Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 11:14

General

  • Target

    9935d3dd85107cd23c02a37220ba8100N.exe

  • Size

    3.2MB

  • MD5

    9935d3dd85107cd23c02a37220ba8100

  • SHA1

    0e0975fa9b53a685b2a917bdc6b3be88cd9553dc

  • SHA256

    9b087c2c517f67b31d7b1e84af8713861a581415ac5855db79627d5ac3fc7f9d

  • SHA512

    187f0eaf7f85e5d7bf18a1378fa75fd6adbc8e89244c124c58f967685ce400932e68fac7d048e53de42d2204375112f90e588abce79ee76325290f1e58cabdc4

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBfB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp0bVz8eLFcz

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9935d3dd85107cd23c02a37220ba8100N.exe
    "C:\Users\Admin\AppData\Local\Temp\9935d3dd85107cd23c02a37220ba8100N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2004
    • C:\UserDotY4\xoptisys.exe
      C:\UserDotY4\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2808

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\GalaxJN\bodaec.exe

          Filesize

          1.9MB

          MD5

          14b30faff4a38c3d5bd5ac950dfa5ed7

          SHA1

          106c1c0c93825f47ef633879ca6b858e98f71ac4

          SHA256

          7edb229048aef85d2441514036be867d672b3820735adaa5196c61fa8f4d0f16

          SHA512

          6b59fa335f2b0f17872cf530e3f2c6946e814440bad2d73ccd634656da08da5c485bd50f245f7f84e2f3574baf781347672a934b2294e02b62c50899c1167322

        • C:\GalaxJN\bodaec.exe

          Filesize

          3.2MB

          MD5

          12b431984e3f0fd92e0e7d9599fbd710

          SHA1

          020200b70316561b67fa039ae39d0f511ca3d752

          SHA256

          8609d6b315d52acc728108343aab78d57d49837fd75cfbd772519cfaa5227afe

          SHA512

          56dac7528f1b43ccda8f3658a58e664e5e34493e75fcd32d75927c0ea606751db601d73b5d01e8ea065d0acbbb4ff1fdb251b8a4cf9d1aa7e668694810463031

        • C:\UserDotY4\xoptisys.exe

          Filesize

          3.2MB

          MD5

          8914a8fdfb0bbcd53f708adbd1b970db

          SHA1

          b95ff1fc95be22319b83bf03426744aaf4174dcd

          SHA256

          bd5e63a28e622a6be197f0d41f7a9b877a59129f3623b104c8d7647dfd03ddbb

          SHA512

          b9ae8da5d4821dc41768a1e0caec60b9d545dad0e31dffe79798035a622266465720a1a487a214696f5f69789ef4c9c1dc6e138699c7a17d9fbb24537a81f9f6

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          171B

          MD5

          742ade096db36d6809405a7574c152ad

          SHA1

          b5ad44449af042f8b42fe395cea70759dade5477

          SHA256

          db062a00a8c1d6f5a9986d328b530a21607e6386da5ca995cc5d26d18a383953

          SHA512

          de0fef10f00ddf39d0caeed4f613acc53e4506138be86990c1f88a206c8a0fbf1f013747087522ec61426fa2360680b5f823178c4a1f651c739c27a690b08c3a

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          203B

          MD5

          5d6719f29fb0a95178f44ef14020a091

          SHA1

          c4c038cb18eb91fd47b43aa6d93a051ee8c3ba70

          SHA256

          bdf701534fe07f2153c1f519c22c74b40ff2e598c34ed40ef5d8317ffb8c2368

          SHA512

          89c84cee422c8f58842a63773cefaad2309417feaf34b3a46865340bc5b67ad944a690ca48942a4384e96cdc9a639964733afb37358bfe2133ec69e8c8c3439b

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

          Filesize

          3.2MB

          MD5

          5a294cdfecee00b833d5683254a1a81e

          SHA1

          a37873d7c087f64298dc12ecd043ab2e576cfa7b

          SHA256

          98e6156d6e94a87ef3bc8bd57e7e97d5f5c0db68dd689a61eca3e6127f85fbb1

          SHA512

          dddf97c27ccd7437137812854f6a45dea18645bc15073a34c9c5539bc072116233062e67cb047d729f6642586a01e26b1c77e8add2888fc78e41afdd6fb4c649