.exeC:\Adobe0T\devdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD57aa0c8ffedfeb4d9393672dc95be6ee6
SHA16024ddd0a9cdee01e4cca0481fcca0ebae5d7427
SHA256aca56dae1a316ed47d3abd6ce3ab12af32e53baa203eeccac9cf2e73db1b30f9
SHA512a8e9cc033938d708d8f984819e5da7a513b1b0e821b88eef03c6c112457922cfeca4717f85ec9ee432dd9b2d40393afe137db970990bebb940fa6845e041f2a4
-
Filesize
2.7MB
MD51b5a78887512a02a2c1489f605734068
SHA165859191dc5074e2155f32ec319576181c155f57
SHA256b813befbe55a2734cb4cffdcf27e26a41c41edc958683153c091b2c3c8bd309c
SHA5121cecb4cd090376f392c5d2203a31500b625db06fd35b3a04ecf014c7ad4149c50aa837d6e74929408cbf08d0d5ab6e279d9edbd7eaa17d9b463e788576484a18
-
Filesize
2.7MB
MD56ad9365c6c13dabbd90f72602ca291b8
SHA17040a22f2b11d9cc940a950084e060442cc08810
SHA2561a9541d27d1f06f4fc2fa08dbd9c63a222a3a8f4aa961884819101b8eedbd237
SHA51285a5e30dc3ae28efc89bfd4695ec93e8d4d83fd9dbb8e76102fbad2c035cd3ab66bb00956c68d29eeed0b83784f43114bc282c8f3037defe1055d4d71aa05f44