Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
797f302eb010c6c8ff85f372edb92410N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
797f302eb010c6c8ff85f372edb92410N.exe
Resource
win10v2004-20240802-en
General
-
Target
797f302eb010c6c8ff85f372edb92410N.exe
-
Size
2.6MB
-
MD5
797f302eb010c6c8ff85f372edb92410
-
SHA1
70fb2fc504ae5565c78e15b6a74b768ed4fbbf7b
-
SHA256
07f6a383dfe6a31199df51038d2499dbd60c5d87c3b31d33d4ce2496dc7e9d22
-
SHA512
27559ff7e94fe88b10576db853421defce392c9545546a3d653da2da22c2c1e6529794e768878edc8f250c4ddc32e96b0c088e1e16b7a02de125d46be7706e18
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bS:sxX7QnxrloE5dpUpfb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 797f302eb010c6c8ff85f372edb92410N.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 locxopti.exe 2512 devbodec.exe -
Loads dropped DLL 2 IoCs
pid Process 2272 797f302eb010c6c8ff85f372edb92410N.exe 2272 797f302eb010c6c8ff85f372edb92410N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocXH\\devbodec.exe" 797f302eb010c6c8ff85f372edb92410N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintJV\\bodasys.exe" 797f302eb010c6c8ff85f372edb92410N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxopti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 797f302eb010c6c8ff85f372edb92410N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 797f302eb010c6c8ff85f372edb92410N.exe 2272 797f302eb010c6c8ff85f372edb92410N.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe 2652 locxopti.exe 2512 devbodec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2652 2272 797f302eb010c6c8ff85f372edb92410N.exe 30 PID 2272 wrote to memory of 2652 2272 797f302eb010c6c8ff85f372edb92410N.exe 30 PID 2272 wrote to memory of 2652 2272 797f302eb010c6c8ff85f372edb92410N.exe 30 PID 2272 wrote to memory of 2652 2272 797f302eb010c6c8ff85f372edb92410N.exe 30 PID 2272 wrote to memory of 2512 2272 797f302eb010c6c8ff85f372edb92410N.exe 31 PID 2272 wrote to memory of 2512 2272 797f302eb010c6c8ff85f372edb92410N.exe 31 PID 2272 wrote to memory of 2512 2272 797f302eb010c6c8ff85f372edb92410N.exe 31 PID 2272 wrote to memory of 2512 2272 797f302eb010c6c8ff85f372edb92410N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe"C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\IntelprocXH\devbodec.exeC:\IntelprocXH\devbodec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD500e3c3e5b80fd0ddec960ab84a621911
SHA1fe733789facf63c99eac564b010cfd0532d413a5
SHA256aed1478d68955c5a73c3a36ed8e081e43d2d6bd1d5abcaf92e67f1e8bf3d0dd8
SHA512d521f5dd1f54dde5ddfd146fdd4d3f645051582db40401e7e8c4f46b17b6ddc0cf793fef77eac42cc834bd4b8ad7f9928e55d9e82627b49ca598845d1a85fa69
-
Filesize
2.2MB
MD5250b09b814524a215787c20bd85be453
SHA161697306b281fdd918bc0e619a60b94c54f39c81
SHA25606d43c0c5ea06abd4718971d7ec22b3ea80dfc72e908d576edb6f893b1d23196
SHA51264d72ffac72b1f7feed40c413321c5111aa790df17ec009066d6c1e8c2707597b4d30f6f258d794a3980343c5f3ce2556582632cbb2c4921ebaef81a517f74cf
-
Filesize
2.6MB
MD5f91b0d4d03f2b98568e6156e16dd3e26
SHA1eb00bcf5f168f168161371a9cee816c1f7b8806c
SHA256d9f4e1a8cc5e08f823d4b4cb09f09be3c4cb288d24df636c5b252eb5f5796b90
SHA51250606c07f1e4c3d0b461916c3acaa81f701416dfcc29ba2e8cab5a31e27fd5a0d02f3bccb59818524e82ebbb162378ffc65aee4eaf185eff0a1fe6dcf5732816
-
Filesize
174B
MD5efccbdd8e04d2deb90da854f968fa5f9
SHA145249c4adf6ca51b9b0a7c0ad3f369b06a51613e
SHA2566c31fe0e61ba2c866cc048ed05a5435a2caefa36ebe6ab7ca53c4a62d6c9edfb
SHA512608b5d79514724dad9630edc3c51c90e26f8827630ac0223aeed0b7ec94881af36102c5e203f1e6625868f3ed3933e5d25bde079859401e3fd20245399fd34cf
-
Filesize
206B
MD5eae55b37de9465e92732b2bb9cf67827
SHA1810c0f11a3c8af5a4a9507b6857b25b9229f283e
SHA256d19bd74d30f761adc3ee4fa960a0cfa13f623c5425ec9b3a213fe119168b5e9d
SHA512480895f25c5602a0af5a277d132d80a97a1af49047c7ca73ae6f97feefca7b518f24ee3bfe54367968633a1011326644ff956b1913aff2dc3e9738b4946e33a2
-
Filesize
2.6MB
MD5ca40f9a50ca425ebbefe40dd5ffd9334
SHA1cc5c7555274a781215fb71b7ec59ee372b27abc3
SHA2566696e9c9f766b93e29443510eabc91015345c1cd24e348120b673e45bd4ad389
SHA51263bc14cad35b6513347738cf6f96276a17901a8cf26a75cc688813bf0a07265e35e6571d54f666002a9b9df38f5899df567eff9ebe924751fbf8d73c942cd496