Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
c3124bc0d9c447bc02c2df6748c3ed50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c3124bc0d9c447bc02c2df6748c3ed50N.exe
Resource
win10v2004-20240802-en
General
-
Target
c3124bc0d9c447bc02c2df6748c3ed50N.exe
-
Size
2.7MB
-
MD5
c3124bc0d9c447bc02c2df6748c3ed50
-
SHA1
40059151e3f7aee3a4c41b5de91478ab7962865b
-
SHA256
9483395a1336e3a737fa26fc9bc314708adaf935c75d59f01f19289c57a33c78
-
SHA512
2705ce468f03db0bb52283315460af527e4adaff27894c97b5f498ff8625139a8d9676a86557bebb8a068d5aa6f819d5b06e40e0f170d01509d6bc9c18ee4cbe
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB/9w4S+:+R0pI/IQlUoMPdmpSpz4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 devdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocXM\\devdobloc.exe" c3124bc0d9c447bc02c2df6748c3ed50N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidTA\\optidevsys.exe" c3124bc0d9c447bc02c2df6748c3ed50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3124bc0d9c447bc02c2df6748c3ed50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 2728 devdobloc.exe 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2728 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 29 PID 1656 wrote to memory of 2728 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 29 PID 1656 wrote to memory of 2728 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 29 PID 1656 wrote to memory of 2728 1656 c3124bc0d9c447bc02c2df6748c3ed50N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3124bc0d9c447bc02c2df6748c3ed50N.exe"C:\Users\Admin\AppData\Local\Temp\c3124bc0d9c447bc02c2df6748c3ed50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\IntelprocXM\devdobloc.exeC:\IntelprocXM\devdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD52b679f378c60140ab894845ef5b93b33
SHA1340646f7ce3e77849265e60eece80106d5adebb8
SHA25662b2a96d5938e2a30b0deb1c639e9faba7520ee92749825e15a18f94e39b8a82
SHA512657422ab01d11ba536f954a39a6d7901c6dff20e3a6ceac5bc7eee7034faac2addc6f6f68ee2bbec8a0d5b9bf34b31ca2a9e7a0e11ae05e45e7916c251ff8cc8
-
Filesize
2.7MB
MD5fa554cb00f06f25b231f237d7208654c
SHA1e3a86f7739c62a6a0423022d09158769fbb767ac
SHA256922377b22711d84aa8a5baef2d96f91f8bbb5668ea5e5a361c18f77ed7f4be63
SHA5120aaf4f1252a21f334c4599bfe7594c82d8a8d34f32e7b14a0e2be758967027e44e4163bb3eebb53e718f16de18fdc914ce5565894f6a9c53f974c3ac0449e8a6
-
Filesize
2.7MB
MD52ba44e1d930a73f043d2e66b4d71c4ed
SHA14479c7baa02cbe4f38d6fa5e8e5c507bd084346a
SHA256ef89f54e3233654f9223dc3b49954bd33986ac4a865885cced624d3bd7c82cff
SHA512e871404011b8d80219dad96e9e1f0ae9db47a531445e88db550df7817f8370e8341af471d2d71054bf7d86ed068ecf917dd266284fa10a46881a6a031404d8a4