Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
367cd5e1dcd550b3ad10dfacedf81dd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
367cd5e1dcd550b3ad10dfacedf81dd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
367cd5e1dcd550b3ad10dfacedf81dd0N.exe
-
Size
2.7MB
-
MD5
367cd5e1dcd550b3ad10dfacedf81dd0
-
SHA1
3d95dd5fe93bd670b8291f260f049c905acb7085
-
SHA256
728574a66c80f43fb9c2f54ae8fb6285d133e6b00aece7605d703aeb84e0f7bb
-
SHA512
72337fd83452afadb206ab984ee302fb8d47e012c16719205bc80f4e2a02736a726cb6a95469acdb0bffeeab40fabd6db4e7d75e9eb7f4b44c7b3fc6385f2826
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB+9w4Sx:+R0pI/IQlUoMPdmpSpo4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot4F\\xdobloc.exe" 367cd5e1dcd550b3ad10dfacedf81dd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBHI\\boddevec.exe" 367cd5e1dcd550b3ad10dfacedf81dd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 367cd5e1dcd550b3ad10dfacedf81dd0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 2304 xdobloc.exe 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2304 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 30 PID 2244 wrote to memory of 2304 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 30 PID 2244 wrote to memory of 2304 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 30 PID 2244 wrote to memory of 2304 2244 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\367cd5e1dcd550b3ad10dfacedf81dd0N.exe"C:\Users\Admin\AppData\Local\Temp\367cd5e1dcd550b3ad10dfacedf81dd0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\UserDot4F\xdobloc.exeC:\UserDot4F\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5eb4799d45990042e16514f719e23a2e0
SHA16968c188d9b8c45a0ccaca418d16fcdf9ff592b5
SHA25672a32e9d3f291ba27edf281eaac580ecaa60c23e55b911f423659adc3075b0f4
SHA512d8e89529dd7b8ea4fc4be1f519368ec59f3ce54f31d440b18ab76aab1495c3aa9f5475ef4f069d193050287ccd58d2bf22fcc330ca7919c62da896e776ec6507
-
Filesize
202B
MD58e51b4048f0ed612916ae7c967e07ee2
SHA139acfd3b833ad06753fabf25346905370ac16571
SHA25643a100bb9089136e5bbf0d1ae1fe51fcda0ea690bf6c37131486b8dbd88366e9
SHA51217aa330f569b3aa6acae97fe326e42fbcf23d206f7d660f175598e1a6aa14c6bd0739993c59909435ba41f6a4587de875eac662614b3dae54bb1bbde164fade0
-
Filesize
2.7MB
MD54f076dc57c032f5757e249e2dc8732c0
SHA1a697238567072b5e0dfc6573da377c34419f4128
SHA2567a840eaafbc7fd1660c57abb9d17cd77bd0eda7bfe00b978bd43a50d9cc86972
SHA5120bac53d71be2b7819f66d2e6701475f88063e129015f9279f55514e223900416e6659e40b6dcd0f5630a86b1cafd592ff5b5879c07d4a89c5bba566d8494c57e