Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
4c0875308b7fb43d8887a57959e660e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c0875308b7fb43d8887a57959e660e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
4c0875308b7fb43d8887a57959e660e0N.exe
-
Size
2.7MB
-
MD5
4c0875308b7fb43d8887a57959e660e0
-
SHA1
c4e8ff2ce61342ad0b544f0f353ad5a6e9bf8688
-
SHA256
b66392db0e9325f6c3949f6f69130607a313c6e538b68ed5f6732e07217033fc
-
SHA512
88f5eb77c3949b24fdba58bee16afc7e0425a3e71227b4893c6bd89b9277577da74bb202d3411c3d35b61d2b7bc3145bf86f1dac7fe3a8ce3c14f6d5228534bd
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBA9w4Sx:+R0pI/IQlUoMPdmpSpO4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 1188 4c0875308b7fb43d8887a57959e660e0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesCF\\devbodsys.exe" 4c0875308b7fb43d8887a57959e660e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintCB\\boddevloc.exe" 4c0875308b7fb43d8887a57959e660e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c0875308b7fb43d8887a57959e660e0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1188 4c0875308b7fb43d8887a57959e660e0N.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe 2680 devbodsys.exe 1188 4c0875308b7fb43d8887a57959e660e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2680 1188 4c0875308b7fb43d8887a57959e660e0N.exe 30 PID 1188 wrote to memory of 2680 1188 4c0875308b7fb43d8887a57959e660e0N.exe 30 PID 1188 wrote to memory of 2680 1188 4c0875308b7fb43d8887a57959e660e0N.exe 30 PID 1188 wrote to memory of 2680 1188 4c0875308b7fb43d8887a57959e660e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0875308b7fb43d8887a57959e660e0N.exe"C:\Users\Admin\AppData\Local\Temp\4c0875308b7fb43d8887a57959e660e0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\FilesCF\devbodsys.exeC:\FilesCF\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5031713d8301192bd85864909923a11fe
SHA1ef191c451e653e5dfb3d3c706fd4321d9261a14d
SHA256359b88b5d8c1cd3669c69dbb0414dfc53e0af76db763b91f93f06f83f438a124
SHA512348943bf0931abbfebdcc65a34ef184ef7d1a453e71b09d55e8d2e4b79e1b5b2ca42b8f50f0ce11bc62559c3307caac52a16a27ee97c79bc229ee902cce55bda
-
Filesize
205B
MD5c660dc8e9568307528d35d5a44250513
SHA1727c05ce62d6a9826e1c9fe0c58f6c386ccd6c4e
SHA2568a12cc1cff438f938787adb041bb0ca0bcb657343360bc715f99c73c496d14ec
SHA51268f67647c5b81b9d71f2e62741cf2eb20f2c84e54ac1e7f6652a2e1ce1ad4a4e30bc375aed01a165d0bebf2060c38e68f71cb02b9552930e6fa72243963d834f
-
Filesize
2.7MB
MD5cc9c520c85530ec5b44b643d22306c76
SHA11e959a8fe87661c50323267b895a83916556b454
SHA256ba7006f75a439ca0f239be344864b30a43baee03774d068ce1e19caa4c577911
SHA51268145b88b55d674bd45e2c29e2bf78b103ba994726357ca5c2ba4df227b30f092f1f0bfffbaf53b32016c4f0bef8e736de31ec64cfce6c6eae041b4ea03db9ff