Analysis

  • max time kernel
    149s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 21:58

General

  • Target

    5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe

  • Size

    2.6MB

  • MD5

    6ca1691262147c6d97427353247711c6

  • SHA1

    8e6cd4aaadc86113a0c563fd5546b8f3844965bb

  • SHA256

    5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479

  • SHA512

    43021fd8dda6d37510cafacd021c08c9ee7532912cf7448e4b06c6fb0da787165b1f1618944f245ec929d845ad6197db61d3c32c5d15e2b00c68b48e577f325a

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBzB/bSq:sxX7QnxrloE5dpUpQbV

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe
    "C:\Users\Admin\AppData\Local\Temp\5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2364
    • C:\FilesYO\devbodsys.exe
      C:\FilesYO\devbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesYO\devbodsys.exe

    Filesize

    2.6MB

    MD5

    1490a9a59ec8517a04a9d8f275ba8f1c

    SHA1

    3d9eef727f2bcb599afc5c89c5cd683d6d883480

    SHA256

    086471669c717724d70cda55d435856c2837271fda77a50584e0e347c9d57b3d

    SHA512

    02e20a378ef89ffd52793b9e66973cb8ae0c3c95ba12f6050eed7d8a976fac3fde7441167966c4d751e3483e2af601c85b7007822b977f1b1d685d2506286e70

  • C:\LabZDP\bodxsys.exe

    Filesize

    2.6MB

    MD5

    ee9c506faa6ed8382b987cb590b5791c

    SHA1

    92d0f1fa19ba38ff081a7ba7ef0aae18789f72e4

    SHA256

    ae7a2210396c1b2c1622c76ae5d4903d35c5e311333094f17ee55e57ad1a1c1c

    SHA512

    04a9ba1517729bcd328eff8a8bfc402aa29a63ed817dea351139264443203dbb886bffe54971c21fe5e6bb6084b19515a836673b5144c980ce21e2ad47dcd097

  • C:\LabZDP\bodxsys.exe

    Filesize

    2.6MB

    MD5

    2ae30e8e0a0dcf6262dd52975121e805

    SHA1

    6574989d24310e3779b4ccad1cafe7d5bd3471c4

    SHA256

    03ab5fa4bb62f0343e16d17ee1d1af358d5e8ef81c3f574e74faa1c2f0de9ec5

    SHA512

    be0c61a95980d44967063b6608182983d4931c8d02075b09bce9799f9a2c1890491c7269801c9a8279cbc70cc9882c1ab0efba066b7440564c16baa10ea3a230

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    847fae6d9346e6d936a08b86e9d04c4b

    SHA1

    6f339b2a3868e109081571b34b4d4e5d1fbcdd7f

    SHA256

    7f32cb31f94da6e2182672508d3529e7f5f4e5ef5f7737eb2e6f82d17137ee52

    SHA512

    c632e800325f5b6bb581737ec4b9065cebc3b14230ce3ca4157831e96e8a3afabf2753b5998f8da14d17c08d14fc82482a0022f7292d08924d7e3937e6e4bfb5

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    6d9c5c7f5b8f30d4e2898af840075ec5

    SHA1

    6627b4926d13270f4e62f2cca59eeae1257c9620

    SHA256

    7c750cdbd6abbce8cc60677a953742b5563aefe1342da5046f9cbc4c69a292ec

    SHA512

    5d7a16dd86b86b00aab8925e1a3735c2617ee74b7965ec366a5d25bd9f5dfdd76cd561c07779eee12c9863cb2500c232d05ccd6ac86bc306d08c5cd39b5239f6

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe

    Filesize

    2.6MB

    MD5

    1e967253378f13394e0e8cc44985edbd

    SHA1

    529229b206e82784025df73310ca42a78a0be881

    SHA256

    17f7dc4f2ac8d7e3a4e04e5c3681f0057d345d7133ca3d5c8a2f795da7c7be63

    SHA512

    729dc2ee11fe0f225ce109ecc64cd32b0674dfb7409cc07215ddb6e1bb06c06716053204257ffd3fb8c42b618bfc90c04287343f7d938fe1f896db83809e227e