Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe
Resource
win10v2004-20240802-en
General
-
Target
2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe
-
Size
2.7MB
-
MD5
3948c5a63c978e7f9b520b8bbc38578c
-
SHA1
6e90d3bed4bed7a27a799a07008b3cd5da5b64d0
-
SHA256
2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e
-
SHA512
c97a63dd37c64d2105c7cff30bf397cd8fe12a9bd180fa02a1c091a27da5da4edbba5a298d044ed81c05f66114204f00eed8eae03bc8b384d9fca9f1747c0a69
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBs9w4S+:+R0pI/IQlUoMPdmpSp+4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocIO\\xdobloc.exe" 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ13\\optidevloc.exe" 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 2904 xdobloc.exe 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2904 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 30 PID 2720 wrote to memory of 2904 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 30 PID 2720 wrote to memory of 2904 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 30 PID 2720 wrote to memory of 2904 2720 2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe"C:\Users\Admin\AppData\Local\Temp\2d4d3278cda518d1150747c2402933ff5d687a9fc2809b9c13d7b3973bbaab9e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\IntelprocIO\xdobloc.exeC:\IntelprocIO\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD54daa27494d14fb84c6ab7b20e78f710b
SHA117611db80e6a5a3280b93775b9f611cd4f726553
SHA2565e02be35934c3f2ab78a3142a7414925c29f2c9955a80c60fe5489c72428d9bf
SHA5125c096a17a48bac0ae43f2e1d43de9f9fa7fc46152c16343d2fd2be6cc8d9f93005dba7b3a34850eb9d7d82d55a8f9e0b6fb610fbb0d1e03ed80aeb52db2ce74e
-
Filesize
209B
MD5a243952741fdbb28299fe308e810408f
SHA16ca9c0a70e7e34ff747ef0709f4018928993df9b
SHA256982d30ea370a95592430cad834bd08024b4c259afed5bd4eaf9e5795fa833d5e
SHA512768933b8987f4f41c39866d84bbe10b14d75a4cb146925b8801968132436478a3981c14d62e955784a82d4ade6f7d02a3d9346136a9ab9490cb042abadbac29b
-
Filesize
2.7MB
MD5147c35f93b223ba0bf6721001abf5317
SHA14e2efc87c0c077e1ac0c29c7a460e49631de5155
SHA256400ac990eaa8dea74b48e41af863367d6201e00d9a8f6c35d37873a119bb9720
SHA512e5fac6e5e7b02c922d7dfb272a0ee45f56acd3352b203e591aa473204b7dd63d07dbfb3cde3f027a1867d7d92cb2df7e27d1ebbc05636f80328ee82c0d0e7ba7