Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 09:20

General

  • Target

    e8f9e4a80c087fb2c22b5c33c23f86d0N.exe

  • Size

    2.7MB

  • MD5

    e8f9e4a80c087fb2c22b5c33c23f86d0

  • SHA1

    5f08da0aabf922565726c4cfa471d194e836650e

  • SHA256

    c769e6c61514210b6ec2ed4d90f263bfb5cbdfc47ed00fe640916eca426910ac

  • SHA512

    cf3a0bd03aca753eab2f38e597effe1c915aa944a2481f9f4f41714f3356907009e7d34332e7bc804ead32fdc26d4d1bf6cfe103ee7310a2b473174837548713

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBh9w4S+:+R0pI/IQlUoMPdmpSpZ4X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8f9e4a80c087fb2c22b5c33c23f86d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e8f9e4a80c087fb2c22b5c33c23f86d0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\SysDrvGE\xbodsys.exe
      C:\SysDrvGE\xbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Galax6F\bodxloc.exe

    Filesize

    65KB

    MD5

    1220f69c87ddf98005d561d65c1f802e

    SHA1

    dba80a6a4fe02d882abc23643ad1286b6e212dc8

    SHA256

    e6d8465bf5b4cfa7a1f39a6cd66f769384ad50f1319312c62972969e1b3f2722

    SHA512

    19f0bd8367e3fbf7470992f166e74655b849fa063345137e662aa4965ac08ce10d5c677a081c5fb88bbd49f838f4dfdd74904adbfb16fe339a8b1723f27fe7ba

  • C:\Galax6F\bodxloc.exe

    Filesize

    2.7MB

    MD5

    33a25df0e8c23a285cd5422add63dd7b

    SHA1

    f4a0ea8669cfb7cf1a5f1eb4a4fb6fda85d6a903

    SHA256

    22665fce2c1bf208c3939fd2c801b504d49df49c744d1d28c5b45048b91e17ed

    SHA512

    d24a705c3feee4b385a6ce5818569d4821292d48c30051abbc3aa53b1ebecf454cf72cd18637d6a98ef6fdcc648c0b6a46f96c813d48ca338947e4ab96138764

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    179201a9257ab16e22a40be35ad7bedc

    SHA1

    f12eb92fc3e38166c58b724f99168915453cd6b0

    SHA256

    4f4cbbaf36e9e37b88df5c8499257f0b29cf428b4308067e794b5e7d28f38dc8

    SHA512

    775e13599dac064603c604ad4ea2c453f6d3e3661d19f50b71287d9f2e3188ab0dc1d6458330fe284ff027aa631d50b5f4f502fbfb5e4516a20a7ae1ee723037

  • \SysDrvGE\xbodsys.exe

    Filesize

    2.7MB

    MD5

    2c27fca3f1f8cb75bcda7e94fe527087

    SHA1

    512bbb0692c9c03028732f65c9a56981a6254617

    SHA256

    b756d7667a401796dcea485006e1bb07be881977c9f36553516f5bcdcc3324b8

    SHA512

    a91c0143f7a05e5dbea4d2bc0653db6ab82b65d8663d9bad2eff5bf8e03e4954f46df7504fdaea39b080c93de34835d02d0f860b349511bb05938e079b73596e