Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
e8f9e4a80c087fb2c22b5c33c23f86d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e8f9e4a80c087fb2c22b5c33c23f86d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e8f9e4a80c087fb2c22b5c33c23f86d0N.exe
-
Size
2.7MB
-
MD5
e8f9e4a80c087fb2c22b5c33c23f86d0
-
SHA1
5f08da0aabf922565726c4cfa471d194e836650e
-
SHA256
c769e6c61514210b6ec2ed4d90f263bfb5cbdfc47ed00fe640916eca426910ac
-
SHA512
cf3a0bd03aca753eab2f38e597effe1c915aa944a2481f9f4f41714f3356907009e7d34332e7bc804ead32fdc26d4d1bf6cfe103ee7310a2b473174837548713
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBh9w4S+:+R0pI/IQlUoMPdmpSpZ4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 xbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvGE\\xbodsys.exe" e8f9e4a80c087fb2c22b5c33c23f86d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax6F\\bodxloc.exe" e8f9e4a80c087fb2c22b5c33c23f86d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8f9e4a80c087fb2c22b5c33c23f86d0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 1224 xbodsys.exe 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 448 wrote to memory of 1224 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 29 PID 448 wrote to memory of 1224 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 29 PID 448 wrote to memory of 1224 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 29 PID 448 wrote to memory of 1224 448 e8f9e4a80c087fb2c22b5c33c23f86d0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f9e4a80c087fb2c22b5c33c23f86d0N.exe"C:\Users\Admin\AppData\Local\Temp\e8f9e4a80c087fb2c22b5c33c23f86d0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\SysDrvGE\xbodsys.exeC:\SysDrvGE\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD51220f69c87ddf98005d561d65c1f802e
SHA1dba80a6a4fe02d882abc23643ad1286b6e212dc8
SHA256e6d8465bf5b4cfa7a1f39a6cd66f769384ad50f1319312c62972969e1b3f2722
SHA51219f0bd8367e3fbf7470992f166e74655b849fa063345137e662aa4965ac08ce10d5c677a081c5fb88bbd49f838f4dfdd74904adbfb16fe339a8b1723f27fe7ba
-
Filesize
2.7MB
MD533a25df0e8c23a285cd5422add63dd7b
SHA1f4a0ea8669cfb7cf1a5f1eb4a4fb6fda85d6a903
SHA25622665fce2c1bf208c3939fd2c801b504d49df49c744d1d28c5b45048b91e17ed
SHA512d24a705c3feee4b385a6ce5818569d4821292d48c30051abbc3aa53b1ebecf454cf72cd18637d6a98ef6fdcc648c0b6a46f96c813d48ca338947e4ab96138764
-
Filesize
202B
MD5179201a9257ab16e22a40be35ad7bedc
SHA1f12eb92fc3e38166c58b724f99168915453cd6b0
SHA2564f4cbbaf36e9e37b88df5c8499257f0b29cf428b4308067e794b5e7d28f38dc8
SHA512775e13599dac064603c604ad4ea2c453f6d3e3661d19f50b71287d9f2e3188ab0dc1d6458330fe284ff027aa631d50b5f4f502fbfb5e4516a20a7ae1ee723037
-
Filesize
2.7MB
MD52c27fca3f1f8cb75bcda7e94fe527087
SHA1512bbb0692c9c03028732f65c9a56981a6254617
SHA256b756d7667a401796dcea485006e1bb07be881977c9f36553516f5bcdcc3324b8
SHA512a91c0143f7a05e5dbea4d2bc0653db6ab82b65d8663d9bad2eff5bf8e03e4954f46df7504fdaea39b080c93de34835d02d0f860b349511bb05938e079b73596e