Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
367cd5e1dcd550b3ad10dfacedf81dd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
367cd5e1dcd550b3ad10dfacedf81dd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
367cd5e1dcd550b3ad10dfacedf81dd0N.exe
-
Size
2.7MB
-
MD5
367cd5e1dcd550b3ad10dfacedf81dd0
-
SHA1
3d95dd5fe93bd670b8291f260f049c905acb7085
-
SHA256
728574a66c80f43fb9c2f54ae8fb6285d133e6b00aece7605d703aeb84e0f7bb
-
SHA512
72337fd83452afadb206ab984ee302fb8d47e012c16719205bc80f4e2a02736a726cb6a95469acdb0bffeeab40fabd6db4e7d75e9eb7f4b44c7b3fc6385f2826
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB+9w4Sx:+R0pI/IQlUoMPdmpSpo4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3872 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot3E\\devdobsys.exe" 367cd5e1dcd550b3ad10dfacedf81dd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidPQ\\optidevloc.exe" 367cd5e1dcd550b3ad10dfacedf81dd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 367cd5e1dcd550b3ad10dfacedf81dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 3872 devdobsys.exe 3872 devdobsys.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3872 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 86 PID 4348 wrote to memory of 3872 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 86 PID 4348 wrote to memory of 3872 4348 367cd5e1dcd550b3ad10dfacedf81dd0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\367cd5e1dcd550b3ad10dfacedf81dd0N.exe"C:\Users\Admin\AppData\Local\Temp\367cd5e1dcd550b3ad10dfacedf81dd0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\UserDot3E\devdobsys.exeC:\UserDot3E\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5addb371c5475b400013984ae170c481e
SHA13275a57be6e800370de1959762e2d45994278926
SHA256d47a430f26527f3661e76d046dc3d62db454e6b16f82c954fd3b959c90f12032
SHA512a2ed45be87ffacd04dbe37c21a04063b7ce749aa8a88a20486e5e040a9325c6686abc4ebc08c161ecf6a9fb63f694cf13f5af8e8fe8fa486226dbbba9406bb5c
-
Filesize
206B
MD5e2b3ac36189db81bfb89a579e3c98024
SHA168fb6ebb08cbee19f3eaaabd6c9a9d7c04fb72b9
SHA256a41dcfbc30ea9b0754436764dfdc63de3fada294c36713d641ac0ac4b8cd22a6
SHA512724ceecc1a52afab93c9d4f97eb03989be5c789b1adfcaab2532bd2aecad91a8d7c96c48726a41f61997856012648ff8dab27bf0bfe962249aaf493e2ea8b27e
-
Filesize
2.7MB
MD5f51808f6dc16563acbd6530a07e8151e
SHA1c58f3547e7cb1d85423205bda35b1796d510e2ed
SHA2562173beef549f57ed606e6aa535c5aaefee748b262e927778d924b0c0b8cd6d9c
SHA512bf4a3d7990e32b5bc1e724be591160de80a05ca27f77548a5292cc188c96ffbc24db3b94837de7abf9271365472b5a49286b59a61503949cb349e81c924ebfe7