Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 01:44

General

  • Target

    797f302eb010c6c8ff85f372edb92410N.exe

  • Size

    2.6MB

  • MD5

    797f302eb010c6c8ff85f372edb92410

  • SHA1

    70fb2fc504ae5565c78e15b6a74b768ed4fbbf7b

  • SHA256

    07f6a383dfe6a31199df51038d2499dbd60c5d87c3b31d33d4ce2496dc7e9d22

  • SHA512

    27559ff7e94fe88b10576db853421defce392c9545546a3d653da2da22c2c1e6529794e768878edc8f250c4ddc32e96b0c088e1e16b7a02de125d46be7706e18

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB0B/bS:sxX7QnxrloE5dpUpfb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe
    "C:\Users\Admin\AppData\Local\Temp\797f302eb010c6c8ff85f372edb92410N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2652
    • C:\IntelprocXH\devbodec.exe
      C:\IntelprocXH\devbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocXH\devbodec.exe

    Filesize

    2.6MB

    MD5

    00e3c3e5b80fd0ddec960ab84a621911

    SHA1

    fe733789facf63c99eac564b010cfd0532d413a5

    SHA256

    aed1478d68955c5a73c3a36ed8e081e43d2d6bd1d5abcaf92e67f1e8bf3d0dd8

    SHA512

    d521f5dd1f54dde5ddfd146fdd4d3f645051582db40401e7e8c4f46b17b6ddc0cf793fef77eac42cc834bd4b8ad7f9928e55d9e82627b49ca598845d1a85fa69

  • C:\MintJV\bodasys.exe

    Filesize

    2.2MB

    MD5

    250b09b814524a215787c20bd85be453

    SHA1

    61697306b281fdd918bc0e619a60b94c54f39c81

    SHA256

    06d43c0c5ea06abd4718971d7ec22b3ea80dfc72e908d576edb6f893b1d23196

    SHA512

    64d72ffac72b1f7feed40c413321c5111aa790df17ec009066d6c1e8c2707597b4d30f6f258d794a3980343c5f3ce2556582632cbb2c4921ebaef81a517f74cf

  • C:\MintJV\bodasys.exe

    Filesize

    2.6MB

    MD5

    f91b0d4d03f2b98568e6156e16dd3e26

    SHA1

    eb00bcf5f168f168161371a9cee816c1f7b8806c

    SHA256

    d9f4e1a8cc5e08f823d4b4cb09f09be3c4cb288d24df636c5b252eb5f5796b90

    SHA512

    50606c07f1e4c3d0b461916c3acaa81f701416dfcc29ba2e8cab5a31e27fd5a0d02f3bccb59818524e82ebbb162378ffc65aee4eaf185eff0a1fe6dcf5732816

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    174B

    MD5

    efccbdd8e04d2deb90da854f968fa5f9

    SHA1

    45249c4adf6ca51b9b0a7c0ad3f369b06a51613e

    SHA256

    6c31fe0e61ba2c866cc048ed05a5435a2caefa36ebe6ab7ca53c4a62d6c9edfb

    SHA512

    608b5d79514724dad9630edc3c51c90e26f8827630ac0223aeed0b7ec94881af36102c5e203f1e6625868f3ed3933e5d25bde079859401e3fd20245399fd34cf

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    206B

    MD5

    eae55b37de9465e92732b2bb9cf67827

    SHA1

    810c0f11a3c8af5a4a9507b6857b25b9229f283e

    SHA256

    d19bd74d30f761adc3ee4fa960a0cfa13f623c5425ec9b3a213fe119168b5e9d

    SHA512

    480895f25c5602a0af5a277d132d80a97a1af49047c7ca73ae6f97feefca7b518f24ee3bfe54367968633a1011326644ff956b1913aff2dc3e9738b4946e33a2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe

    Filesize

    2.6MB

    MD5

    ca40f9a50ca425ebbefe40dd5ffd9334

    SHA1

    cc5c7555274a781215fb71b7ec59ee372b27abc3

    SHA256

    6696e9c9f766b93e29443510eabc91015345c1cd24e348120b673e45bd4ad389

    SHA512

    63bc14cad35b6513347738cf6f96276a17901a8cf26a75cc688813bf0a07265e35e6571d54f666002a9b9df38f5899df567eff9ebe924751fbf8d73c942cd496