Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
eec4289984c9bc0ebab6c2fcecf482a0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eec4289984c9bc0ebab6c2fcecf482a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
eec4289984c9bc0ebab6c2fcecf482a0N.exe
-
Size
2.7MB
-
MD5
eec4289984c9bc0ebab6c2fcecf482a0
-
SHA1
122f6e27e4cd6713307807bba6ccc4b6ef395023
-
SHA256
09dffc978af2e70f62549ef7662d74d460d5dd187c53c40dfd3e5c1098f7396c
-
SHA512
9966442055563034e2faf6b09fe7803759540e4567233c4a807fd81c0256e3818825b35f3ef23b8e2a02252bf0046e056565b7fcd775520b6292d21c68f14c74
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBO9w4Sx:+R0pI/IQlUoMPdmpSpQ4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc3Q\\xdobsys.exe" eec4289984c9bc0ebab6c2fcecf482a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintTS\\boddevec.exe" eec4289984c9bc0ebab6c2fcecf482a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eec4289984c9bc0ebab6c2fcecf482a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 2208 xdobsys.exe 2208 xdobsys.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 2208 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 89 PID 412 wrote to memory of 2208 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 89 PID 412 wrote to memory of 2208 412 eec4289984c9bc0ebab6c2fcecf482a0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\eec4289984c9bc0ebab6c2fcecf482a0N.exe"C:\Users\Admin\AppData\Local\Temp\eec4289984c9bc0ebab6c2fcecf482a0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Intelproc3Q\xdobsys.exeC:\Intelproc3Q\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ef723a9c33039ad988210458c3189f80
SHA1ea42a64a88bd0a71fce11a3a1047173f5a1c0014
SHA256384a757fb667e66f4384be61a09f9c2e62c3e3a91e84201e9d1c76450aab77ac
SHA5124a513a341a40cd63a3ddc224c86971e3157adb0e973bec5dc9888a73ad978adba9a61517162ca50215b95be9e5df014068df5010950fb894dc897e10b485cd4c
-
Filesize
256KB
MD5fdae337994aa73d0c5469c41c2f7186f
SHA12872ff0e04cac273008a30043294741553e76dcd
SHA256866402bdc87a7e0a5ba71a7f9dad51af115ba36ece63cc530a0b77ce5d93eb0b
SHA512563d2b949f39bd8467bfbd0759a0cf4f344d3a654284ec120511865cd7fd8b7a73b8ff6910a7902200924a3144cdc7e0f4ba52460b3735f7a49a3a49ceeece35
-
Filesize
206B
MD51c235a04cb8f36950818474eb6652638
SHA14ee9e12c974cf3b33d90b0302c607d246dfbb241
SHA256d4d8b00329ef2e272852c5c14979dfd655d0c6f009a7b0b5217801fbf7bb5d48
SHA512dd5850cd42e252b3186bf3d7377c3f6769c631607589d39dbbc5c249b02cc8b3d54647d8c539e0cc83575fbc45d32f687e5f244b123b7dedd3b6cfcc9f3cf8e1