Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 09:19

General

  • Target

    01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280N.exe

  • Size

    2.7MB

  • MD5

    f3ee36526dd8738cfdc046e683b92380

  • SHA1

    1bc2c77040a4f81bd3ad4d9ff08b6e602a9d9530

  • SHA256

    01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280

  • SHA512

    37a549735c8f5b8d44cfaf59c69591d567ad91219fc0537611fa6837eb55c743df3ac6a5c77f264439063b77e718660f824d8019249da6b129888bb2bbd3319e

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBW9w4Sx:+R0pI/IQlUoMPdmpSpY4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280N.exe
    "C:\Users\Admin\AppData\Local\Temp\01e5e880956712931ba5083c3b3ee5ecb913a76bb8533578883ff392b529d280N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\UserDotEV\xbodloc.exe
      C:\UserDotEV\xbodloc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    ff0e0633c1a3e2527070a34647b1043e

    SHA1

    d2db4717d09f003b36ec79f6835db30974075489

    SHA256

    62fb49dde13809d06a6863a1d44c32e666c3861eed7d00c05d270ad33294e6e4

    SHA512

    d0977eff6d3e95dc0059f63e0485f6ef3bb17e178c0912a19a5c0febdd656a714f169ecc6dc1af2f6729549d1e2ed27fb704ec2e5f47e71bad98bd3e5085e11f

  • C:\Vid8T\bodxsys.exe

    Filesize

    2.7MB

    MD5

    7fefcdfcaf42347e46f758542a6cc411

    SHA1

    b2d4ae24e8aafeba2c8c051ae58d03415a007cf1

    SHA256

    77190a65b5999fc2591034d883e62a0d39355f006aea757db3c717d8af3f6002

    SHA512

    9aa046d913b58313f8a72ae522f0de890f1038df27ead55a409e3302183b64ec8c78288a0e8e8de83b6f5bdda264fe10b29c031aeef4592f5ecbfa1d4bcad128

  • \UserDotEV\xbodloc.exe

    Filesize

    2.7MB

    MD5

    87b0a625d4fb7eadaa0903128edbe875

    SHA1

    eab0aa90d9ef2b716931fbb7c52ddc11bf9615f1

    SHA256

    a8d6edb4adb7bba8f809cb05f7191e9ab982a73ae2fdcdf6781988e32ae9591f

    SHA512

    f3b7dea9a0aff9d8440523884a9b1586d9aaa8b7b6f8f1e551e05a0d975382d4e96f452a4c4af643cd8235783f27714a9ced6e4c0be432cde72cf0c15ed03ba6