Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
e50ddc0ac0961f65272fc4370a017d50N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e50ddc0ac0961f65272fc4370a017d50N.exe
Resource
win10v2004-20240802-en
General
-
Target
e50ddc0ac0961f65272fc4370a017d50N.exe
-
Size
2.7MB
-
MD5
e50ddc0ac0961f65272fc4370a017d50
-
SHA1
d2ebda900629e7cdec4e3d4b57b98b89d7b575c6
-
SHA256
a5e411e3724df697d4585b97aa637301029b17510e3a0b48ffd63cbe10ba8f58
-
SHA512
32c3fb9b861f0a5fc8dbf528145cf19cb39f74e237341880dc6f080f6c5c7f5f226853fcfc53467828205052d370337b940c769fdcdef9cab295a57f703c7cab
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB59w4Sx:+R0pI/IQlUoMPdmpSpp4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 devbodec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocWN\\devbodec.exe" e50ddc0ac0961f65272fc4370a017d50N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidSI\\bodaec.exe" e50ddc0ac0961f65272fc4370a017d50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e50ddc0ac0961f65272fc4370a017d50N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2656 devbodec.exe 2656 devbodec.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 2988 e50ddc0ac0961f65272fc4370a017d50N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2656 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 88 PID 2988 wrote to memory of 2656 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 88 PID 2988 wrote to memory of 2656 2988 e50ddc0ac0961f65272fc4370a017d50N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e50ddc0ac0961f65272fc4370a017d50N.exe"C:\Users\Admin\AppData\Local\Temp\e50ddc0ac0961f65272fc4370a017d50N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\IntelprocWN\devbodec.exeC:\IntelprocWN\devbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD546fe29c7fdc3f4f7b07d17b42dc183fd
SHA1850805d26edf6d2a572da609b13efd0c764d08fe
SHA256e9a438ada3d98e18ea7682c4854748722334bbb1ddfe60dfbc225c8b0633d88f
SHA512bec4b1cb2cbf2ce827897d0121b9377abb6df992c29fa573c5fa4d7a80eeae22fe2d47165e0f48a891fb4207cf0a239b88ac5498acdb700e97777873313fcc8f
-
Filesize
204B
MD5e15dc8f1fa4692efad826179569dd35b
SHA1161209f01578b010985d6fd3a2015419e0c32aec
SHA256583a800b4f0784bc3fa996c401c2a3b2d5fb1a8cb10dd051eb8e7a7a7b20ec35
SHA5128cc6857c486447f9596b4454cfc53141e7f1da66aba9a963ff18c1ff9237145d7de5091dfbd63cb09eb536916568fdb82213e1c266b6ce1a582907492c0a5c18
-
Filesize
2.7MB
MD51e0bce92b0be911f62e37536d473492a
SHA1fc328ebfc58ea426356515d0de05c7327d80680f
SHA25604200100a68ea4a956480730a4b4ef6c71dd0c3bed7b2ee9e46d9f9fe5019a08
SHA512b2c2ff6f4a45b68d5edf14f8d883a5e5d329fd741c08f969388a798b27d867f635920ca714836d53dc17bfce3b8917c6460e1946e26ed185d484e13598b4b308