Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 21:41

General

  • Target

    5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe

  • Size

    2.6MB

  • MD5

    41d9fd84231478a2d52c3c01badc7aa2

  • SHA1

    b0da3b7a523f402776676792b7175cc559b62619

  • SHA256

    5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef

  • SHA512

    5d18d03ce2bfec3114785082d310939642ed250c91b56b6e88ec4f8d505f9b9b5e1110cf4189b058d965c20fb996bf2ad5c27e69028c929bf19d29d08778ab47

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBKB/bS:sxX7QnxrloE5dpUpJb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe
    "C:\Users\Admin\AppData\Local\Temp\5054a3f0b6b21b87e16475e39609b32686171d57ae5848ceebf30b4b482111ef.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:116
    • C:\UserDot8N\devdobloc.exe
      C:\UserDot8N\devdobloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\UserDot8N\devdobloc.exe

          Filesize

          2.6MB

          MD5

          0c49d15c51bd287ba53fde329564e5c8

          SHA1

          f30d55067e79d9c3f8dc70323d09bed22bcab560

          SHA256

          8eebd46beb14e81c31083baeb8b058a532dd037d6c4865c9aecba7640c15dbec

          SHA512

          c941b8fda829c1f086737c0f0f0e13561f7851d49b0aa94261e2be3c6bea6803d693f4272a74b81acda5ef991af9e054d0afdc4637b7188e75f1ca4e5a38010a

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          203B

          MD5

          817ec1ff02d23cea94da2a048721c42a

          SHA1

          848e3f1bb48d70dd2861588321952d59715aee86

          SHA256

          02a3fb4fa1a451ebb24ac1ff37c03f2ae21ca3f5718491c35b291adb99a23672

          SHA512

          16dcd00b1fac6bacba39b238ed643e5385012ad1a3695213f9c7360935e338ab8cecf5c15132964f38f81e21aa849674fd9292549fe3d5de3878aa9e32b669bb

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          171B

          MD5

          a615abd6eb55a6c671f1f53e0d4da692

          SHA1

          c823193f1847417919d8daba204177a6dc0af4ab

          SHA256

          38b74fd197b8e893eb7e9acc96eadc7c3760dc2861f961f465ed08523ec3edae

          SHA512

          3ab8c7f7d48ccb72b337bdea08b32678322d23244d9b1bf3cadd654bc378140aaf7417400cdd74f3fe7604262cc274fa23b9eccc94597848c3f987da80f63fd1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

          Filesize

          2.6MB

          MD5

          c1d10f124fa3bbd7a304bed6d13e660b

          SHA1

          94b7b71cc74c061b6efbf8de1956cd69a73c9298

          SHA256

          f71cee8e57340e7c8ac6b75a21a1d0f178496195719fe6d1f2d830bd60a73509

          SHA512

          a7d2b7a90456cc6d304ab257cbff76b9c9582204a6edd947d808bf7224317e4b0ffbef7d2b43b00db692005336b3700ffc315684611ce56df70413a6a7bd43da

        • C:\VidB8\bodasys.exe

          Filesize

          2.1MB

          MD5

          2f6290fb4d45db30b9861722ac18af21

          SHA1

          a74a7567729dba9d8d962f99fffd3306505c400e

          SHA256

          8bc06ee6721d0198f711172287f6b2a069d4f4629021910a7801d6ab87ca39c9

          SHA512

          2012b06698355c9b7668d3e2f9369efb77610d54a1c0b1478d3beacf3d31d137afc9cf18e875b144d838d6238d5de41efb3b8816e5e88e02d3032bd33dfefb86

        • C:\VidB8\bodasys.exe

          Filesize

          1.1MB

          MD5

          abbd8b880beeac0786923d81d32e4f91

          SHA1

          f9ba5179730358759c3e3d5e996fb18da1fb37d7

          SHA256

          89d247173525268457cd181f8d21c01196c1ffa4cba0276417671a404808944d

          SHA512

          3f7c8b3b2e3a6cc83816840e00e0a80012a634ccb4168061c6f3f749f381cfcf839cbd8dbe0e5ce18e6bd16d55e8ae8f0ae7b38a1a6e8fd8ed348b63e26e99a7