Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 22:48

General

  • Target

    178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe

  • Size

    2.6MB

  • MD5

    403ff8a4d3292e19a5ebd03f062d2602

  • SHA1

    4f6f825636492e66ecd25b779c0a5d5dc1e2f089

  • SHA256

    178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240

  • SHA512

    84eb63f10c7d73f677a077fd9169ab56cc173c15bdc2351e786e1528681d23429039fffe69ceb4ebfb5a663b387d4f01e5e67394f229f3213de74d43ce87d613

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBNB/bS:sxX7QnxrloE5dpUp+b

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe
    "C:\Users\Admin\AppData\Local\Temp\178783e3d8efecb9063a7d332234e8ab5f4e37fedf62bd1dcedc3d965af70240.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2064
    • C:\FilesUP\xdobloc.exe
      C:\FilesUP\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesUP\xdobloc.exe

    Filesize

    2.6MB

    MD5

    ec2d993af9246cbbe370e8b160d54e54

    SHA1

    e603a74b6c1c18edfb09969a9e1727eb8d9d89c2

    SHA256

    0fde5acaba0b78d227411a8a1cceb2f090a25c03585f399a660dfc8a617bc5f9

    SHA512

    d2083eb209f424d9fe5e936b14a3e026c3d32bc712c76a46e2bdf719f069780627d58ac24755dad36a32abe4789344fd385c585b70d3213a31aacd279f83d306

  • C:\GalaxVY\dobaec.exe

    Filesize

    2.6MB

    MD5

    fc287db67522923b68cfe753fb4ac29a

    SHA1

    25f41b756af5af5396468c1a44dca077de95e574

    SHA256

    56bc8c483ded7be80ae6de2a541770ac8453d6dce0f6c8deb70aff46c9816c05

    SHA512

    8bb056ae4894d3a1ddfbbd72f4800b17030d159a5abfe97965bd08399b5b86d1aabcacfa3c0d5a42de8deac6e1bdc8866784e314b9c6fc5c47b102f57c41d864

  • C:\GalaxVY\dobaec.exe

    Filesize

    2.6MB

    MD5

    512c1d28871b7aeaff7d576cea69ebe9

    SHA1

    ab3486e50cba592c20cb7fb771bc65b6bd1f5fba

    SHA256

    2abee0ed4dfd263c1f7f9f4dd7987bd8325a81d7c77c2657b0a329857fcf47a7

    SHA512

    053894cf655dd5dc3c6b5e9eef67b411be4f41a1ab7e9163ad49de4a8d2fea1f4a55c14bbad7bccb00853ee77c2186a70cabc098135cd90a927def68a26f56dd

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    168B

    MD5

    4cfac97d3f452cf740eafb6d8c6d119f

    SHA1

    20c72bb238c9774173ec8bee1b2223f92c38839c

    SHA256

    b87584bcc485936a2270defa027566a9ec780491c0104f7388d3a3be92188c71

    SHA512

    f7f09ea76744f3f7163d9bfc913a9e94f8bce51afce4ebcc1bd6a06acb18004565c9b6bfffe1f1a7e6fd8bbfcba4b9c1293fa7dee04ac0f7ada0c0743b239662

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    200B

    MD5

    0493311760bfa791e96275b30d526bd6

    SHA1

    94559d6607b00cc447ffa3b51368a84d77f3f25a

    SHA256

    0546ed1e0bfcc2bfc3150b7744c7673c760719e270aa8c20a9b2fe4bc42175ff

    SHA512

    1edcde9093fdda35641919f71a6f5aa41b815a2bd2a452c03551623ffa31f9bc470dd12065213a5623757188b6ec56829bc64f487b9f022b24b010a96fdf04b0

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

    Filesize

    2.6MB

    MD5

    e3ef54bf640555eecb8c713471b702ed

    SHA1

    a2b981fc8575012978363171e188c00f64d057a8

    SHA256

    3d5aea295e5c9a6f6cfc1374b75f44100b207999193ad35ecc0c17a286696c5b

    SHA512

    1793cef34eb2146fb46eca2c84acf0f4fccdd2fa4ccb5eb2c642f678daaea83031bbeb71503c1e72b67cfb924516ef1b784f4c4bba0306694792a4461530b44a