Analysis

  • max time kernel
    119s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 16:15

General

  • Target

    0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe

  • Size

    2.6MB

  • MD5

    9267f952a13dabe9573df2e86e259ae0

  • SHA1

    4c840b73b84a96f569969d55892e05d97b868884

  • SHA256

    0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531

  • SHA512

    8bb9393e1885c86ac39556188c7be4bac26d9395124556d83cb37b1d0a9b1d216c2dd9c593ac5f4de7ea18d52615b894319fe1a0ba611337152c06929b10da2c

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBZB/bS:sxX7QnxrloE5dpUpWb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe
    "C:\Users\Admin\AppData\Local\Temp\0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4512
    • C:\UserDot70\devdobec.exe
      C:\UserDot70\devdobec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZHB\dobxsys.exe

    Filesize

    149KB

    MD5

    79f46bf9c3416bfe000992ee8a836b12

    SHA1

    b9224a09f5a33e00bdc26964f7bc8666de2104cb

    SHA256

    82eaa89f64f12698b78c29b79b95812183f8a2c5c337ce1ef4db2fdb4aed0666

    SHA512

    b17d8f3f2dcbe119ced2c1ce791e2723322cd72795f1a87dfee177cf162d8493363a5232c299f41f255101fc979fd66fd7d0a144ca8aaa3c5d5d942b810057cc

  • C:\LabZHB\dobxsys.exe

    Filesize

    1.2MB

    MD5

    11db18be78c9b7e2d50f57122005455d

    SHA1

    015085ed7e3535dc583c7ee030b8b6c3140e52bb

    SHA256

    be66676b3567cf87c9b00a1b379d505aeb9685a0616ce2c48bbea94665ca06f2

    SHA512

    93df7237cae7684b41fc815f2ca54b29be2ad795fab01210dffe50b5bf66699e800619f894c2dc6f6dfd37c5fa3ef11e5573edf3b70d5d5d3f8fb89a9d8942ec

  • C:\UserDot70\devdobec.exe

    Filesize

    2.6MB

    MD5

    9323200a888a0d72e89f9ac6db270af7

    SHA1

    e23a32b7367662a57f3b8dd5b5ebe0015c483ce1

    SHA256

    d8ed497f16c40dbcd1dd87b5cba7cb9069a5823569ef2135e45d3bebf1f0c6f4

    SHA512

    857969e99b43925547fac149c8885b913f1e31d5adea80a03ff452839ee1c2af2b6b1be41e147f9bbfa33475ade127ab042cdcb08c892247bd19cfefd92ed768

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    007413bf306a19d1e7b36ba6262ca67b

    SHA1

    b8619df388a55b1ea42de4ceb751cd51c6a3f28b

    SHA256

    76ab982846604a8b786deea072b9a4da04674ee63dc0046b77a3dc3156666958

    SHA512

    4f6ef6ba1611ffa3502696c60ac7553edd6b3d53fb301c161c17bf727ce6f0bd15ca22df715a962e7159b9cf83d924877e566721fd012c27e9138631b6dec838

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    767f4c05aff242bcbf797d5b637aed88

    SHA1

    d0eed185d5f408f3ae78e25d1bf93c7877ff37fb

    SHA256

    ef489b0a2a77ec5a2e18db34e4cd3c0076d85a6fefb6608289c4814b2c6c5b49

    SHA512

    87c714630a24d7bf86a554d5ebf8e7412f18538bbbdf0f8fb9100743f21d16eae76facfec771ac0ce28b02d90ba15516d8df224f7d729897afb6d8020d885c0d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

    Filesize

    2.6MB

    MD5

    ded1530508efd00bef289877c006558e

    SHA1

    4549d94c729abe90881b128b4d2e5cb69597fbe9

    SHA256

    6b4f6fc5ec003da3c6921d754ac4dd356d955f3b507935dd60555521babd9c5f

    SHA512

    b76660be1e8d2a0b6791f524e351e9f5f736534e19ffc913fa9983f6c06d14f196c2a28a4a2186783b306ea5ddcbdc80f8f5521b34cffd8e7fd6265a952d82c0