Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
80bc1bdb85eddc713f40ebe02d6774f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
80bc1bdb85eddc713f40ebe02d6774f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
80bc1bdb85eddc713f40ebe02d6774f0N.exe
-
Size
3.1MB
-
MD5
80bc1bdb85eddc713f40ebe02d6774f0
-
SHA1
8e97913c885f8538eee190c5ad3ccb794919bd13
-
SHA256
c11498395a1c2fc98ddbbc2edf5b2f7c4970e87cf1fc287689bdc585a1e18e30
-
SHA512
76c5488d701aed671bafcf6d3810e835732ac8dc13b0d99ff87114e59158442c6e240872e9e4ab36f2668663d40c1cf43a47c2e7e11ca93ec6e8ad6e73d16d89
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBO9w4Su+LNfej:+R0pI/IQlUoMPdmpSpY4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 devdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeE0\\devdobec.exe" 80bc1bdb85eddc713f40ebe02d6774f0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBER\\dobdevloc.exe" 80bc1bdb85eddc713f40ebe02d6774f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80bc1bdb85eddc713f40ebe02d6774f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 2412 devdobec.exe 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2412 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 30 PID 2564 wrote to memory of 2412 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 30 PID 2564 wrote to memory of 2412 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 30 PID 2564 wrote to memory of 2412 2564 80bc1bdb85eddc713f40ebe02d6774f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\80bc1bdb85eddc713f40ebe02d6774f0N.exe"C:\Users\Admin\AppData\Local\Temp\80bc1bdb85eddc713f40ebe02d6774f0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\AdobeE0\devdobec.exeC:\AdobeE0\devdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD50bc7ddaa80ca130ea095cbbc0f3d643c
SHA124471c263e82b811dedaa02aad05958095f0727b
SHA256abf364a8ca94f694b3c72e5263d958e95eb1d7caf8915aa464b3d5df75eea980
SHA512fe36d86067c843f61f92194b0df2788312eeae184c562bdb51de7f75c05641172853fa47bfe3d852e16fae3b0d74dd5aa81ac1ab056d1092dbffb333c56dbcb6
-
Filesize
3.1MB
MD550ae5eec911275e12d529c22b81cac1f
SHA1149f1767c6b99d392198881f812cd7ad31fced8c
SHA2562ab75295885d66ef28011df7799d473f1617a57fdd09cc8944a37060cafc132d
SHA51285e156ab5d9d9c1b3f731affe720fc13341b63830cf2778aeebd9a31724be0630fa0c7fbc82bb05a74c3555266a11cdd9c5f48de394bcf332991316bd00b2216
-
Filesize
203B
MD54128394c9159e9589da204b31ed22ce1
SHA19e63c9ee418813983a44d380c192eecaddb0b3f7
SHA2560bf8151e65f0c44589593a05f67f24121242f4c4742e187b898a484cb2add491
SHA5127098b1820d25b9428412c861602a3b757bbf5857b8f1f0c8ab654d8c6608aa967166eaafa113767dc4b586bcaa773c0240286ed6c9a041bd202b1dec6513266c