Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe
Resource
win10v2004-20240910-en
General
-
Target
7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe
-
Size
2.6MB
-
MD5
6d560d427675bfebd055ce73d1265e70
-
SHA1
ff9fda916b45a29709f7ae40a2c31858813d26b8
-
SHA256
7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002a
-
SHA512
9582ec5bdd568a615bb3777c95d0349b1dc1bf1052f8a6d9e27ea9451c092a4e36728d6dbbbeba6264e9a2e5e39d272d42d5aef57d01e8dd41702fe16724394b
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBLB/bS:sxX7QnxrloE5dpUpUb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe -
Executes dropped EXE 2 IoCs
pid Process 3052 sysdevbod.exe 2800 devbodloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvCZ\\devbodloc.exe" 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxE8\\optixloc.exe" 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe 3052 sysdevbod.exe 2800 devbodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3052 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 30 PID 1640 wrote to memory of 3052 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 30 PID 1640 wrote to memory of 3052 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 30 PID 1640 wrote to memory of 3052 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 30 PID 1640 wrote to memory of 2800 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 31 PID 1640 wrote to memory of 2800 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 31 PID 1640 wrote to memory of 2800 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 31 PID 1640 wrote to memory of 2800 1640 7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe"C:\Users\Admin\AppData\Local\Temp\7451c0fae03597dda3fd794ad9d5f0dbae807849fedc2bed9bf70454267b002aN.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\SysDrvCZ\devbodloc.exeC:\SysDrvCZ\devbodloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD558673dddace573685ed9934b43198e7e
SHA183d156c36e2224cf9b8b8fcaa5bd68ef001bb250
SHA256f6628a7a3ba713a4103105cc38c5e4f1c59dc0910e5f52b2f3ea20058441c450
SHA51226a37d02c71c48dbf5206cb623c9c0c224063bb3dbe6cc7a719a2e9dea267238f9eefc6594d054226b59e2ce3020cbae2797e1f5a863dda9a024f67073081fe8
-
Filesize
15KB
MD510e6df3619bbbd1a2464d5000a56fbb5
SHA19080f324c059847c04fbc434d62d8ab2e06140a9
SHA256e437e0733cdde421f32dedbcb49fb69873f23116dc2523e2a45b18e005fd1559
SHA5129cf956066c20f94e36fc21e8c536ef7625e51e279c3c9794d5029cac42d155db5a2e79ccfe4010364e50c34b0675745a5fc121a112892a31b331ab14427ac6ff
-
Filesize
2.6MB
MD56d694c9bff6c060c74d8aa4d8ca8a9e0
SHA1bc2a56745093bf532680367aa90ea3e9827ed19f
SHA25691ef612341b4d7c8ff4a39d6ca0aa9fb372704c3e8e9765dc1321cffe09abdad
SHA51271f2a3bc3c4a89f2a185334a0db7ff03939cf2afa4a7fa2d275c5b7dda3c0c530e0725d92a1152375e2e0a34b3bbdbf8b8193361d27cc7c65ff1323524c1078e
-
Filesize
175B
MD506f2c048bbbdc383bf23008f988d8d68
SHA1f79ecaf12f8424166d9dbfcff8e510f76b58b390
SHA256b6a9ceefc35dc6535f0854a7fdbe19a29ac5e78d2d8bd35d28614fa443d05f8d
SHA5129d7bf029e4c96056e6338e0a16f82a1b4055d13ad5f9114fdd1a7a2da0851a0a6878268608bec0841c96f3e828c59b2914e9ff5ce8afe6a47322e39159b038fa
-
Filesize
207B
MD5a232e5ec233c6a7b3a4b2ffae3cdeb13
SHA16ea99d478c740f60ee3be16895d8b2f483d262ba
SHA2564647ca7733f79f12e5ef2044db7eb66207e19243bd5b7a284edd3ceee70ce860
SHA512f4de359855b7698c6dd0acaf50976ef36d801e6b0e1e73facc6e574ab9da135aa77787cf1000f26250bad463eebb6a8363d4fb98d45081ea28b2f4290e7091d3
-
Filesize
2.6MB
MD583086b4a0f35c871d31fb46082a34f68
SHA12182768d406f853a29f66ab7ccb9a9c297dbeac8
SHA256d07e9d7f38446e8446fa14b79a60bab4b46d09db74f4fc633b1a99d5fb1b4b50
SHA5129504e6594e16e023e953514b357847ae44cdd25c4416c1b092ff6f2c4550be89e00a7245e846ee357286875bd231029046e348690c17de7acbd5feb8c8a75640