Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
44c2b5a939281c220da59659b1771c50N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
44c2b5a939281c220da59659b1771c50N.exe
Resource
win10v2004-20240802-en
General
-
Target
44c2b5a939281c220da59659b1771c50N.exe
-
Size
2.7MB
-
MD5
44c2b5a939281c220da59659b1771c50
-
SHA1
eb03184a5dadd85a4134e6a267def60d232cc64a
-
SHA256
68c55cc830ab5441921e60ee7b0498123e6c6e1bd8e76262cdee06d49813b34b
-
SHA512
7c6b93895642073449c9c9c2becc22783afb63b0d31216c74e1ce015fd15e18c73971b73babfd618fcdfe6be68400bf970e500bb46f35c56d5bd7a43062e9c32
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBJ9w4S+:+R0pI/IQlUoMPdmpSpd4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 44c2b5a939281c220da59659b1771c50N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvLQ\\devbodsys.exe" 44c2b5a939281c220da59659b1771c50N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax7S\\bodasys.exe" 44c2b5a939281c220da59659b1771c50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44c2b5a939281c220da59659b1771c50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 44c2b5a939281c220da59659b1771c50N.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe 1712 devbodsys.exe 2180 44c2b5a939281c220da59659b1771c50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1712 2180 44c2b5a939281c220da59659b1771c50N.exe 29 PID 2180 wrote to memory of 1712 2180 44c2b5a939281c220da59659b1771c50N.exe 29 PID 2180 wrote to memory of 1712 2180 44c2b5a939281c220da59659b1771c50N.exe 29 PID 2180 wrote to memory of 1712 2180 44c2b5a939281c220da59659b1771c50N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\44c2b5a939281c220da59659b1771c50N.exe"C:\Users\Admin\AppData\Local\Temp\44c2b5a939281c220da59659b1771c50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\SysDrvLQ\devbodsys.exeC:\SysDrvLQ\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5ed8ba588b4057f0e937984237e620be8
SHA14941e5a4bc69a41cbad8a2cc19dd278ab5af2bbe
SHA2560d70d5be482582e02ef50d8b6b89d7af90217a2be7a5a8de866e95f18bc477bd
SHA512f6e90a0e42fdea19d41d0e926034438d96430dce3280ca803e58f8193bdc18da12d9eadfa152facdf07ac980eb67545115fb1593fb60a01d713369185fda6550
-
Filesize
206B
MD5ccb05a5f5149a53242992e220f4219d3
SHA1b8559b54ec5b406d26b6d90cca6a00e949de7a7a
SHA2562416bc20b10b28b18dfd2a714f10afd5da3eabab9fce5cfad488f17c5f866548
SHA5129e5960d82bad026f5fab8286ee99a72a88e37c24604f923b04f21b2bde21ce671a93328b21ad08ddaa89eb982d48905bd5b4046890d65b002ed4ff8341cc6a1d
-
Filesize
2.7MB
MD5ab2ed13a93c51d06b9f642843da4eeb9
SHA179b8f966efebd1228a1ebcb1d02c9c51ed86f40e
SHA256974e5fe98cb572a78a46af92d2035297cbade3d90dec06a402491ad02b0a6e83
SHA512f7ef22ac59306ec8ce7ec7e69d5554caf9ec5b5bf0851daefe161973235bf38b0b54e75a96892350eb3f36c5a7083258f923269081efea2b7a752dc96896283d