Analysis
-
max time kernel
119s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
a00e3320ba2df00e58f7732d834347e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a00e3320ba2df00e58f7732d834347e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a00e3320ba2df00e58f7732d834347e0N.exe
-
Size
2.6MB
-
MD5
a00e3320ba2df00e58f7732d834347e0
-
SHA1
4c93ae3fd48643715d4e0c8d36157a2c62a67ce1
-
SHA256
1dd66a35b21997efb3cabefaa85ff9a2f94bd87b0c73266c593d665acd3d7163
-
SHA512
cc48acb7f544f0de679411c4e7d38935655e867e5a58ec8e108a8646bf3240e810a9f10b1a1cc1a4c5d0205cddbb363b285bfb9b56ee9ffbb110f0f306378dc6
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBiB/bS:sxX7QnxrloE5dpUpBb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe a00e3320ba2df00e58f7732d834347e0N.exe -
Executes dropped EXE 2 IoCs
pid Process 916 sysxbod.exe 1896 xbodec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocQA\\xbodec.exe" a00e3320ba2df00e58f7732d834347e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ8G\\bodaloc.exe" a00e3320ba2df00e58f7732d834347e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a00e3320ba2df00e58f7732d834347e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4432 a00e3320ba2df00e58f7732d834347e0N.exe 4432 a00e3320ba2df00e58f7732d834347e0N.exe 4432 a00e3320ba2df00e58f7732d834347e0N.exe 4432 a00e3320ba2df00e58f7732d834347e0N.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe 916 sysxbod.exe 916 sysxbod.exe 1896 xbodec.exe 1896 xbodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4432 wrote to memory of 916 4432 a00e3320ba2df00e58f7732d834347e0N.exe 88 PID 4432 wrote to memory of 916 4432 a00e3320ba2df00e58f7732d834347e0N.exe 88 PID 4432 wrote to memory of 916 4432 a00e3320ba2df00e58f7732d834347e0N.exe 88 PID 4432 wrote to memory of 1896 4432 a00e3320ba2df00e58f7732d834347e0N.exe 89 PID 4432 wrote to memory of 1896 4432 a00e3320ba2df00e58f7732d834347e0N.exe 89 PID 4432 wrote to memory of 1896 4432 a00e3320ba2df00e58f7732d834347e0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a00e3320ba2df00e58f7732d834347e0N.exe"C:\Users\Admin\AppData\Local\Temp\a00e3320ba2df00e58f7732d834347e0N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\IntelprocQA\xbodec.exeC:\IntelprocQA\xbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5c3a42c7312f19ccb62a6fd41cb18f964
SHA19f22df996d9296f38183237a9a87fe6e0f0a785c
SHA256325b4c6af42a002f4d0e1f8d91ebf2e7de910e81e0ac5919992b4456dfc83870
SHA512f463156c9840de537ce6770940914cf7c3f204934f9e850bc928f1c288fa5738f83ffe888fda33198c99bb71d840e7d2864f6a83564f5931e9e57fdcb2f378fc
-
Filesize
2.6MB
MD5a6452cdab3aaf6c97c49afa89dc2185e
SHA1a39bb98fd88ab561303f49000663fb37c6c13fa0
SHA256cc59dce05d7203674ba5cfab06023964d4fe26b283609c72402a702d0c84ac6d
SHA512507b02f07edf74397d373550b330f48af79150ecfaefb5cc18484499d8febeefa89938b8a7fd83a739160dba642206fbadf82a01c13eedeb76c5cf32c9057138
-
Filesize
86KB
MD5f2c915b55dba9bd8fb0d63656dac07ab
SHA1ecfa68c04481693defbbb0d3b987c25662dafc3f
SHA2568027173fda3342db0baa27ecd5c34f6d8021285b6c764a009d13880ce84c8444
SHA512c8d9929fc573c7796e3a0115d577e95e9b4412feacf1507f2d2f6375294b86f0ef405b887ba015b095015aa73f955944c5d453e06a98f1d1e2742003441a6570
-
Filesize
2.6MB
MD56b3547de70eb0eb40afa2296b19f74cf
SHA177c0dc0d97f8934045ba5def7622f3886db7ba33
SHA256ab06d90803c8b447bcda90d26f5bcfa993a33677bf78576bf950c384bfa6f66b
SHA512751c39374580c2244e978dc714419bc2706e224bbd92d60aa7508b2c1a2a3540398c2ba1a8e6de646de98f4624ed562ce313103bce0255b315185caf55964203
-
Filesize
203B
MD5298329fca80b95f03fbdc28795a51103
SHA13edbdabbfd59697791d2f1ab85a6eb62dd98e212
SHA256a34dd03c802b4e3484bdc97535a5fab8cd07b3ef6176a1cd9f6fecac160f9824
SHA512694e881db0220bfcdc04168c99bc9e5daac21f2602917bd8f5eadc80a74b7acad58b91e2555df7ed43340f314fcaa2769e8f640a2e3e54b7547deb5efffbe3d9
-
Filesize
171B
MD5260095bb7d5aadbdf47310ff7016b796
SHA1aac419055915aa1311615e5731d28c781643e7fe
SHA2562b6aa2a9d4901755379429a4481b26a2f49988673fcb4e7b2e909ca6087af15b
SHA512e33ff3043c6f239fbc02555f08e313473cd3f259e5caabc6fff96f31127b2ccb27c866d421e2d26ca922484481840111282239bdc4a55078dfbae899d65a91c1
-
Filesize
2.6MB
MD53ce3bb4f9386258852809733ff439dbd
SHA1974979c8035928c50fbc6c488a049379e052471f
SHA25664d1fdc795ae3e8810f870636315807a33c089a7f24d12361fc961bc216a1015
SHA512ff3056ea82469a4c3a717c341312718be22458ab5cc5e9fec1ec227e6bc1995b465eec94d6a7b104b340a8088dfe7ddb9e9e6276c350aba9feaedc9039bab3e6