Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe
Resource
win10v2004-20240802-en
General
-
Target
bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe
-
Size
2.6MB
-
MD5
cb99d27589a8756fa16c3a037ba5f2d8
-
SHA1
f65cf4abb3f4d13a5acf5d2421430594204d39c3
-
SHA256
bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8
-
SHA512
7d24652f519a948476b333e13c662be3f2942772e58cad891e6e956ffce1c3a386a9f0d8407eba47934ca69ec5d61c4de3e22471b888f0f93bdfedf1c41d8fa1
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bS:sxX7QnxrloE5dpUp2b
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe -
Executes dropped EXE 2 IoCs
pid Process 2764 locxbod.exe 2684 xbodsys.exe -
Loads dropped DLL 2 IoCs
pid Process 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc9Z\\xbodsys.exe" bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidZN\\optixsys.exe" bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe 2764 locxbod.exe 2684 xbodsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2764 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 31 PID 1544 wrote to memory of 2764 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 31 PID 1544 wrote to memory of 2764 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 31 PID 1544 wrote to memory of 2764 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 31 PID 1544 wrote to memory of 2684 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 32 PID 1544 wrote to memory of 2684 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 32 PID 1544 wrote to memory of 2684 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 32 PID 1544 wrote to memory of 2684 1544 bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe"C:\Users\Admin\AppData\Local\Temp\bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Intelproc9Z\xbodsys.exeC:\Intelproc9Z\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD54914674521a41209e628be7a3c5d1201
SHA177bfc5a9f22658610d0c1b21b5abd86229ab760a
SHA256ccc5249854e118a7e19c5d24b2134ad0fe21c4dff8fbe5c2a1ee787371ea9dfb
SHA512ebb4c4f5248a9bac04e1fdebba7638ca2f34e4fb4901c370486160eaf102339c0c3aac167ac36d8d640701a2e19a5f80ae877b29d4fb026b2fe0686096271a3e
-
Filesize
172B
MD572848c77c1411cdd64523fbe244dfa66
SHA1113666d01cb75f3119f5434df7f26c7ad95359d1
SHA2569e99e49d59046f1fc8b4c785ccdfb322b49a468f094db6319886063b8fc1d3f4
SHA5129a50b7c4dae2010bd1e24039f4df1368a7edf4b5f49b2f3556c2c2f4f56cd4293d5066b90045feb1f05fd244af90058a356367b110386087c754f449d549f0c3
-
Filesize
204B
MD58296e73d7295e4f7d07164ecf2a52fa8
SHA138491a337fcdf68c78ad1c70b4850a118ea80f1d
SHA2565f561b92bc4f3802ba20f668ef5aa8c60cf94044ba7f44f3cfafe9b2195b333f
SHA5128ba8e42f3fa2165d42e2b7c07fea3bdb9740aabc0f36e20f235407d963bfd357fc13ec616ad8b83d7724fa7f005c31feea3c28d8cad1dd3463ae85fce32e7f58
-
Filesize
2.6MB
MD514127aead547f4c839a5c3d6cca3cea7
SHA14092088b3c582b8814ae47ec097c2ee735d824f8
SHA256cc7c73286b674181a53faed8d5f6efb3b6d919b222f57b07570c99c20f599874
SHA512b4758b8598e52523276884c24591e4b7406587e5f9f60ac4e21ff42881206dd95d661291123e132c74791e0977a3094c161b8b53d402ed830372f3c95df511fe
-
Filesize
2.6MB
MD5bfaeb1dee80bca4bae256586c194ad5f
SHA166b42814a58531f2cc390ca3e96ddd63907c9cc0
SHA25602e124b72ade7337b0fe88094d25e67f9c9f0af6686da32d1f8878f45dc5737f
SHA512c1cf1ad698ae988c88ede3f1accb638274859d9ecfda8edaf20f2df22677ca77987846cc21e21a50138aa81cf6abe3701347ec270d4f54f326f41784c96cf21a
-
Filesize
2.6MB
MD569f8185f5d49f5ded781a8b14db21b18
SHA10508e8b00df020f2e3d52bdd6803845402fdf9e8
SHA256d0a2eeaf8e6016d4d7b73b8130e56bed8b69de0ba112b6c93443c0a38ef47cd5
SHA512aef443d0d99f1decc53bd932ad66839ee9482a38afe56e49434706be28971bde89ef68fb623052747059b1b9618bf47c2c2aad865afea6fda8c87c5824d6384c