Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe
Resource
win10v2004-20240802-en
General
-
Target
55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe
-
Size
2.7MB
-
MD5
9889752999dedd0298e11d955e2130a1
-
SHA1
b8c1fb050ddb391a4eae7943954ffbc23f28a547
-
SHA256
55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd
-
SHA512
6dbafd1f14a9139b63156975654a4f165d31e7132a51270c2faeefbc256e792f1cb69686f9deeefe42559c2ae1deabaf250b2384d437b3dbdd9eded777c13c69
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBJ9w4Sx:+R0pI/IQlUoMPdmpSpd4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesGP\\devbodsys.exe" 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZNB\\bodxloc.exe" 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 2804 devbodsys.exe 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2804 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 30 PID 2864 wrote to memory of 2804 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 30 PID 2864 wrote to memory of 2804 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 30 PID 2864 wrote to memory of 2804 2864 55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe"C:\Users\Admin\AppData\Local\Temp\55628dccdbd961125c79bc3f069dc6b91d715338940d7217c702cb4538b9e2bd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\FilesGP\devbodsys.exeC:\FilesGP\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5e0b0b96c87824575faf08064af74ae2a
SHA1ce73c587cfd4113fd158fdc8b75d6f952e6f9f19
SHA2565eb296f0a0d4cc71d37915e1fb62b18f72b7f2064e64f0fdd3a8c58589a9dffa
SHA51290abe42d0740a57bc089fa19df435f02fcfe182d71ea03c8968cf87f1f1b7d4e07cb7a429793a09b4c09c70a6ce2e441a0645356fd0dc29ad6ab335dc92a3e5b
-
Filesize
203B
MD56ea8be1bce5a0bc4c8d66386ae1e3179
SHA15f8506d2fa0ea144d136085303551213fb5c9b6c
SHA256369d3810e0553f08cbd95b4b6af06fbee500b332f0e4c383313a5371c7b6812e
SHA512455ffaecef8aa6d596c4f8a644f1dccd533a3bcd21b9d8aaef5620a78fa785e279b26d80d29f9a389831d5fa91fa276a1d2a53767623183e2ac013fc98576d3f
-
Filesize
2.7MB
MD55e98e4b00b2a5d10b1aa2c1faf4bcbe5
SHA18ad63e0b696e7f9bfeb2a2fca83d2ccdebcd8c69
SHA25640e8e49385639e72a839dfbb772afad22f376e823c75321bdde07c4fc47f9f60
SHA51222a601d405a66d30186029a8d8e1d5429ef88819f0b54b1bc1c38306f381c11aa2d6bb5bb42ad78a82586f4283fa4e7dcfe8a3b0554d5add8278f6b540785c34