Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
82d3cd7883e2d506a2e62472f2689810N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82d3cd7883e2d506a2e62472f2689810N.exe
Resource
win10v2004-20240802-en
General
-
Target
82d3cd7883e2d506a2e62472f2689810N.exe
-
Size
3.1MB
-
MD5
82d3cd7883e2d506a2e62472f2689810
-
SHA1
646eec4f1cf7e2ecec088d0871adfce7281e4595
-
SHA256
016d17cb37fae920b04c3371bd5a48fbb16173196c8c95584083e83dd21cb79e
-
SHA512
1d3e59c8d2df19be81356f0330df2882eb07170de0014a16a589f46a270d7d5423dbd7fe45912f5b2c67d81d30a503f384a90ddf80852bf395ae35252675757b
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBm9w4Su+LNfej:+R0pI/IQlUoMPdmpSpE4JkNfej
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1848 xdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocEL\\xdobsys.exe" 82d3cd7883e2d506a2e62472f2689810N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZUN\\dobaec.exe" 82d3cd7883e2d506a2e62472f2689810N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82d3cd7883e2d506a2e62472f2689810N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 1848 xdobsys.exe 1848 xdobsys.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe 4784 82d3cd7883e2d506a2e62472f2689810N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1848 4784 82d3cd7883e2d506a2e62472f2689810N.exe 88 PID 4784 wrote to memory of 1848 4784 82d3cd7883e2d506a2e62472f2689810N.exe 88 PID 4784 wrote to memory of 1848 4784 82d3cd7883e2d506a2e62472f2689810N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d3cd7883e2d506a2e62472f2689810N.exe"C:\Users\Admin\AppData\Local\Temp\82d3cd7883e2d506a2e62472f2689810N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\IntelprocEL\xdobsys.exeC:\IntelprocEL\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e2251cdce268c8d291c82ee63c4ea823
SHA1c73d834d9ba1da1e6808834cef44a022eb5a8c46
SHA2560393d134a241fbabfc48eadc8b6d2500c8f4bc1e926ba7ca84976c48623b70ea
SHA512eca09e140d253e1076472af75cef6e5a70a695c4e4ffb60ebfd26ad68ffc599de510388dbc0520a44b776dd186ab1b2c831d5e80e97ced0467d1bbe88f6991d1
-
Filesize
393KB
MD543d58f7eb17f55ce9ee1adedd88cda77
SHA1b40134fd43836a5676c8313eb5c05e87653126c0
SHA256d97695088b2a88e1661c2366108410703cd3a3c7ba94cc72a35d8207a7d286ea
SHA512b314611176b2ed10308df771057da68d79a04b60745b8d4f4172ac4f58cfa4ed5e17ca9870a80431a16977c8b5aff3be5652a570d3c52f0248d9afd65dc14c88
-
Filesize
203B
MD53402bd43f1f4afe856cb28aa21c0527f
SHA114e3e548cbbdfa976f428646be65cfda2daa15e0
SHA256e55d8347c8f7376d75604218c2b4b857a2e4c5c122677eccaba2ba1d4cac356f
SHA5129ac13f95d2eff0f5fa181afac437aa74e4d13e8863b08eeb61ac34f867080713424f6f03181770ed5f560520d8b765fc94b37658f6d7cae1e6c9f72fa5b89d9c