Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 00:37

General

  • Target

    367cd5e1dcd550b3ad10dfacedf81dd0N.exe

  • Size

    2.7MB

  • MD5

    367cd5e1dcd550b3ad10dfacedf81dd0

  • SHA1

    3d95dd5fe93bd670b8291f260f049c905acb7085

  • SHA256

    728574a66c80f43fb9c2f54ae8fb6285d133e6b00aece7605d703aeb84e0f7bb

  • SHA512

    72337fd83452afadb206ab984ee302fb8d47e012c16719205bc80f4e2a02736a726cb6a95469acdb0bffeeab40fabd6db4e7d75e9eb7f4b44c7b3fc6385f2826

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB+9w4Sx:+R0pI/IQlUoMPdmpSpo4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\367cd5e1dcd550b3ad10dfacedf81dd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\367cd5e1dcd550b3ad10dfacedf81dd0N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\UserDot3E\devdobsys.exe
      C:\UserDot3E\devdobsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\UserDot3E\devdobsys.exe

    Filesize

    2.7MB

    MD5

    addb371c5475b400013984ae170c481e

    SHA1

    3275a57be6e800370de1959762e2d45994278926

    SHA256

    d47a430f26527f3661e76d046dc3d62db454e6b16f82c954fd3b959c90f12032

    SHA512

    a2ed45be87ffacd04dbe37c21a04063b7ce749aa8a88a20486e5e040a9325c6686abc4ebc08c161ecf6a9fb63f694cf13f5af8e8fe8fa486226dbbba9406bb5c

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    206B

    MD5

    e2b3ac36189db81bfb89a579e3c98024

    SHA1

    68fb6ebb08cbee19f3eaaabd6c9a9d7c04fb72b9

    SHA256

    a41dcfbc30ea9b0754436764dfdc63de3fada294c36713d641ac0ac4b8cd22a6

    SHA512

    724ceecc1a52afab93c9d4f97eb03989be5c789b1adfcaab2532bd2aecad91a8d7c96c48726a41f61997856012648ff8dab27bf0bfe962249aaf493e2ea8b27e

  • C:\VidPQ\optidevloc.exe

    Filesize

    2.7MB

    MD5

    f51808f6dc16563acbd6530a07e8151e

    SHA1

    c58f3547e7cb1d85423205bda35b1796d510e2ed

    SHA256

    2173beef549f57ed606e6aa535c5aaefee748b262e927778d924b0c0b8cd6d9c

    SHA512

    bf4a3d7990e32b5bc1e724be591160de80a05ca27f77548a5292cc188c96ffbc24db3b94837de7abf9271365472b5a49286b59a61503949cb349e81c924ebfe7