Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
5d44d931b2aab85ab66c3806c6aca850N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d44d931b2aab85ab66c3806c6aca850N.exe
Resource
win10v2004-20240802-en
General
-
Target
5d44d931b2aab85ab66c3806c6aca850N.exe
-
Size
4.0MB
-
MD5
5d44d931b2aab85ab66c3806c6aca850
-
SHA1
fc51cbe724e9be94a9a3ab061c4693c75324d41b
-
SHA256
b31f9d02c756e95a2eba310bf583e3a0cf97cfab0668751c7ccb6f9197824d34
-
SHA512
a38306f47ad955bc5fd0d9dd6d32dd4ceb8979a2bd6a9ac53874c6e0e25fd3705737fa73554a2cc4d5a67cb31fe7695f7379696a3f7dea7a6e537900c8310f37
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp7bVz8eLFcz
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 5d44d931b2aab85ab66c3806c6aca850N.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 locabod.exe 2688 devdobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 2084 5d44d931b2aab85ab66c3806c6aca850N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintHK\\dobxec.exe" 5d44d931b2aab85ab66c3806c6aca850N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrv6A\\devdobsys.exe" 5d44d931b2aab85ab66c3806c6aca850N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d44d931b2aab85ab66c3806c6aca850N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe 2140 locabod.exe 2688 devdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2140 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 30 PID 2084 wrote to memory of 2140 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 30 PID 2084 wrote to memory of 2140 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 30 PID 2084 wrote to memory of 2140 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 30 PID 2084 wrote to memory of 2688 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 31 PID 2084 wrote to memory of 2688 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 31 PID 2084 wrote to memory of 2688 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 31 PID 2084 wrote to memory of 2688 2084 5d44d931b2aab85ab66c3806c6aca850N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d44d931b2aab85ab66c3806c6aca850N.exe"C:\Users\Admin\AppData\Local\Temp\5d44d931b2aab85ab66c3806c6aca850N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\SysDrv6A\devdobsys.exeC:\SysDrv6A\devdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5d20f59873ec5805928f68eebcf7f1a19
SHA1f9eceaa81835c0e7c12ba7251975da0fefceec92
SHA25665c32e76f46fe462192833d583c2faf1de00e730a2f38538afff39bd2d2a9343
SHA512ca2278faed1845c30e10f8c77c8e687c1eeb482f32cfd72704ec197de49c3f2c4056c583fdfdc7b0d5ff3f584e967f364386338770f2639990d3b884a1a10e33
-
Filesize
4.0MB
MD5f7ecba7315a4ddc3743a9d71a002d0d5
SHA137f5cd5a68b74c35c8915273762098b7a253fa77
SHA256759068e99a78973cfb763a717bac3a5b3afddc350acdcafd48a9fd011876e7d0
SHA5125247e572d97b6af3e9fa1365b812e6f72914c5732f07fe0ebde1fb35d0d87b8604645a4f1aff1b2dc446e2de87fac6be5bf1e293a0b3118f0fac3f2d058d6e25
-
Filesize
4.0MB
MD55488ffbabbd9dbb0d0194e19c0f37fb7
SHA11970b025c29398f1c846ce0664a0945bfd401142
SHA256aacab2ddf5e121989b7a77e112241b279f24efacf8f44ea22f0e156f940eb61e
SHA512a90caf00ad0b083ef62a4009ca8cdb00e278d8c84ab0d8a261ae307b01280fc5102679b15ccc1304ba3c81d970e8ed8af508add45485b5385bf457b91abdfb20
-
Filesize
170B
MD514c174d19b7645dd8ad0c0ecfd4b34d6
SHA14d6b376527fb761e13cfbe30fa7b8f90588a8483
SHA256669503477723853000183cbeeedf721edfbed879184cc7a6cbc10a1949d6934d
SHA5128eac0cdda229465460150c5d05f1f47a04210e95d26a0ed6bdfe761fbae1a6a77eb840d2dc9f3ffaba8119957729aaa90141f2979df5da696056bf1ec9b18bd9
-
Filesize
202B
MD594757ea1dac80286411777bba1946423
SHA117157d408bb299c2ac40b28dae97485f1565e72c
SHA2564a0d3c615ec54cff9eb8a50632182d905a2bc863d4a49bdf84a52192ed96b4d3
SHA512abf2684a51326bbdfef559f5824693ffa6dd066174a506a84eaff3e652647fbdeec1173a320f17daf4ecc8f85378b385c14d08747d5cfc1d6ae2da79fe50bb9f
-
Filesize
4.0MB
MD51cca6a8765ea636e5877d1dc86668e99
SHA1b5ad971aac79eba4aad2f8cffcf466d9ec868edb
SHA256adebbb23cf4c8ae677e7b5dd024e434e53837b1f6dee73ceb96741643acd0d95
SHA512c82cedce0415f1e27fca351782c439161c6615c1294b37ca42d3b9745bfb6eefbc7f3b624064d6d67ab3379694287a46da29e7a797efb3f11c1ff69c69590a91