Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
853aa45dfc957703c23d4cb7056c9040N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
853aa45dfc957703c23d4cb7056c9040N.exe
Resource
win10v2004-20240802-en
General
-
Target
853aa45dfc957703c23d4cb7056c9040N.exe
-
Size
2.6MB
-
MD5
853aa45dfc957703c23d4cb7056c9040
-
SHA1
2b397b31a5f7258cec43db9ec654204459b578d6
-
SHA256
26d0f8bbea034e94934b5e138d5bfeb8c8e3a60967571a212ca4743dc4255386
-
SHA512
3417ffaade5ffb045ec859d19354dd4e718e27dd6ce1f22138f25b0590d49f6a100d94d1a8f12737a8d54b647499745698c196a691a536d3fbc78d8ac7b999d9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB+B/bS:sxX7QnxrloE5dpUpBb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe 853aa45dfc957703c23d4cb7056c9040N.exe -
Executes dropped EXE 2 IoCs
pid Process 2400 locdevbod.exe 2752 devdobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 853aa45dfc957703c23d4cb7056c9040N.exe 1872 853aa45dfc957703c23d4cb7056c9040N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvQH\\devdobloc.exe" 853aa45dfc957703c23d4cb7056c9040N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZGO\\optiasys.exe" 853aa45dfc957703c23d4cb7056c9040N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 853aa45dfc957703c23d4cb7056c9040N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 853aa45dfc957703c23d4cb7056c9040N.exe 1872 853aa45dfc957703c23d4cb7056c9040N.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe 2400 locdevbod.exe 2752 devdobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2400 1872 853aa45dfc957703c23d4cb7056c9040N.exe 30 PID 1872 wrote to memory of 2400 1872 853aa45dfc957703c23d4cb7056c9040N.exe 30 PID 1872 wrote to memory of 2400 1872 853aa45dfc957703c23d4cb7056c9040N.exe 30 PID 1872 wrote to memory of 2400 1872 853aa45dfc957703c23d4cb7056c9040N.exe 30 PID 1872 wrote to memory of 2752 1872 853aa45dfc957703c23d4cb7056c9040N.exe 31 PID 1872 wrote to memory of 2752 1872 853aa45dfc957703c23d4cb7056c9040N.exe 31 PID 1872 wrote to memory of 2752 1872 853aa45dfc957703c23d4cb7056c9040N.exe 31 PID 1872 wrote to memory of 2752 1872 853aa45dfc957703c23d4cb7056c9040N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\853aa45dfc957703c23d4cb7056c9040N.exe"C:\Users\Admin\AppData\Local\Temp\853aa45dfc957703c23d4cb7056c9040N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\SysDrvQH\devdobloc.exeC:\SysDrvQH\devdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51dbec3ab6e5d419ac93e9792a57779ad
SHA1e55ed001f6104fa44f3d1b95b941112da997f781
SHA2568101ab2211c40c9b6640ddc44b57290789a2ed80d82dc18669b763d64618299b
SHA512e8854b0290e4e9fded66f7dcb276a0b7304b9ef953f2d1ca9bd9380ee5d7756ba177023379319edee46e6f5b6c794accc624aad024974ad0bcc7faab8c696645
-
Filesize
2.6MB
MD595c3be260a13a0e2d992729d165dfc25
SHA1e650ec296e2bdf481d3bffdb325fc5d16b567b37
SHA2561a1b58402d157404447cf02c05b505a71f964f0238ce1f9b5b58589cbe91d155
SHA51226024dfe16b67ba98cf469c5d004e84f6ab179146f838ad500dab4d4c77ac4f9637084aeb7c94a07a235bcf10216530513aa4577d70f4bea57b5a385e37f1d31
-
Filesize
2.6MB
MD50d661f762e69e65df52d386dd8aa7eb6
SHA1258c71364b57e3e62c4f1463bb83cc9ac1892544
SHA25615a6b906780fbf0e4dff8b1fd7642262c78685a11265763f3bbe53f16602676f
SHA512df49fe314edf76ad414ba111037d07faa55043554bc43006a1465f8db5ae493c6d067f5740a158293a16bf953e4b7d913e8a33a193acc02bb147b7e648b70d63
-
Filesize
174B
MD5818eac5cb8a8adfff76bf734e7c24b00
SHA1d57fb47c5cab4340134b6c3c8e98043a85d231d3
SHA256b462429bad0ac500340f23d303d2dec49fdf2f1b4718e79cbee4228a53f5b755
SHA5129457882b628c98f58b4a10d37c821ca4dc732fb67440c47610759d64e936d8e4f93cb0676aa5f3ca5ab97e18088a728f6ad83084aae7344e700cd20929c43cdc
-
Filesize
206B
MD50ce4123fe98960c080388610cd927d5c
SHA1bfd400cc1f7f1552b14bcabb8cd1a0d02d330d32
SHA256a7bf1aa879a071a8470c1ed4f8b0178fb3ea2ecfdac5d81fb93c91b8b3751e4d
SHA5125d2398f684070963e0d84f2f79542b3ea072843ab9d22ddf38e4ce00ce7015aeeaace9c80644d2a4966190fc3e2510d0ba09593317045a111fb269a1dad7d1f2
-
Filesize
2.6MB
MD54e93b3ae16ca482477c4d9b520207e73
SHA17782649f787638dae79a2d7fe35856f9273e4f56
SHA256c3a59e9abecc62bf3ef461fd9e2025f0ff96dcb2e50cb7ae9a0baba3156649c6
SHA5121247ae19f6e74aaa9011c2d96c5359c9c63d3a4d351fa3541382dfb913578fe2033cc859b4db5378596e43146d9e9ee93fa69820248fa5d9074dc16291c2d874