Analysis
-
max time kernel
149s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe
Resource
win10v2004-20240802-en
General
-
Target
5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe
-
Size
2.6MB
-
MD5
6ca1691262147c6d97427353247711c6
-
SHA1
8e6cd4aaadc86113a0c563fd5546b8f3844965bb
-
SHA256
5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479
-
SHA512
43021fd8dda6d37510cafacd021c08c9ee7532912cf7448e4b06c6fb0da787165b1f1618944f245ec929d845ad6197db61d3c32c5d15e2b00c68b48e577f325a
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBzB/bSq:sxX7QnxrloE5dpUpQbV
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe -
Executes dropped EXE 2 IoCs
pid Process 2364 sysabod.exe 2248 devbodsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesYO\\devbodsys.exe" 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZDP\\bodxsys.exe" 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe 2364 sysabod.exe 2248 devbodsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2364 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 29 PID 2068 wrote to memory of 2364 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 29 PID 2068 wrote to memory of 2364 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 29 PID 2068 wrote to memory of 2364 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 29 PID 2068 wrote to memory of 2248 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 30 PID 2068 wrote to memory of 2248 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 30 PID 2068 wrote to memory of 2248 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 30 PID 2068 wrote to memory of 2248 2068 5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe"C:\Users\Admin\AppData\Local\Temp\5b14f3a64c8e323a146a107f2c54254075cd493e9517acd95a32756ac964a479.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\FilesYO\devbodsys.exeC:\FilesYO\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51490a9a59ec8517a04a9d8f275ba8f1c
SHA13d9eef727f2bcb599afc5c89c5cd683d6d883480
SHA256086471669c717724d70cda55d435856c2837271fda77a50584e0e347c9d57b3d
SHA51202e20a378ef89ffd52793b9e66973cb8ae0c3c95ba12f6050eed7d8a976fac3fde7441167966c4d751e3483e2af601c85b7007822b977f1b1d685d2506286e70
-
Filesize
2.6MB
MD5ee9c506faa6ed8382b987cb590b5791c
SHA192d0f1fa19ba38ff081a7ba7ef0aae18789f72e4
SHA256ae7a2210396c1b2c1622c76ae5d4903d35c5e311333094f17ee55e57ad1a1c1c
SHA51204a9ba1517729bcd328eff8a8bfc402aa29a63ed817dea351139264443203dbb886bffe54971c21fe5e6bb6084b19515a836673b5144c980ce21e2ad47dcd097
-
Filesize
2.6MB
MD52ae30e8e0a0dcf6262dd52975121e805
SHA16574989d24310e3779b4ccad1cafe7d5bd3471c4
SHA25603ab5fa4bb62f0343e16d17ee1d1af358d5e8ef81c3f574e74faa1c2f0de9ec5
SHA512be0c61a95980d44967063b6608182983d4931c8d02075b09bce9799f9a2c1890491c7269801c9a8279cbc70cc9882c1ab0efba066b7440564c16baa10ea3a230
-
Filesize
170B
MD5847fae6d9346e6d936a08b86e9d04c4b
SHA16f339b2a3868e109081571b34b4d4e5d1fbcdd7f
SHA2567f32cb31f94da6e2182672508d3529e7f5f4e5ef5f7737eb2e6f82d17137ee52
SHA512c632e800325f5b6bb581737ec4b9065cebc3b14230ce3ca4157831e96e8a3afabf2753b5998f8da14d17c08d14fc82482a0022f7292d08924d7e3937e6e4bfb5
-
Filesize
202B
MD56d9c5c7f5b8f30d4e2898af840075ec5
SHA16627b4926d13270f4e62f2cca59eeae1257c9620
SHA2567c750cdbd6abbce8cc60677a953742b5563aefe1342da5046f9cbc4c69a292ec
SHA5125d7a16dd86b86b00aab8925e1a3735c2617ee74b7965ec366a5d25bd9f5dfdd76cd561c07779eee12c9863cb2500c232d05ccd6ac86bc306d08c5cd39b5239f6
-
Filesize
2.6MB
MD51e967253378f13394e0e8cc44985edbd
SHA1529229b206e82784025df73310ca42a78a0be881
SHA25617f7dc4f2ac8d7e3a4e04e5c3681f0057d345d7133ca3d5c8a2f795da7c7be63
SHA512729dc2ee11fe0f225ce109ecc64cd32b0674dfb7409cc07215ddb6e1bb06c06716053204257ffd3fb8c42b618bfc90c04287343f7d938fe1f896db83809e227e