Analysis

  • max time kernel
    119s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 04:23

General

  • Target

    a00e3320ba2df00e58f7732d834347e0N.exe

  • Size

    2.6MB

  • MD5

    a00e3320ba2df00e58f7732d834347e0

  • SHA1

    4c93ae3fd48643715d4e0c8d36157a2c62a67ce1

  • SHA256

    1dd66a35b21997efb3cabefaa85ff9a2f94bd87b0c73266c593d665acd3d7163

  • SHA512

    cc48acb7f544f0de679411c4e7d38935655e867e5a58ec8e108a8646bf3240e810a9f10b1a1cc1a4c5d0205cddbb363b285bfb9b56ee9ffbb110f0f306378dc6

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUpBb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a00e3320ba2df00e58f7732d834347e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a00e3320ba2df00e58f7732d834347e0N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:916
    • C:\IntelprocQA\xbodec.exe
      C:\IntelprocQA\xbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocQA\xbodec.exe

    Filesize

    100KB

    MD5

    c3a42c7312f19ccb62a6fd41cb18f964

    SHA1

    9f22df996d9296f38183237a9a87fe6e0f0a785c

    SHA256

    325b4c6af42a002f4d0e1f8d91ebf2e7de910e81e0ac5919992b4456dfc83870

    SHA512

    f463156c9840de537ce6770940914cf7c3f204934f9e850bc928f1c288fa5738f83ffe888fda33198c99bb71d840e7d2864f6a83564f5931e9e57fdcb2f378fc

  • C:\IntelprocQA\xbodec.exe

    Filesize

    2.6MB

    MD5

    a6452cdab3aaf6c97c49afa89dc2185e

    SHA1

    a39bb98fd88ab561303f49000663fb37c6c13fa0

    SHA256

    cc59dce05d7203674ba5cfab06023964d4fe26b283609c72402a702d0c84ac6d

    SHA512

    507b02f07edf74397d373550b330f48af79150ecfaefb5cc18484499d8febeefa89938b8a7fd83a739160dba642206fbadf82a01c13eedeb76c5cf32c9057138

  • C:\LabZ8G\bodaloc.exe

    Filesize

    86KB

    MD5

    f2c915b55dba9bd8fb0d63656dac07ab

    SHA1

    ecfa68c04481693defbbb0d3b987c25662dafc3f

    SHA256

    8027173fda3342db0baa27ecd5c34f6d8021285b6c764a009d13880ce84c8444

    SHA512

    c8d9929fc573c7796e3a0115d577e95e9b4412feacf1507f2d2f6375294b86f0ef405b887ba015b095015aa73f955944c5d453e06a98f1d1e2742003441a6570

  • C:\LabZ8G\bodaloc.exe

    Filesize

    2.6MB

    MD5

    6b3547de70eb0eb40afa2296b19f74cf

    SHA1

    77c0dc0d97f8934045ba5def7622f3886db7ba33

    SHA256

    ab06d90803c8b447bcda90d26f5bcfa993a33677bf78576bf950c384bfa6f66b

    SHA512

    751c39374580c2244e978dc714419bc2706e224bbd92d60aa7508b2c1a2a3540398c2ba1a8e6de646de98f4624ed562ce313103bce0255b315185caf55964203

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    298329fca80b95f03fbdc28795a51103

    SHA1

    3edbdabbfd59697791d2f1ab85a6eb62dd98e212

    SHA256

    a34dd03c802b4e3484bdc97535a5fab8cd07b3ef6176a1cd9f6fecac160f9824

    SHA512

    694e881db0220bfcdc04168c99bc9e5daac21f2602917bd8f5eadc80a74b7acad58b91e2555df7ed43340f314fcaa2769e8f640a2e3e54b7547deb5efffbe3d9

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    260095bb7d5aadbdf47310ff7016b796

    SHA1

    aac419055915aa1311615e5731d28c781643e7fe

    SHA256

    2b6aa2a9d4901755379429a4481b26a2f49988673fcb4e7b2e909ca6087af15b

    SHA512

    e33ff3043c6f239fbc02555f08e313473cd3f259e5caabc6fff96f31127b2ccb27c866d421e2d26ca922484481840111282239bdc4a55078dfbae899d65a91c1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe

    Filesize

    2.6MB

    MD5

    3ce3bb4f9386258852809733ff439dbd

    SHA1

    974979c8035928c50fbc6c488a049379e052471f

    SHA256

    64d1fdc795ae3e8810f870636315807a33c089a7f24d12361fc961bc216a1015

    SHA512

    ff3056ea82469a4c3a717c341312718be22458ab5cc5e9fec1ec227e6bc1995b465eec94d6a7b104b340a8088dfe7ddb9e9e6276c350aba9feaedc9039bab3e6