Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2024, 22:37

General

  • Target

    5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe

  • Size

    2.7MB

  • MD5

    9e9a0ccc98580bf6f22a82672f25fac3

  • SHA1

    d0535c707f51cf600db830949cae4d16d0fc7a32

  • SHA256

    5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95

  • SHA512

    dcd2d6d5ebb65c3b0ec4f09786db7fda877522273a62e21299ca3319a89d9fb557769da36da72dc446eeb1c89a5aa1061be39527717c6faeecc41f6a30203c3e

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBF9w4S+:+R0pI/IQlUoMPdmpSpt4X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe
    "C:\Users\Admin\AppData\Local\Temp\5000c2af391a7bf2c4fd04c9a31996ffc693e3d8190cde52e99ebb825a9ccb95.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\IntelprocE6\xdobec.exe
      C:\IntelprocE6\xdobec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocE6\xdobec.exe

    Filesize

    2.7MB

    MD5

    c076d190351cd07d7c139a1d312bc37a

    SHA1

    fbc9b0b90a9130e7e820e75fb61bb030a38abd70

    SHA256

    5f223abff1107156a541541d5e76cedf339c94d92b56b7e78842316b0f88b109

    SHA512

    54e3428291ed0a99f743397e039a67212efbb9a34973fdcd384966157f83cb5648161856d419ccfb490345ed7fba07a238869ea0b58040ee0e5b9a97c1f3bbe1

  • C:\LabZQB\bodxloc.exe

    Filesize

    264KB

    MD5

    8935ff6574bbf257d825d2a07bf546c2

    SHA1

    b127a4098af5045182aa0938ffe10bb6b1343062

    SHA256

    47ea16162e55fccca5a2c803a6c091b9b4026910ce034796d131eb852b094748

    SHA512

    8f22a118c03c8444aadf86a4bfd3788b9a09a4db24bde919e52eb3698a113ef32a75cb666ed88547776f6a13afd67b3713773597f024fdafbde648795bc592e0

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    afe51e6b249d55ba97b0579ed197351f

    SHA1

    4d3db5f57a3be7016b651dc3d5a268517d38644b

    SHA256

    9b6369014e8ce97e8be61d817b31f7e35b7552296be18b9264543b1e8a786322

    SHA512

    4880c0d5dfa9e5ba2c19ef8dcb796853c6afcf0e241bc13e7a4312fa88b61731ede4d9cb99921f27c55531a4e427f356315dd5d6e81ac16c2dd8ce7e71fc33aa