Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe
Resource
win10v2004-20240802-en
General
-
Target
6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe
-
Size
2.6MB
-
MD5
f129b67a4ddc1cbcdf4aea0b841c9e91
-
SHA1
67fc779bdad0decfafabc5692aba52e5ed1b212c
-
SHA256
6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8
-
SHA512
bf922d0ff5d882e362e279512dbc6e9d399087fc1b4461f8758261e0941a4d8a3e8ab83c16099543fee21d9184e95a9d63c93fe028bcef67fe9f79731dd730d6
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBzB/bS:sxX7QnxrloE5dpUpMb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe -
Executes dropped EXE 2 IoCs
pid Process 3176 sysdevbod.exe 3008 xdobloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot33\\xdobloc.exe" 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidKD\\boddevsys.exe" 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe 3176 sysdevbod.exe 3176 sysdevbod.exe 3008 xdobloc.exe 3008 xdobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3176 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 90 PID 4660 wrote to memory of 3176 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 90 PID 4660 wrote to memory of 3176 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 90 PID 4660 wrote to memory of 3008 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 91 PID 4660 wrote to memory of 3008 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 91 PID 4660 wrote to memory of 3008 4660 6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe"C:\Users\Admin\AppData\Local\Temp\6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\UserDot33\xdobloc.exeC:\UserDot33\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD551f8aad2f4019abccf2b5ab860523a64
SHA1e8940d89d797667e062c21418be40e103d8aa1ca
SHA25610fa56ba3d717f5da393d36e2e3632c08e39d098d6816e74848f3cb2e927bbe5
SHA51279de96aa6fd34ddd4939003b3f35a11725faf61282f48fd7113f5f41c307e795f8b02d00e7527bba90bc98e21df840c048ac1898e811cbf81b610c96190e3555
-
Filesize
205B
MD5bab13846947c5b9177685b5dfc74bd5c
SHA1d1f9e31402701883d3445815076b6a97ed45557a
SHA2565e8f50f0e1f217a47b9d71728a6ab785076615b2c51946e6140ea0f873587cbb
SHA51294c40728ba33700ae0832a53fc1da0ae11510defca264d3767372f81db76839d47f3178fca6f006160cf86ed7b0943567e16e5ec6d2a20b8f4ef838814a26d6e
-
Filesize
173B
MD59e72dcc58c2c92dfd801f9da18b7678b
SHA1a5f67437e81be6dba749608aa62ea1427d26d5e4
SHA256e3703119f26603924d1adac2afa569b33a0f9a0b05983eb33ad073085bc6e547
SHA512a1f5804b76d868bde6f71bd14731d56e2d369734a23708db848f38fcdab0870f82bd484c8a48f0b52c34646bbad64bf7948dcedf908982e4e824f282aa826dd2
-
Filesize
2.6MB
MD560f63e6c83f837170a6b5933d0048db4
SHA1dd853ff1378cfea1099f3e9b58bbc762338ae1dc
SHA25699246b54416419f6107f9322f3017600da947770d07475b5e50c18302c4f1a7f
SHA5129c757ee7a889e8b3e219af60325249b346ab193d6d031f1ceeb3d982f40fc39a01be6ce14cd3fc48211692828d724e6464c6942409ad5f43736923f6bfcddb74
-
Filesize
218KB
MD5d3dd1c89dfe47fe93e630e17a372d3b9
SHA1bf852fcfe3c7a5a27e841f7b31da8cdaac3448e9
SHA256e65648587225e9ad7ed119240cc7b4908a4cdbf2bdd9b759cd133a54dfdb3c73
SHA512b9ce77c97fdecc61db9f53c00f14e5bce2b82994bed10b5749025e688cda1451503f8da4e48556162ed5fe6cf300e0d4341963de55e4463fe08298ef7a040bce
-
Filesize
2.6MB
MD5c68c0b8f9cdc6991b30c8674d2cd9462
SHA16507f3c2bddb8820dfbf178d82d137b420e01f78
SHA25612d2d145d49e46082e5a614af9ad2003be8502f70d6efb132d5eda5ede9db4f8
SHA5129679def999893caf1900799fceebb642ef5fba525340fc1633047a5a650b69c0f49f502fe8c2899abe1287f413422f9a3bd1a74c2a931d886d1877cbe104f277