Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 06:28

General

  • Target

    f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe

  • Size

    2.6MB

  • MD5

    da7357080a48912241f2e0f1ae7907df

  • SHA1

    a5a2562f25b886324bfa83be2d03bde60906fb65

  • SHA256

    f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f

  • SHA512

    0de4f257c532dcbc30774801eaf089d41a62ae6d9b925e858a894a33f5399b22842380250e86016474dd4aae5de0d8ab1c17e17e127413d24b28899e70c2d2c9

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bS:sxX7QnxrloE5dpUpyb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe
    "C:\Users\Admin\AppData\Local\Temp\f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3624
    • C:\FilesK7\xbodsys.exe
      C:\FilesK7\xbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesK7\xbodsys.exe

    Filesize

    2.6MB

    MD5

    e251fb8b6fe230a74987e0df3510ac57

    SHA1

    a7de376706dbf42a1bb64596bd610d20cb5ce752

    SHA256

    12b8cec0aba367e1fcb46af23718110bf2746bcf61b43bde9e286f456fa0d69f

    SHA512

    927517a39e25529ff2ffca6f6803f5355fe50f7a96ca7c7a9cfb0b3d00bbcac384666cfaec360a8df0a23c7991f14939dad0436c8f51cab2feea87ab7ebfd10f

  • C:\GalaxWC\dobaloc.exe

    Filesize

    2.6MB

    MD5

    f556244c58eebb3995f1e503411f4983

    SHA1

    8749014ee58310aafb62ed6814ea4f49daf80fe8

    SHA256

    a98e891793f131ca089c73bb10bf18c9151232853ed1e7fa19f824992b20bbdd

    SHA512

    5e932ebc14be87e49a61297981103c36a8a275ee922b226b45e34e94fccad85e4f47adad4ac423a48fcdb398388455e63f9bcce3279f443f46b754baf3c4ea1d

  • C:\GalaxWC\dobaloc.exe

    Filesize

    2.6MB

    MD5

    b897a4fb006c2a923a6b9eb39008d1c9

    SHA1

    666dee076f4c1b060c7a55654c74b9979f28d4bb

    SHA256

    63a22881b2eb04a92987067a74ebe8b4d26ee2d1cbd3189ec62c3250ffeda463

    SHA512

    84045f55660f05496023dac00e252921022f26eead37b7644fdf35de371bb93b07acfda60bc0dd9e1507bbed243c49fbefd80357270e31ff8b899cbe46d584c8

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    201B

    MD5

    898866b84405dab42e85d9c4ea594369

    SHA1

    168b87f11a9386fd97e3524f194d47576f666801

    SHA256

    7d7b678da1336a887fcf47f6ab74947b92f5d8d6d10da527deb4cbb492e815b1

    SHA512

    5ab86e7c0e65bb165580168acc7695fd8122e3492ff96dca3fa46eef007607ea29efc5dfa1678cec3f90015056ec582f0cb688d97ab093cefdefacf12b2b1c98

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    169B

    MD5

    a386e497fbbc1517d15109351e5f4c3c

    SHA1

    b31952a6da76e24c81f94177703ea085fb1f7f39

    SHA256

    472211e6fe8c02541c428b3ce6243862be86b994bdb67da1fe5ab8c44ba072cf

    SHA512

    6eccaba927e8a140bfc5f50c6aa0a5f59b2fbc7e9019321dc71c2353fff15c20d009a7b294df271cb9676663e00421595db5538b6fc6ce706fe8b54e18e28945

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe

    Filesize

    2.6MB

    MD5

    d8ae1689d22ee26e5a55e1ddbbb9e335

    SHA1

    bd76e4c043ad06022a73e74ca972b2da3a2dfe0a

    SHA256

    c205ab549049b96240c5f5de703a649483e08db5030495da4855914aad02a7c1

    SHA512

    4bfb0bfdd2b7544d917230f826d266faa7256cd4cedb39753cd7adb56821597e6b72f8455fb6c43710c13b10871d930dd0e8e8c81508dfc5c92559d20117ba07