Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 04:26

General

  • Target

    bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe

  • Size

    2.6MB

  • MD5

    cb99d27589a8756fa16c3a037ba5f2d8

  • SHA1

    f65cf4abb3f4d13a5acf5d2421430594204d39c3

  • SHA256

    bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8

  • SHA512

    7d24652f519a948476b333e13c662be3f2942772e58cad891e6e956ffce1c3a386a9f0d8407eba47934ca69ec5d61c4de3e22471b888f0f93bdfedf1c41d8fa1

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bS:sxX7QnxrloE5dpUp2b

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe
    "C:\Users\Admin\AppData\Local\Temp\bc84b0c6f444bb6f98bff32d08cec56fb7b2ed2cd3bc14607804b8566a389fc8.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2764
    • C:\Intelproc9Z\xbodsys.exe
      C:\Intelproc9Z\xbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Intelproc9Z\xbodsys.exe

    Filesize

    2.6MB

    MD5

    4914674521a41209e628be7a3c5d1201

    SHA1

    77bfc5a9f22658610d0c1b21b5abd86229ab760a

    SHA256

    ccc5249854e118a7e19c5d24b2134ad0fe21c4dff8fbe5c2a1ee787371ea9dfb

    SHA512

    ebb4c4f5248a9bac04e1fdebba7638ca2f34e4fb4901c370486160eaf102339c0c3aac167ac36d8d640701a2e19a5f80ae877b29d4fb026b2fe0686096271a3e

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    172B

    MD5

    72848c77c1411cdd64523fbe244dfa66

    SHA1

    113666d01cb75f3119f5434df7f26c7ad95359d1

    SHA256

    9e99e49d59046f1fc8b4c785ccdfb322b49a468f094db6319886063b8fc1d3f4

    SHA512

    9a50b7c4dae2010bd1e24039f4df1368a7edf4b5f49b2f3556c2c2f4f56cd4293d5066b90045feb1f05fd244af90058a356367b110386087c754f449d549f0c3

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    204B

    MD5

    8296e73d7295e4f7d07164ecf2a52fa8

    SHA1

    38491a337fcdf68c78ad1c70b4850a118ea80f1d

    SHA256

    5f561b92bc4f3802ba20f668ef5aa8c60cf94044ba7f44f3cfafe9b2195b333f

    SHA512

    8ba8e42f3fa2165d42e2b7c07fea3bdb9740aabc0f36e20f235407d963bfd357fc13ec616ad8b83d7724fa7f005c31feea3c28d8cad1dd3463ae85fce32e7f58

  • C:\VidZN\optixsys.exe

    Filesize

    2.6MB

    MD5

    14127aead547f4c839a5c3d6cca3cea7

    SHA1

    4092088b3c582b8814ae47ec097c2ee735d824f8

    SHA256

    cc7c73286b674181a53faed8d5f6efb3b6d919b222f57b07570c99c20f599874

    SHA512

    b4758b8598e52523276884c24591e4b7406587e5f9f60ac4e21ff42881206dd95d661291123e132c74791e0977a3094c161b8b53d402ed830372f3c95df511fe

  • C:\VidZN\optixsys.exe

    Filesize

    2.6MB

    MD5

    bfaeb1dee80bca4bae256586c194ad5f

    SHA1

    66b42814a58531f2cc390ca3e96ddd63907c9cc0

    SHA256

    02e124b72ade7337b0fe88094d25e67f9c9f0af6686da32d1f8878f45dc5737f

    SHA512

    c1cf1ad698ae988c88ede3f1accb638274859d9ecfda8edaf20f2df22677ca77987846cc21e21a50138aa81cf6abe3701347ec270d4f54f326f41784c96cf21a

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

    Filesize

    2.6MB

    MD5

    69f8185f5d49f5ded781a8b14db21b18

    SHA1

    0508e8b00df020f2e3d52bdd6803845402fdf9e8

    SHA256

    d0a2eeaf8e6016d4d7b73b8130e56bed8b69de0ba112b6c93443c0a38ef47cd5

    SHA512

    aef443d0d99f1decc53bd932ad66839ee9482a38afe56e49434706be28971bde89ef68fb623052747059b1b9618bf47c2c2aad865afea6fda8c87c5824d6384c