Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
c8383db3f5706977de7a1ce6f5333550N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8383db3f5706977de7a1ce6f5333550N.exe
Resource
win10v2004-20240802-en
General
-
Target
c8383db3f5706977de7a1ce6f5333550N.exe
-
Size
2.7MB
-
MD5
c8383db3f5706977de7a1ce6f5333550
-
SHA1
e378a19d3f86473e4661c5ae6ce463684c50de1a
-
SHA256
480a070326b0334f505566e956008f8f6f7e23aec04584d9a6b7d0874198a77d
-
SHA512
b18a2dcce3b05d141e4e933f02c6bf2208deffd326ebb79542292b469e401e10c97edeca698614c2ca26f91e0e22cecb83b348f0dc1dd79598423dcb572b9632
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBd9w4Sx:+R0pI/IQlUoMPdmpSpV4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 c8383db3f5706977de7a1ce6f5333550N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotJB\\devbodsys.exe" c8383db3f5706977de7a1ce6f5333550N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxX3\\optixloc.exe" c8383db3f5706977de7a1ce6f5333550N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8383db3f5706977de7a1ce6f5333550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe 2736 devbodsys.exe 2276 c8383db3f5706977de7a1ce6f5333550N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2736 2276 c8383db3f5706977de7a1ce6f5333550N.exe 30 PID 2276 wrote to memory of 2736 2276 c8383db3f5706977de7a1ce6f5333550N.exe 30 PID 2276 wrote to memory of 2736 2276 c8383db3f5706977de7a1ce6f5333550N.exe 30 PID 2276 wrote to memory of 2736 2276 c8383db3f5706977de7a1ce6f5333550N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8383db3f5706977de7a1ce6f5333550N.exe"C:\Users\Admin\AppData\Local\Temp\c8383db3f5706977de7a1ce6f5333550N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\UserDotJB\devbodsys.exeC:\UserDotJB\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f9118aa7d0ec17931b6002e15fbae146
SHA1c0071356bbdeab392ce22281c670a1befaae945d
SHA2563e2eca327b81767d2cf9ecc91b1ec888189c1fc15add6c60daf4374ccc2da13a
SHA512c005123e558395a7081f35864bd128732590bc5b313c2be931c7dbe157e258c3d88988a6973a844773b357ec9927e09b84a3c36fbf2c20ea3fbaabc0287390c2
-
Filesize
208B
MD5cb1c2f33fae0056c5e892b5e05dba240
SHA189d6caed87a911abf150de30d74b78f68150b3ac
SHA256425cb22ee906e0f6326dcc05c9a8664595e87215f0340ee10263ba4fc3480414
SHA5122d12e298d3e52c74d50f07da1fef904b210df3e6f900427590b11f15e6d279a543e135376abf5e7527ebc13c3c896aeca3e0ec48d3d6bff5795001659c294e05
-
Filesize
2.7MB
MD50089b9d7f694c2cf3592d6888d171ee0
SHA13fcf12d173c5e09c2934275b8f76c2964f6809e1
SHA2562c03cfd5533cea5d91d164490d4185a4722a946d652c1362fc0a18a4bfc43405
SHA512ae9bcdba87da91f178499cb1368dd7baee1f9d90658ebe3e268184e39a487c7689d9f9fe8f0d7d78326d02d1ac9b25c995ac2a1df3128e3af4b0ca6113f0cddf