Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 01:44

General

  • Target

    797f302eb010c6c8ff85f372edb92410N.exe

  • Size

    2.6MB

  • MD5

    797f302eb010c6c8ff85f372edb92410

  • SHA1

    70fb2fc504ae5565c78e15b6a74b768ed4fbbf7b

  • SHA256

    07f6a383dfe6a31199df51038d2499dbd60c5d87c3b31d33d4ce2496dc7e9d22

  • SHA512

    27559ff7e94fe88b10576db853421defce392c9545546a3d653da2da22c2c1e6529794e768878edc8f250c4ddc32e96b0c088e1e16b7a02de125d46be7706e18

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bS:sxX7QnxrloE5dpUpfb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe
    "C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2652
    • C:\IntelprocXH\devbodec.exe
      C:\IntelprocXH\devbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2512

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\IntelprocXH\devbodec.exe

          Filesize

          2.6MB

          MD5

          00e3c3e5b80fd0ddec960ab84a621911

          SHA1

          fe733789facf63c99eac564b010cfd0532d413a5

          SHA256

          aed1478d68955c5a73c3a36ed8e081e43d2d6bd1d5abcaf92e67f1e8bf3d0dd8

          SHA512

          d521f5dd1f54dde5ddfd146fdd4d3f645051582db40401e7e8c4f46b17b6ddc0cf793fef77eac42cc834bd4b8ad7f9928e55d9e82627b49ca598845d1a85fa69

        • C:\MintJV\bodasys.exe

          Filesize

          2.2MB

          MD5

          250b09b814524a215787c20bd85be453

          SHA1

          61697306b281fdd918bc0e619a60b94c54f39c81

          SHA256

          06d43c0c5ea06abd4718971d7ec22b3ea80dfc72e908d576edb6f893b1d23196

          SHA512

          64d72ffac72b1f7feed40c413321c5111aa790df17ec009066d6c1e8c2707597b4d30f6f258d794a3980343c5f3ce2556582632cbb2c4921ebaef81a517f74cf

        • C:\MintJV\bodasys.exe

          Filesize

          2.6MB

          MD5

          f91b0d4d03f2b98568e6156e16dd3e26

          SHA1

          eb00bcf5f168f168161371a9cee816c1f7b8806c

          SHA256

          d9f4e1a8cc5e08f823d4b4cb09f09be3c4cb288d24df636c5b252eb5f5796b90

          SHA512

          50606c07f1e4c3d0b461916c3acaa81f701416dfcc29ba2e8cab5a31e27fd5a0d02f3bccb59818524e82ebbb162378ffc65aee4eaf185eff0a1fe6dcf5732816

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          174B

          MD5

          efccbdd8e04d2deb90da854f968fa5f9

          SHA1

          45249c4adf6ca51b9b0a7c0ad3f369b06a51613e

          SHA256

          6c31fe0e61ba2c866cc048ed05a5435a2caefa36ebe6ab7ca53c4a62d6c9edfb

          SHA512

          608b5d79514724dad9630edc3c51c90e26f8827630ac0223aeed0b7ec94881af36102c5e203f1e6625868f3ed3933e5d25bde079859401e3fd20245399fd34cf

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          206B

          MD5

          eae55b37de9465e92732b2bb9cf67827

          SHA1

          810c0f11a3c8af5a4a9507b6857b25b9229f283e

          SHA256

          d19bd74d30f761adc3ee4fa960a0cfa13f623c5425ec9b3a213fe119168b5e9d

          SHA512

          480895f25c5602a0af5a277d132d80a97a1af49047c7ca73ae6f97feefca7b518f24ee3bfe54367968633a1011326644ff956b1913aff2dc3e9738b4946e33a2

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

          Filesize

          2.6MB

          MD5

          ca40f9a50ca425ebbefe40dd5ffd9334

          SHA1

          cc5c7555274a781215fb71b7ec59ee372b27abc3

          SHA256

          6696e9c9f766b93e29443510eabc91015345c1cd24e348120b673e45bd4ad389

          SHA512

          63bc14cad35b6513347738cf6f96276a17901a8cf26a75cc688813bf0a07265e35e6571d54f666002a9b9df38f5899df567eff9ebe924751fbf8d73c942cd496