Analysis
-
max time kernel
119s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
1d3813e16021368450e16271ef383de0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1d3813e16021368450e16271ef383de0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1d3813e16021368450e16271ef383de0N.exe
-
Size
2.7MB
-
MD5
1d3813e16021368450e16271ef383de0
-
SHA1
f762564ecb01a8b40293f8faedd885987eb4d267
-
SHA256
3e72047d87d025478d2979392a0ecccf33e80ee000dcafd3ee28ca8c585674c9
-
SHA512
cf79ec8673ddc08798b2eeb352962ca9818a7f5ef715d88529a031837e68634fa7bfc7c6dd84b94121f00a6e9ad3c7e938f63140b4dd0c973f4b04b7a63ebf9c
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBd9w4Sx:+R0pI/IQlUoMPdmpSp54
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 devbodloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc7Y\\devbodloc.exe" 1d3813e16021368450e16271ef383de0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintUN\\optixsys.exe" 1d3813e16021368450e16271ef383de0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d3813e16021368450e16271ef383de0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin"66 ':'"5'3\4-"\)8595,:"\4*5=9":'8:�+4;"85-8'39":'8:;6"ecxbod.exe 1d3813e16021368450e16271ef383de0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe 1724 devbodloc.exe 1724 devbodloc.exe 216 1d3813e16021368450e16271ef383de0N.exe 216 1d3813e16021368450e16271ef383de0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 1724 216 1d3813e16021368450e16271ef383de0N.exe 90 PID 216 wrote to memory of 1724 216 1d3813e16021368450e16271ef383de0N.exe 90 PID 216 wrote to memory of 1724 216 1d3813e16021368450e16271ef383de0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d3813e16021368450e16271ef383de0N.exe"C:\Users\Admin\AppData\Local\Temp\1d3813e16021368450e16271ef383de0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Intelproc7Y\devbodloc.exeC:\Intelproc7Y\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD523473b36276be7537767707669581559
SHA1e8e0b9dd8073783137508e95f6ce7c98df18f000
SHA256158f16e96d06892b0e55ba6d17371e2d9bc2ea1b614a2349048fafe6827007e1
SHA51259edb832b751772df6e5a57529743640a84aeccabeb9650eb66b164c0f2f56d7166bd40abe64e99b6870af10057d90177e3c982d1b08973dd092ea41470ed617
-
Filesize
22KB
MD5cc51b3b7d209610f7a21f92f3b22e1e3
SHA1d340f9fa1dce87346279c88d1951a44ae8a2a3ce
SHA2566ae2d32ade74ce7d12c65077d60081010e1011e8a3aff6f70b42144fbb283a2b
SHA512ee53bfc3287b9521ed72436ef4f8f763ec3d288c178bdedb22629440b3472ab7431c47027b83dc1dadb9c434f80a356aab24a536824210f7f94672b2946cd921
-
Filesize
207B
MD5d41cb0423c1b049a4bdf949391c6ee88
SHA1becc0327dfd4e23fddbb4544f34cba9a69aff6f1
SHA2562ca5f167186d43c03500a58862bcb48e41f0050811ddd947da7d432c18b57129
SHA51273b34430808e7335feb45c8c7a7e858f0467ffc1ad245b6326ffbe16d3eec820bab5ba635c4f47388ae4d13e55ac9b4f9724edf0f07c43d960a1e5b8bc415913