Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe
Resource
win10v2004-20240802-en
General
-
Target
82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe
-
Size
2.6MB
-
MD5
815e43357dcce9be5d8ffe1a3eed622e
-
SHA1
90b57ae8af831f8561ade030d942c257617842a7
-
SHA256
82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158
-
SHA512
0fed557f4b8839799c7c02584f978a597fb0a4cdf452c66f20456077cf7394fc246c1ed7f92a1ee398d9556aa058bf09fc68bd94d941521e2da67aa18c1299fb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBwB/bS:sxX7QnxrloE5dpUp7b
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe -
Executes dropped EXE 2 IoCs
pid Process 5048 ecdevbod.exe 3116 xbodsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocG8\\xbodsys.exe" 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZOR\\boddevloc.exe" 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe 5048 ecdevbod.exe 5048 ecdevbod.exe 3116 xbodsys.exe 3116 xbodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3980 wrote to memory of 5048 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 82 PID 3980 wrote to memory of 5048 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 82 PID 3980 wrote to memory of 5048 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 82 PID 3980 wrote to memory of 3116 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 85 PID 3980 wrote to memory of 3116 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 85 PID 3980 wrote to memory of 3116 3980 82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe"C:\Users\Admin\AppData\Local\Temp\82c9dcf8d148ae7249d9b5806f3103679445d760eea1dd4786792504c82cb158.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\IntelprocG8\xbodsys.exeC:\IntelprocG8\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD55c7e4e42c9541623faf7736ef16155a6
SHA11473c7e5a293b7c75519f5f425c96bda925b02e8
SHA256d6107fdefc74e1af9ce105f597a326cec57717e9ce3d52eca3936450066447d1
SHA51298efc81d9ae26d5b3dfaa506294d3fbb79556fda86572760d61785ee9004a74b0777b63b60907e3893daa4e35380e92c2b745dc706e96e369a2dadde57bc176a
-
Filesize
2.6MB
MD5772d092a8a0acaca7f8b0b24be1649bf
SHA1ce36e141afc8abc20e826dea615fb7c701b61d08
SHA256dae3260ee763aac4613c936bbaaa8f245f832a98d1ad1974e7099fa271509a9e
SHA5124b948d509940653ff023c4812c223e328abba2d6bf47a1e07ff76722d9d08b2ae0510b4972aa7f256a39e4d619320fd00b74b33adab9f404b50a50dcce7e1fe5
-
Filesize
184KB
MD50b550e7c36489dea2fc8941aa3ab5478
SHA16623d90e7c3e79728a8a955996352104baf047ba
SHA2561d44a23c0277676cabc1a7ffe03b56ff77b0b5346f0bb58d3698fc9284b530c1
SHA512508f27b7aa3ecc6529856ef4abf41783bb92deb60775692fe60dcbef85fa374b8c3ff9856fedf3fd1aa1a86d5eea2b462281fed0d3fbf9626b54c3049c3cc11b
-
Filesize
1KB
MD5854d7024d6a3690861a5e13adeeebc56
SHA12ac1cc8c12d24dba6b5be96438f764753e2534af
SHA2567bee14ad9ce88140df4a16649b935961e01da085178d766133129df3d97623d4
SHA51283e4768567adea2aa5df900d4c232d5f8ccf5bfaeb8524a7641aa8d27412adf71a2c90d307b2a7c43f43dbc803b2ee2754ce4035888a928c3543f1c8912422a0
-
Filesize
207B
MD5fd3e2fd26da3db722d72c537657314a4
SHA179ab51257e77e17a86bee0a1d3c562b2d70eb14c
SHA2568ccc5a4691543e6f28342d54fbe885c51425561a0641ee0999cc238ecdc5460e
SHA51226365178657e462016805a7b307c66656c7cb416394813c22a0250594c33e2db08c9af33561844a10cc19f5a65389420dc4dea625b2d82dd56079609667ca96b
-
Filesize
175B
MD56ecc7c833004a6cc31bf083e7637cf8c
SHA1233dfbba9da0e7e61e797c9e4779e6ec03283d9e
SHA256ee3162d271562d74e8b331e9c93c34b2332004ba9af2faa8322983740081623f
SHA5121c96cedbee0cebeedf93f5324b50b40854a2c174d6a03e6cf09c83436c78de00a97916daebd3c404828b931256c440710912c780f849367562b77fabfa37b47d
-
Filesize
2.6MB
MD5fa62da16a965f895a4cb071d090e2690
SHA1ed0f821762c7ad291d1b8bb1245b57474bc968af
SHA256749b9492646eb4c46e74b3a78cbc439a68b38f31aef615af40610e9f5ef092fe
SHA512416fb40145b877e5ac08d302b57597457e955d8940cef8f2f9784b5068aeef16f8093a01e9cc40922b1dd3d8948117fe289fed7f469a935cedd5ede36a1b7ff8