Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 22:48
Static task
static1
Behavioral task
behavioral1
Sample
178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe
Resource
win10v2004-20240802-en
General
-
Target
178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe
-
Size
2.6MB
-
MD5
403ff8a4d3292e19a5ebd03f062d2602
-
SHA1
4f6f825636492e66ecd25b779c0a5d5dc1e2f089
-
SHA256
178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240
-
SHA512
84eb63f10c7d73f677a077fd9169ab56cc173c15bdc2351e786e1528681d23429039fffe69ceb4ebfb5a663b387d4f01e5e67394f229f3213de74d43ce87d613
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bS:sxX7QnxrloE5dpUp+b
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 locxbod.exe 1808 xdobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesUP\\xdobloc.exe" 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxVY\\dobaec.exe" 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe 2064 locxbod.exe 1808 xdobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2064 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 28 PID 2988 wrote to memory of 2064 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 28 PID 2988 wrote to memory of 2064 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 28 PID 2988 wrote to memory of 2064 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 28 PID 2988 wrote to memory of 1808 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 29 PID 2988 wrote to memory of 1808 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 29 PID 2988 wrote to memory of 1808 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 29 PID 2988 wrote to memory of 1808 2988 178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe"C:\Users\Admin\AppData\Local\Temp\178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\FilesUP\xdobloc.exeC:\FilesUP\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ec2d993af9246cbbe370e8b160d54e54
SHA1e603a74b6c1c18edfb09969a9e1727eb8d9d89c2
SHA2560fde5acaba0b78d227411a8a1cceb2f090a25c03585f399a660dfc8a617bc5f9
SHA512d2083eb209f424d9fe5e936b14a3e026c3d32bc712c76a46e2bdf719f069780627d58ac24755dad36a32abe4789344fd385c585b70d3213a31aacd279f83d306
-
Filesize
2.6MB
MD5fc287db67522923b68cfe753fb4ac29a
SHA125f41b756af5af5396468c1a44dca077de95e574
SHA25656bc8c483ded7be80ae6de2a541770ac8453d6dce0f6c8deb70aff46c9816c05
SHA5128bb056ae4894d3a1ddfbbd72f4800b17030d159a5abfe97965bd08399b5b86d1aabcacfa3c0d5a42de8deac6e1bdc8866784e314b9c6fc5c47b102f57c41d864
-
Filesize
2.6MB
MD5512c1d28871b7aeaff7d576cea69ebe9
SHA1ab3486e50cba592c20cb7fb771bc65b6bd1f5fba
SHA2562abee0ed4dfd263c1f7f9f4dd7987bd8325a81d7c77c2657b0a329857fcf47a7
SHA512053894cf655dd5dc3c6b5e9eef67b411be4f41a1ab7e9163ad49de4a8d2fea1f4a55c14bbad7bccb00853ee77c2186a70cabc098135cd90a927def68a26f56dd
-
Filesize
168B
MD54cfac97d3f452cf740eafb6d8c6d119f
SHA120c72bb238c9774173ec8bee1b2223f92c38839c
SHA256b87584bcc485936a2270defa027566a9ec780491c0104f7388d3a3be92188c71
SHA512f7f09ea76744f3f7163d9bfc913a9e94f8bce51afce4ebcc1bd6a06acb18004565c9b6bfffe1f1a7e6fd8bbfcba4b9c1293fa7dee04ac0f7ada0c0743b239662
-
Filesize
200B
MD50493311760bfa791e96275b30d526bd6
SHA194559d6607b00cc447ffa3b51368a84d77f3f25a
SHA2560546ed1e0bfcc2bfc3150b7744c7673c760719e270aa8c20a9b2fe4bc42175ff
SHA5121edcde9093fdda35641919f71a6f5aa41b815a2bd2a452c03551623ffa31f9bc470dd12065213a5623757188b6ec56829bc64f487b9f022b24b010a96fdf04b0
-
Filesize
2.6MB
MD5e3ef54bf640555eecb8c713471b702ed
SHA1a2b981fc8575012978363171e188c00f64d057a8
SHA2563d5aea295e5c9a6f6cfc1374b75f44100b207999193ad35ecc0c17a286696c5b
SHA5121793cef34eb2146fb46eca2c84acf0f4fccdd2fa4ccb5eb2c642f678daaea83031bbeb71503c1e72b67cfb924516ef1b784f4c4bba0306694792a4461530b44a