Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe
Resource
win10v2004-20240802-en
General
-
Target
5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe
-
Size
2.7MB
-
MD5
9e9a0ccc98580bf6f22a82672f25fac3
-
SHA1
d0535c707f51cf600db830949cae4d16d0fc7a32
-
SHA256
5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95
-
SHA512
dcd2d6d5ebb65c3b0ec4f09786db7fda877522273a62e21299ca3319a89d9fb557769da36da72dc446eeb1c89a5aa1061be39527717c6faeecc41f6a30203c3e
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBF9w4S+:+R0pI/IQlUoMPdmpSpt4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4680 xdobec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocE6\\xdobec.exe" 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZQB\\bodxloc.exe" 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 4680 xdobec.exe 4680 xdobec.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2600 wrote to memory of 4680 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 89 PID 2600 wrote to memory of 4680 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 89 PID 2600 wrote to memory of 4680 2600 5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe"C:\Users\Admin\AppData\Local\Temp\5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\IntelprocE6\xdobec.exeC:\IntelprocE6\xdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5c076d190351cd07d7c139a1d312bc37a
SHA1fbc9b0b90a9130e7e820e75fb61bb030a38abd70
SHA2565f223abff1107156a541541d5e76cedf339c94d92b56b7e78842316b0f88b109
SHA51254e3428291ed0a99f743397e039a67212efbb9a34973fdcd384966157f83cb5648161856d419ccfb490345ed7fba07a238869ea0b58040ee0e5b9a97c1f3bbe1
-
Filesize
264KB
MD58935ff6574bbf257d825d2a07bf546c2
SHA1b127a4098af5045182aa0938ffe10bb6b1343062
SHA25647ea16162e55fccca5a2c803a6c091b9b4026910ce034796d131eb852b094748
SHA5128f22a118c03c8444aadf86a4bfd3788b9a09a4db24bde919e52eb3698a113ef32a75cb666ed88547776f6a13afd67b3713773597f024fdafbde648795bc592e0
-
Filesize
203B
MD5afe51e6b249d55ba97b0579ed197351f
SHA14d3db5f57a3be7016b651dc3d5a268517d38644b
SHA2569b6369014e8ce97e8be61d817b31f7e35b7552296be18b9264543b1e8a786322
SHA5124880c0d5dfa9e5ba2c19ef8dcb796853c6afcf0e241bc13e7a4312fa88b61731ede4d9cb99921f27c55531a4e427f356315dd5d6e81ac16c2dd8ce7e71fc33aa