Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 10:10

General

  • Target

    132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe

  • Size

    2.6MB

  • MD5

    74a102b9d9ec95b542cec341bfc44ec0

  • SHA1

    ecf05f58be9f1816b6f6437cb4a3160d3ff20200

  • SHA256

    132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793

  • SHA512

    c3acc23063e4f8a0e2cefd161e270d44162221e91bbd583c14c9ed2ec49ed4606a0dcff92d569d8e6a4fc4a2cb4118510923d325701313eec55639e45d709a24

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bS:sxX7QnxrloE5dpUpyb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe
    "C:\Users\Admin\AppData\Local\Temp\132211d94586d0081306191e57ffc8c74ebcf7509b530ed1eb981c52d9693793N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:700
    • C:\SysDrvVD\devbodec.exe
      C:\SysDrvVD\devbodec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Mint01\bodaloc.exe

    Filesize

    342KB

    MD5

    218777322c8b756a99a8c4f265a3d649

    SHA1

    46da3dc0f1dd13ad8089b7bc899e1ed9fb67f194

    SHA256

    fea7a47bb662c6ca1b21bd2f86fd87fecf455d1c4c14d9a7c6504c0cb3cbf6b4

    SHA512

    fad1d110767890ea03886d349bceaf0dd54d99ff76a7ebacee3654d7b0f1db710d967a43a8c712f16b47f9562fd85fe54e920a93d1cae02b54d32d3e15dfab4d

  • C:\Mint01\bodaloc.exe

    Filesize

    2.6MB

    MD5

    c707301dea7da323d33b0a49efc9370b

    SHA1

    8f5dcf765aca3d728db470cfc3fd00f15155849c

    SHA256

    f601e59db2e602502cb6b5b0bffb7ba239893f8cf7eefeccd3dd1c30cf2eb495

    SHA512

    141e11ae52eeda7094939f6170d756e6d9c3e819e5e117d627c295b6c8fcee9efe29c75f0924ecbe309c9933a99ebf2ad148c7a7b031a465af9cf18c60818e90

  • C:\SysDrvVD\devbodec.exe

    Filesize

    2.6MB

    MD5

    c88b8303a0cd88bb5c7515466f11eed6

    SHA1

    9a55ec20920eab25c31d548003ec7db97bdd841b

    SHA256

    d0517dc872a7d8eb7a373b4071df83f1b870565fb002ced109c1d92f5ca41a24

    SHA512

    1638e34044488f7c0914fbd549e7cf81b9ad7c270c867ff489f4439954bf9a0a83f57ad3ff9414910bff785a0faee71bca8edefdd2eb125b084f96bff20abd0d

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    201B

    MD5

    5b4a20bb61be7b0c26ffd051805860c8

    SHA1

    ab1dec7bad3a792c940b3576f524529fa7d4530d

    SHA256

    ccda044019e8d53b6fb012297eb7e66f0ee4859cc50faa425d9332d7c6daea79

    SHA512

    dc40e67bb5d1256310b39b261d2b7d72120044669ac8b28f07c06f6da989b68c2d381e52fb343587407cefd80e4f54afaf8bcc71ab5e67058a4e1cddc33dde11

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    169B

    MD5

    a4dccbfc72b720e5cd3e36f5e0f95709

    SHA1

    64bfb692aab6589732794183bf977383a4802f56

    SHA256

    daad74f132f1e135bc77b7faf8bc0cb2b1d43ca3237a1a509b780ab71821a397

    SHA512

    917eca9fe6fbacf96e94f3001b4fb5cdb9205b203645f88be26891ff4045cb910012f75d1ce0892399b4cf52e526a4ec6a323f632b26dbbecacbe4bda5280876

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe

    Filesize

    2.6MB

    MD5

    9dc3487fb84e09597ca8e4ca457012f2

    SHA1

    7aba9f443010d52a693d18be48bbcdf5e443a736

    SHA256

    ce2e762b5d332bb33a67d63a79999bcb89870934a44119894d22b90acca66672

    SHA512

    25f8d107089fb3c490a37cc54055904acd827cde2a7ce8adae1625ebd16a7ea0dff14ab2e6e55580ba9e998fb576dbbfef2f659b398761e03a4cab36945c31c3