Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe
Resource
win10v2004-20240802-en
General
-
Target
f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe
-
Size
2.6MB
-
MD5
da7357080a48912241f2e0f1ae7907df
-
SHA1
a5a2562f25b886324bfa83be2d03bde60906fb65
-
SHA256
f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f
-
SHA512
0de4f257c532dcbc30774801eaf089d41a62ae6d9b925e858a894a33f5399b22842380250e86016474dd4aae5de0d8ab1c17e17e127413d24b28899e70c2d2c9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB1B/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe -
Executes dropped EXE 2 IoCs
pid Process 3624 locadob.exe 4292 xbodsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesK7\\xbodsys.exe" f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxWC\\dobaloc.exe" f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locadob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe 3624 locadob.exe 3624 locadob.exe 4292 xbodsys.exe 4292 xbodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3624 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 89 PID 2232 wrote to memory of 3624 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 89 PID 2232 wrote to memory of 3624 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 89 PID 2232 wrote to memory of 4292 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 92 PID 2232 wrote to memory of 4292 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 92 PID 2232 wrote to memory of 4292 2232 f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe"C:\Users\Admin\AppData\Local\Temp\f86a92ea33162946b7b5ef25c95e1534a84b9ed9a64b94507dd11aab9dcc4f9f.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\FilesK7\xbodsys.exeC:\FilesK7\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5e251fb8b6fe230a74987e0df3510ac57
SHA1a7de376706dbf42a1bb64596bd610d20cb5ce752
SHA25612b8cec0aba367e1fcb46af23718110bf2746bcf61b43bde9e286f456fa0d69f
SHA512927517a39e25529ff2ffca6f6803f5355fe50f7a96ca7c7a9cfb0b3d00bbcac384666cfaec360a8df0a23c7991f14939dad0436c8f51cab2feea87ab7ebfd10f
-
Filesize
2.6MB
MD5f556244c58eebb3995f1e503411f4983
SHA18749014ee58310aafb62ed6814ea4f49daf80fe8
SHA256a98e891793f131ca089c73bb10bf18c9151232853ed1e7fa19f824992b20bbdd
SHA5125e932ebc14be87e49a61297981103c36a8a275ee922b226b45e34e94fccad85e4f47adad4ac423a48fcdb398388455e63f9bcce3279f443f46b754baf3c4ea1d
-
Filesize
2.6MB
MD5b897a4fb006c2a923a6b9eb39008d1c9
SHA1666dee076f4c1b060c7a55654c74b9979f28d4bb
SHA25663a22881b2eb04a92987067a74ebe8b4d26ee2d1cbd3189ec62c3250ffeda463
SHA51284045f55660f05496023dac00e252921022f26eead37b7644fdf35de371bb93b07acfda60bc0dd9e1507bbed243c49fbefd80357270e31ff8b899cbe46d584c8
-
Filesize
201B
MD5898866b84405dab42e85d9c4ea594369
SHA1168b87f11a9386fd97e3524f194d47576f666801
SHA2567d7b678da1336a887fcf47f6ab74947b92f5d8d6d10da527deb4cbb492e815b1
SHA5125ab86e7c0e65bb165580168acc7695fd8122e3492ff96dca3fa46eef007607ea29efc5dfa1678cec3f90015056ec582f0cb688d97ab093cefdefacf12b2b1c98
-
Filesize
169B
MD5a386e497fbbc1517d15109351e5f4c3c
SHA1b31952a6da76e24c81f94177703ea085fb1f7f39
SHA256472211e6fe8c02541c428b3ce6243862be86b994bdb67da1fe5ab8c44ba072cf
SHA5126eccaba927e8a140bfc5f50c6aa0a5f59b2fbc7e9019321dc71c2353fff15c20d009a7b294df271cb9676663e00421595db5538b6fc6ce706fe8b54e18e28945
-
Filesize
2.6MB
MD5d8ae1689d22ee26e5a55e1ddbbb9e335
SHA1bd76e4c043ad06022a73e74ca972b2da3a2dfe0a
SHA256c205ab549049b96240c5f5de703a649483e08db5030495da4855914aad02a7c1
SHA5124bfb0bfdd2b7544d917230f826d266faa7256cd4cedb39753cd7adb56821597e6b72f8455fb6c43710c13b10871d930dd0e8e8c81508dfc5c92559d20117ba07