Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 12:42

General

  • Target

    01d493e7415a82b5a64160b87211f910N.exe

  • Size

    2.6MB

  • MD5

    01d493e7415a82b5a64160b87211f910

  • SHA1

    f78e6f1a77993fe37b4fa697c55052e1673e641c

  • SHA256

    2f449deb736202e157a39a58813c88dcd28382db43e325391b5cad190fbd132b

  • SHA512

    aabd323df5fe5afb83440d9cefa2240d901b7e15360e70d74f9c1996e5662f5054354a7a766932c931174317c47bbcde1ad65d84b5d16f599c332dd6918c4749

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBWB/bS:sxX7QnxrloE5dpUpNb

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe
    "C:\Users\Admin\AppData\Local\Temp\01d493e7415a82b5a64160b87211f910N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2060
    • C:\Adobe0J\xbodec.exe
      C:\Adobe0J\xbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Adobe0J\xbodec.exe

    Filesize

    2.6MB

    MD5

    1f764add70e0eebdc3d72a91f40b15a7

    SHA1

    aa701a2a48b9ef93a344037b8411beea504bd84d

    SHA256

    042227f2ae91aabd6db21e48fd2c9b30f669407d2f9ab09e729b88b265b0f055

    SHA512

    f319a255a7516b4616a42e738b1152fb28083b71cf4898aa01888040ff3cd384e32f58202ed1faedf653f7dc31cfb02ae92b7caba42df157cd06580440ae138a

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    199B

    MD5

    8bbf58415324f3cb5cefd8cecde25d76

    SHA1

    a2b22cd663510c5b6747814a754b7e77a93bef4b

    SHA256

    510668f4e5041eaaa12475e55b2bd3db6e7947a00e48f7867ce6f1039c1089f4

    SHA512

    59d7a9d1bf52706cfb9e37ffcbaa7aa234d419164519c96ea4b6f581953bab23f5279cb01a0e829a68348fb10e5fa7e404a8814dcc7500d4779b3b5908597341

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    167B

    MD5

    95fbe922b7a9f297d8ab55c6fcb4f0b0

    SHA1

    446cd945ff2b75c54e6c2670780670792943bd44

    SHA256

    cfd2ec48f9e4c97efbda4c5b27b3d07b9c082e8685a7e94c34935e5028b046aa

    SHA512

    18a976466d1345a9a76993ccbc3b52e801e19b62f4bd41a13285698610e22c5a492b693641857191a2dd284155697f9056ba5dfe66f7f121881e90d59d0b2cfc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe

    Filesize

    2.6MB

    MD5

    18dec1a8a87f24d8b15c9e56431ce928

    SHA1

    a39a789db92b8365ac5e2140961127532da7f21e

    SHA256

    de25f1be7ba7886c6c83f216a81ae3b76a5196c9f986bb0fff2d83a65273962a

    SHA512

    758a002280a01962a23a3b85dc1ba94b116fa3b3c727f95978700149b377caaa795cd54e6876b470420d7882983bfb48c3d2eab44387046ace67ee0778a0dfcc

  • C:\Vid43\boddevec.exe

    Filesize

    552KB

    MD5

    478154ae5974174d13b0a7ff1033a164

    SHA1

    b0544134f9a3f744f4e4043437703e155386006f

    SHA256

    6d277a2f190c46fafad8dd611f707e67e75f6cf5184a1de8e2a2fe7a5d3a1958

    SHA512

    9b32e7e58c6ac40b902ca33155990f72bafacfc18f4532884ef4ea524d60444a249c4659c8bfbf78f088dac65567ce4c32d1b2e81701be22c839310e4c752615

  • C:\Vid43\boddevec.exe

    Filesize

    2.6MB

    MD5

    317b855281f7cf6b15593f319e998150

    SHA1

    e753b28c01a98569de6b50dd45109582d9bc43e4

    SHA256

    37119126978130e5b66fd8f55e1019102d7396a6602215a915734ef4809ad0d4

    SHA512

    e8a15d9f85ff7b3e25eb8993d507fc10051ce9a8232e60ba1e3f6f3625d1346c63a30b3461f857a1eb7ad9470a7ea5673c63cec414f5ebee51ea5d2cd0dc6a2a