Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 00:08

General

  • Target

    6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe

  • Size

    2.6MB

  • MD5

    f129b67a4ddc1cbcdf4aea0b841c9e91

  • SHA1

    67fc779bdad0decfafabc5692aba52e5ed1b212c

  • SHA256

    6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8

  • SHA512

    bf922d0ff5d882e362e279512dbc6e9d399087fc1b4461f8758261e0941a4d8a3e8ab83c16099543fee21d9184e95a9d63c93fe028bcef67fe9f79731dd730d6

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBzB/bS:sxX7QnxrloE5dpUpMb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe
    "C:\Users\Admin\AppData\Local\Temp\6a60e3c04b4172e8ae0c82352198acb9006a31f100df4c323996d6809404b0b8.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3176
    • C:\UserDot33\xdobloc.exe
      C:\UserDot33\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\UserDot33\xdobloc.exe

          Filesize

          2.6MB

          MD5

          51f8aad2f4019abccf2b5ab860523a64

          SHA1

          e8940d89d797667e062c21418be40e103d8aa1ca

          SHA256

          10fa56ba3d717f5da393d36e2e3632c08e39d098d6816e74848f3cb2e927bbe5

          SHA512

          79de96aa6fd34ddd4939003b3f35a11725faf61282f48fd7113f5f41c307e795f8b02d00e7527bba90bc98e21df840c048ac1898e811cbf81b610c96190e3555

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          205B

          MD5

          bab13846947c5b9177685b5dfc74bd5c

          SHA1

          d1f9e31402701883d3445815076b6a97ed45557a

          SHA256

          5e8f50f0e1f217a47b9d71728a6ab785076615b2c51946e6140ea0f873587cbb

          SHA512

          94c40728ba33700ae0832a53fc1da0ae11510defca264d3767372f81db76839d47f3178fca6f006160cf86ed7b0943567e16e5ec6d2a20b8f4ef838814a26d6e

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          173B

          MD5

          9e72dcc58c2c92dfd801f9da18b7678b

          SHA1

          a5f67437e81be6dba749608aa62ea1427d26d5e4

          SHA256

          e3703119f26603924d1adac2afa569b33a0f9a0b05983eb33ad073085bc6e547

          SHA512

          a1f5804b76d868bde6f71bd14731d56e2d369734a23708db848f38fcdab0870f82bd484c8a48f0b52c34646bbad64bf7948dcedf908982e4e824f282aa826dd2

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe

          Filesize

          2.6MB

          MD5

          60f63e6c83f837170a6b5933d0048db4

          SHA1

          dd853ff1378cfea1099f3e9b58bbc762338ae1dc

          SHA256

          99246b54416419f6107f9322f3017600da947770d07475b5e50c18302c4f1a7f

          SHA512

          9c757ee7a889e8b3e219af60325249b346ab193d6d031f1ceeb3d982f40fc39a01be6ce14cd3fc48211692828d724e6464c6942409ad5f43736923f6bfcddb74

        • C:\VidKD\boddevsys.exe

          Filesize

          218KB

          MD5

          d3dd1c89dfe47fe93e630e17a372d3b9

          SHA1

          bf852fcfe3c7a5a27e841f7b31da8cdaac3448e9

          SHA256

          e65648587225e9ad7ed119240cc7b4908a4cdbf2bdd9b759cd133a54dfdb3c73

          SHA512

          b9ce77c97fdecc61db9f53c00f14e5bce2b82994bed10b5749025e688cda1451503f8da4e48556162ed5fe6cf300e0d4341963de55e4463fe08298ef7a040bce

        • C:\VidKD\boddevsys.exe

          Filesize

          2.6MB

          MD5

          c68c0b8f9cdc6991b30c8674d2cd9462

          SHA1

          6507f3c2bddb8820dfbf178d82d137b420e01f78

          SHA256

          12d2d145d49e46082e5a614af9ad2003be8502f70d6efb132d5eda5ede9db4f8

          SHA512

          9679def999893caf1900799fceebb642ef5fba525340fc1633047a5a650b69c0f49f502fe8c2899abe1287f413422f9a3bd1a74c2a931d886d1877cbe104f277