Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
d7b9830bc9a120d73664518011253240N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d7b9830bc9a120d73664518011253240N.exe
Resource
win10v2004-20240802-en
General
-
Target
d7b9830bc9a120d73664518011253240N.exe
-
Size
2.7MB
-
MD5
d7b9830bc9a120d73664518011253240
-
SHA1
523c92dfa4a68172d05caee3a8c67f8f3a810c5e
-
SHA256
33a3b8177d40416cff50e2c6b822bb9c3aaac50f060860d117004e8bc85f1d25
-
SHA512
d2db3c4c341b6199adab7de2a709642ccde9a8677434c5167e8b83d792a646c7ca74e30cb411fd708bae0b78eb877878cedc693430544944fb154f266092e419
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBS9w4Sx:+R0pI/IQlUoMPdmpSpE4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1472 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 d7b9830bc9a120d73664518011253240N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvUS\\devbodsys.exe" d7b9830bc9a120d73664518011253240N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZJW\\dobdevsys.exe" d7b9830bc9a120d73664518011253240N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b9830bc9a120d73664518011253240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 d7b9830bc9a120d73664518011253240N.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe 1472 devbodsys.exe 2508 d7b9830bc9a120d73664518011253240N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1472 2508 d7b9830bc9a120d73664518011253240N.exe 29 PID 2508 wrote to memory of 1472 2508 d7b9830bc9a120d73664518011253240N.exe 29 PID 2508 wrote to memory of 1472 2508 d7b9830bc9a120d73664518011253240N.exe 29 PID 2508 wrote to memory of 1472 2508 d7b9830bc9a120d73664518011253240N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b9830bc9a120d73664518011253240N.exe"C:\Users\Admin\AppData\Local\Temp\d7b9830bc9a120d73664518011253240N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\SysDrvUS\devbodsys.exeC:\SysDrvUS\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD52247b1232f84c0508b642310f68bfc49
SHA1690b9b12ab2b93609b0d44bd92c024031ad741e5
SHA2562623211d6ad350bc2b6f50a12916891ffc285559b1ae82443f069f375e0ad286
SHA512dc873fd19b5a07c6d522b831d7b4ec23f0bad39fd6f96629cc804aae98a06da1c5fbdddd9a9af904bfc65bfab26df4a22a39a65e74986f2e598e7d72d2702659
-
Filesize
206B
MD5912a4a2d2cd287e023df7838961d92ce
SHA1d4a9a485affa5260f05d0e72cd45ed55ce0fd98a
SHA256d9071d7ca5e890a2103d87506df2a73d45c23fc78b1a81f0b772de156abe6ee1
SHA51226aab1474c96ed638b3d1531d5791ac21d28e4ea711246bb67b8055fc61df69d48b02adaffaec0cb52974e1adad6f5e1c24a2b81048d193d2462ae0c1cffe067
-
Filesize
2.7MB
MD5f025b659ca1849bc4ab6e8ea6e1b8aef
SHA1107e5d0f5425eaa7fc296598ba95fe60edea5948
SHA25629c95a6062990dd5dff619bb44d05980ac97e0c2a7d28c15545bd08916244f0c
SHA5124b1dc4b8b9809348eeba253f493d6c95617d241e02a25fc2c179b1b643b5a115cf5e5e235206c85276c7574be6688e9fa9f1a962042276e995d874056400066f