Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 09:41

General

  • Target

    0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe

  • Size

    2.7MB

  • MD5

    2a701f575180fefdbfdb1046b48373d0

  • SHA1

    c90800cffec7c800722a3ce6148383afee7c7df4

  • SHA256

    0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abf

  • SHA512

    469242bfa7aff2eec651ee98a20d485cb85f1865e468e7fe13e49b6c51132784a445ab8286f10cee1596d2af1a601920b949dcce3c1010c159b0c1621840d50a

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB99w4Sx:+R0pI/IQlUoMPdmpSp94

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe
    "C:\Users\Admin\AppData\Local\Temp\0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\SysDrvUF\xdobloc.exe
      C:\SysDrvUF\xdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZX7\dobdevec.exe

    Filesize

    2.7MB

    MD5

    24cc00e0cbf266a21ce13fa5ba27a6ef

    SHA1

    19f223c1b41c4f061338270f4d3630458537fa03

    SHA256

    a134461479c2be531a855739fd8a025bfcacd0c9d682550a4b8be0fb7ce8f03f

    SHA512

    a5249978eb44e9cba91b58066e0d240ff999ccb2220e88cf1dcba98cd491a1b2de8862f55af5dc01cdd6241170ce474839da92d37ce7b227f5b762d0b887f398

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    b146852ab797db25c5fbee038820da45

    SHA1

    17df95d84d5c186181819f8954a4eab9a1de7960

    SHA256

    53818d752ef95d7d17232fc1ef6a473c1ea0d26ea27665c7b0ab44c226cfb000

    SHA512

    6b21d033cc1672f81fae279a3939713e63ea8e7151e73e634919ce022f7b6d67e4466b6a6c4ac2cfa982e9637579a59ba19fb40c3b94767817a4d4fb3c8c6cf3

  • \SysDrvUF\xdobloc.exe

    Filesize

    2.7MB

    MD5

    312458bf13b9db1adac8d48b90908f3c

    SHA1

    2cbdced7bbece0786a3aeb5874e6f6cd20cbd180

    SHA256

    5aa2832a3dd193b5abf73ee6f5ce0e409eb6f7d2df71459e6c781aaaf99efe38

    SHA512

    00c544736614e58de49f26bd5b0967653d943bd86e98096247186034a3fd54bcb3d23ffb28aa2a7836ccc1131037b0b5d1515ef3a24910c740a7d3b4e4471ed3