Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
1bf87d7acd742819c3473a839282ce10N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1bf87d7acd742819c3473a839282ce10N.exe
Resource
win10v2004-20240802-en
General
-
Target
1bf87d7acd742819c3473a839282ce10N.exe
-
Size
2.7MB
-
MD5
1bf87d7acd742819c3473a839282ce10
-
SHA1
3de868f6bb21cc430764137e23b8971393898733
-
SHA256
90c34a9afc2a7d75f6bb374809f0fa09cd9f8b2ac9cb416041e1925275cc0f9e
-
SHA512
2e83eedfd2db96a16ada16309d1f3e187f9ec11dc31a0f369c0a21621fc4d57e622c6ece8cc8bbecbd5f4e49156a5c92950a1a6aa85c44a9895896fbf1b3c43e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBT9w4Sx:+R0pI/IQlUoMPdmpSpX4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2468 devbodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 1bf87d7acd742819c3473a839282ce10N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotTR\\devbodloc.exe" 1bf87d7acd742819c3473a839282ce10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBDK\\dobdevec.exe" 1bf87d7acd742819c3473a839282ce10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bf87d7acd742819c3473a839282ce10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 1bf87d7acd742819c3473a839282ce10N.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe 2468 devbodloc.exe 2280 1bf87d7acd742819c3473a839282ce10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2468 2280 1bf87d7acd742819c3473a839282ce10N.exe 30 PID 2280 wrote to memory of 2468 2280 1bf87d7acd742819c3473a839282ce10N.exe 30 PID 2280 wrote to memory of 2468 2280 1bf87d7acd742819c3473a839282ce10N.exe 30 PID 2280 wrote to memory of 2468 2280 1bf87d7acd742819c3473a839282ce10N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf87d7acd742819c3473a839282ce10N.exe"C:\Users\Admin\AppData\Local\Temp\1bf87d7acd742819c3473a839282ce10N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\UserDotTR\devbodloc.exeC:\UserDotTR\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD538c85dfea6ecd12f33437d83b4f8d65c
SHA1fda3fe07f031242222cab87bbea57dc99a4fa3d3
SHA2564299b4850b6f992b3eb19365299c9aa94649ac7b5865038922010b9d19520e63
SHA5122d1094c76a0a91002e5f613a842443cc9c9841cc9e928f68dea5be439214a5d9c9a24f365142ced9d261e381567fb6ba3cf469b85cd2fa8e35a7161bf4a0c33b
-
Filesize
213B
MD50fe790439d8c2ef68583e634d7e1bea1
SHA11e8bc96fd088cd5278adeaf97df01da51e44337a
SHA256a757098b701e09444ceb903f00badf54426a23d9dd7c7d564cb2f58e629b2c9d
SHA5120d4330fb200d317b6231f31cc6bd7be6047903984a2ba582f4af3b0030b214c8052e1716c3588b7fbad4a30e23506ee0b1d5c4e8bb9e17d51aa3fec4964acc65
-
Filesize
2.7MB
MD53a5c69b201ae3fc2b9e5b063bf5111f8
SHA1ea1639094a2c564f831236ea409eab3668719e48
SHA25676d12fd9b20169e951a939e6b996dbdc483415318dba43d7f2fb28b1e30f6b2f
SHA512d219c87736df7ae48b57e695ee2eaaedf442f03cd322375dd6d986fe1e1619bfd132694d6feb28cae7ac5475dc390780ef4eb2a8650e815f6932291fa64852ac