Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe
Resource
win10v2004-20240802-en
General
-
Target
a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe
-
Size
2.7MB
-
MD5
d4da6fd35f9c36a37219dbd3508c54fd
-
SHA1
5245fedbde6369d227e622ad9511ca994207c3bb
-
SHA256
a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b
-
SHA512
60cb6c43d60d8f159611586d6889387c3ef2836e70981fea5fe49c394cf01f0eb44e2146c988da1f7c2bdc945e4730ed6650347faa34672646fe0e2fa454d72c
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBo9w4Sx:+R0pI/IQlUoMPdmpSpK4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Admin( -
Executes dropped EXE 2 IoCs
pid Process 1644 devbodloc.exe 2360 Admin( -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv17\\devbodloc.exe" a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB1I\\dobdevloc.exe" a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin( Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1536 ipconfig.exe 2456 NETSTAT.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin( <<-@-(;-95:3(5\>;?;2@(#5:0;C?(@->@�1:A(>;3>-9?(@->@A<(locdevbod.exe a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe 2360 Admin( 2360 Admin( 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 1644 devbodloc.exe 1644 devbodloc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1644 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 95 PID 5024 wrote to memory of 1644 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 95 PID 5024 wrote to memory of 1644 5024 a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe 95 PID 1644 wrote to memory of 2360 1644 devbodloc.exe 100 PID 1644 wrote to memory of 2360 1644 devbodloc.exe 100 PID 1644 wrote to memory of 2360 1644 devbodloc.exe 100 PID 2360 wrote to memory of 2580 2360 Admin( 110 PID 2360 wrote to memory of 2580 2360 Admin( 110 PID 2360 wrote to memory of 2580 2360 Admin( 110 PID 2360 wrote to memory of 4600 2360 Admin( 112 PID 2360 wrote to memory of 4600 2360 Admin( 112 PID 2360 wrote to memory of 4600 2360 Admin( 112 PID 2360 wrote to memory of 2792 2360 Admin( 114 PID 2360 wrote to memory of 2792 2360 Admin( 114 PID 2360 wrote to memory of 2792 2360 Admin( 114 PID 2580 wrote to memory of 1536 2580 cmd.exe 116 PID 2580 wrote to memory of 1536 2580 cmd.exe 116 PID 2580 wrote to memory of 1536 2580 cmd.exe 116 PID 4600 wrote to memory of 2456 4600 cmd.exe 117 PID 4600 wrote to memory of 2456 4600 cmd.exe 117 PID 4600 wrote to memory of 2456 4600 cmd.exe 117 PID 2360 wrote to memory of 1896 2360 Admin( 125 PID 2360 wrote to memory of 1896 2360 Admin( 125 PID 2360 wrote to memory of 1896 2360 Admin( 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe"C:\Users\Admin\AppData\Local\Temp\a9280272bf246833cac57134c1ae9f2175b1e6e2c3c696676f2094bc64c4271b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\SysDrv17\devbodloc.exeC:\SysDrv17\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin(C:\Users\Admin(3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig > C:\Users\Admin\ipconfig.txt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\ipconfig.exeipconfig5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netstat -a > C:\Users\Admin\netstat.txt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -a5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dir C:\*.txt /b /s >> C:\Users\Admin\grubb.list4⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dir C:\*.doc /b /s >> C:\Users\Admin\grubb.list4⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:81⤵PID:3572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5832c4e71a2d5119d360777ddd0b96cab
SHA1432ad8d4ccf89fc87c84865f5db5ff203f42cbb4
SHA2564ba9794c1f433880f23236792957a99d936d7a06a9989fb27ffee665c55f50aa
SHA512ab8a7b0d85c694693f0b6e262554390ed1d5ef22a84e527f76efff9e8cd1fef770b01d07dc90f22f244f40cc6a538c32bc32bc07a850cb0c780a18f03af80194
-
Filesize
2.7MB
MD58e254d0e53e952d05a81b15714258b2c
SHA126b9e638ca4e255cafc0fa23dc2fea50fc21a4ef
SHA25687b8ba1d015f63bf5234268ca99c5c2120a078a700f9c6978b03c0047b13932f
SHA5122398e21a293568624a278a3dd5ed64a6eb182985f07b66ccf98bf45ca4436e6b85e262429b296ec692c269058e976668a1ed023e299be6bdfb4c924010443b60
-
Filesize
2.7MB
MD5d0675fcacafc92670f035090d881d761
SHA18f43691a862cf98f7ffae7831f1780d02e005019
SHA2569fe26de8f20d0501871ae1140560f8c3a975d2d7303130c771f43e3c4c02853d
SHA512e5ef56a67618a6caae05fc2f203226f6af64affa4bdee7e47c9d9de30e8d6ec54491ef4becce049c087c44b85369ba09bbad962a31f4b52eead38643812c42cf
-
Filesize
2.7MB
MD55390262eda2a400ae3928b2da2225e53
SHA1fb27a02bf8ca2031da605fce4063846946374867
SHA2562b0fb596c46449c15cdbdca92bfc5fb004ef5b51d778d85e132972b772be927c
SHA512998671175c0034ac16aab63a3db7550ece1b35fc4ab16b732b010f6fd38056674c1d61038b6059e3000b0b2d4745d44b0d8740187350671fdb902563e3ae83b1
-
Filesize
209B
MD5b6561ff223c6cf0c3fd0ded0cdda2b74
SHA117ab4c1ebc4f5f1ac1e5034e8cba4c45b267a210
SHA256993f66ba25d0cc94e1628064625af3f16be73a88a37c02a6658f3136b5e5446b
SHA5123ee0afbe45398a4e26444c581fd1f109c2959d04d696eef4952ec442c1e4f73dfe8504941fb6657c4524a3033aace7910f49d4f2c1339dbb252eaa36878aa04d
-
Filesize
207B
MD5c930d63f553561f1bd17d336a60fccc9
SHA1a4705f142f3c2348f7b3b04b301d229d05882246
SHA256e58d383a2ee24d8fd2be565a268357d149384e1630a9ab8f69dcfe54d509e459
SHA51214b6de0e62746146d2ddf211cec5014381ad6029ce494b968a31fb8bbb4355e8736abc6dcbdae8be122f51a1cf077db3a8118b1b5ab889a6240fcfe4bd9452f8
-
Filesize
39KB
MD5d4bc2cb599c66ec88c33fbf270b6f466
SHA11d8d4a67622f6f3e58cbe1513af250e8abbb43ee
SHA25635cfd59e70b64a657fedb7d54dd15b533b7706ed26101f848017355a5ce38cd4
SHA5128dd65c3001bcda1d8fe8831f45319d629f0837000b64929fda54a43bf614236f2506941caa590b1d34a84cdcd0e7f9faee3e2e33f2f3b177f78b11d7501d543d