Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe
Resource
win10v2004-20240802-en
General
-
Target
0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe
-
Size
2.7MB
-
MD5
2a701f575180fefdbfdb1046b48373d0
-
SHA1
c90800cffec7c800722a3ce6148383afee7c7df4
-
SHA256
0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abf
-
SHA512
469242bfa7aff2eec651ee98a20d485cb85f1865e468e7fe13e49b6c51132784a445ab8286f10cee1596d2af1a601920b949dcce3c1010c159b0c1621840d50a
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB99w4Sx:+R0pI/IQlUoMPdmpSp94
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 xdobloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvUF\\xdobloc.exe" 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZX7\\dobdevec.exe" 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin';;,?,':,8492'4.=:>:1?'"49\:B>'?,=?�09@'=:2=,8>'?,=?@;'sysxdob.exe 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe File created C:\Users\Admin';;,?,':,8492'4.=:>:1?'"49\:B>'?,=?�09@'=:2=,8>'?,=?@;'sysxdob.exe xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 2812 xdobloc.exe 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2812 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 30 PID 2484 wrote to memory of 2812 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 30 PID 2484 wrote to memory of 2812 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 30 PID 2484 wrote to memory of 2812 2484 0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe"C:\Users\Admin\AppData\Local\Temp\0e033fc393f1f726812c51f20c1a33504fa7a01aa5b095e1fc3b362eca925abfN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\SysDrvUF\xdobloc.exeC:\SysDrvUF\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD524cc00e0cbf266a21ce13fa5ba27a6ef
SHA119f223c1b41c4f061338270f4d3630458537fa03
SHA256a134461479c2be531a855739fd8a025bfcacd0c9d682550a4b8be0fb7ce8f03f
SHA512a5249978eb44e9cba91b58066e0d240ff999ccb2220e88cf1dcba98cd491a1b2de8862f55af5dc01cdd6241170ce474839da92d37ce7b227f5b762d0b887f398
-
Filesize
202B
MD5b146852ab797db25c5fbee038820da45
SHA117df95d84d5c186181819f8954a4eab9a1de7960
SHA25653818d752ef95d7d17232fc1ef6a473c1ea0d26ea27665c7b0ab44c226cfb000
SHA5126b21d033cc1672f81fae279a3939713e63ea8e7151e73e634919ce022f7b6d67e4466b6a6c4ac2cfa982e9637579a59ba19fb40c3b94767817a4d4fb3c8c6cf3
-
Filesize
2.7MB
MD5312458bf13b9db1adac8d48b90908f3c
SHA12cbdced7bbece0786a3aeb5874e6f6cd20cbd180
SHA2565aa2832a3dd193b5abf73ee6f5ce0e409eb6f7d2df71459e6c781aaaf99efe38
SHA51200c544736614e58de49f26bd5b0967653d943bd86e98096247186034a3fd54bcb3d23ffb28aa2a7836ccc1131037b0b5d1515ef3a24910c740a7d3b4e4471ed3