Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe
Resource
win10v2004-20240802-en
General
-
Target
6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe
-
Size
2.7MB
-
MD5
bb0f185838cb005467c702d14c9a7694
-
SHA1
7a184a5899845aca5e387268d35eedafa752d5ef
-
SHA256
6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa
-
SHA512
33885f317b3593838650701a0ab702ac5c9426077d60482c3a21ef99437d93b32a3c905ab42e4a358e0b66e02ce5d4d9696bf1def4ba51cbec659bdc630b3125
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBK9w4Sx:+R0pI/IQlUoMPdmpSp84
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1116 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint1C\\optidevloc.exe" 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotX0\\devbodsys.exe" 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 1116 devbodsys.exe 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 772 wrote to memory of 1116 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 30 PID 772 wrote to memory of 1116 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 30 PID 772 wrote to memory of 1116 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 30 PID 772 wrote to memory of 1116 772 6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe"C:\Users\Admin\AppData\Local\Temp\6ca6287e865ef445cfb93e7f2cdb2dbbd06909a5ad027884ef4540a9ab811efa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:772 -
C:\UserDotX0\devbodsys.exeC:\UserDotX0\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD57bdca6cf2d00ab8b26d8585b0da0c634
SHA1c50ea7df9295ae9d1740613b1e76a0bf51f338b4
SHA25629b763903a0d649bb5942c5703d71b907b3e6e6c4c6220a100fff6427318b831
SHA5129670f9cd0a8d1ce4f61ca62fc0d126b204f631daf37364025cbdd8dd78e8d8b102c96e3dc6262965adfb921ab76015ec3114d80c8a233ba3427074ef2353cf6f
-
Filesize
207B
MD5dfdbfa38c9ae8539e420664cc3451321
SHA16eff70771bed19a672b37f0469ca54f287a0f391
SHA256c01423b624e45563efd5803700ab5310ac2412960189c5f13c2940674f3aeefc
SHA512c740238bd77799b724b54d3221b1139f127effc27fe28c38e85f399b53d0415c198bda0e922dff8d9f85540e95f538b33455f18543af1caaa22731df62864948
-
Filesize
2.7MB
MD589353cd18e33a55ea134a190cd271520
SHA13dcd053fedb513babbe234f3bdd3a8e13710fd12
SHA256c483c283b6e175e62c55575ce95196cb29b0a99399b072ef8fb9924a87e01dfa
SHA5120be18c4aa96ea8d44255600c972044b59509c4edb83fc8d0d60cd69c77de939fc3fe4ef77470724e1bb642f66e4ee42f3e215362c779650cf16359c6dc0bfa39
-
Filesize
2.7MB
MD53dfd7aa10432f74f0fd6002f55ce8939
SHA14418561de83b90d439635d2efa210861ea0fe8e6
SHA2562add3be566015532f8aa66a0e4c1ecc05890a958a45722dcf6e02dbfc22488c1
SHA5128174de30ff020a15d9cbe50f532c94984f0fe5f66fe66a76c43262b1346b1301d58a675fa67ffe2a8400a3cac1cd80a7d32dd02ac4562005cae47369853ff5e0