Analysis
-
max time kernel
119s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe
Resource
win10v2004-20241007-en
General
-
Target
0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe
-
Size
2.6MB
-
MD5
9267f952a13dabe9573df2e86e259ae0
-
SHA1
4c840b73b84a96f569969d55892e05d97b868884
-
SHA256
0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531
-
SHA512
8bb9393e1885c86ac39556188c7be4bac26d9395124556d83cb37b1d0a9b1d216c2dd9c593ac5f4de7ea18d52615b894319fe1a0ba611337152c06929b10da2c
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBZB/bS:sxX7QnxrloE5dpUpWb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe -
Executes dropped EXE 2 IoCs
pid Process 4512 locabod.exe 4580 devdobec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot70\\devdobec.exe" 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZHB\\dobxsys.exe" 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devdobec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe 4512 locabod.exe 4512 locabod.exe 4580 devdobec.exe 4580 devdobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4176 wrote to memory of 4512 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 87 PID 4176 wrote to memory of 4512 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 87 PID 4176 wrote to memory of 4512 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 87 PID 4176 wrote to memory of 4580 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 88 PID 4176 wrote to memory of 4580 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 88 PID 4176 wrote to memory of 4580 4176 0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe"C:\Users\Admin\AppData\Local\Temp\0ea67812c8d7c2fced136a23b4cacc8b41c7949575b679829e1a998dc2b7a531N.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\UserDot70\devdobec.exeC:\UserDot70\devdobec.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD579f46bf9c3416bfe000992ee8a836b12
SHA1b9224a09f5a33e00bdc26964f7bc8666de2104cb
SHA25682eaa89f64f12698b78c29b79b95812183f8a2c5c337ce1ef4db2fdb4aed0666
SHA512b17d8f3f2dcbe119ced2c1ce791e2723322cd72795f1a87dfee177cf162d8493363a5232c299f41f255101fc979fd66fd7d0a144ca8aaa3c5d5d942b810057cc
-
Filesize
1.2MB
MD511db18be78c9b7e2d50f57122005455d
SHA1015085ed7e3535dc583c7ee030b8b6c3140e52bb
SHA256be66676b3567cf87c9b00a1b379d505aeb9685a0616ce2c48bbea94665ca06f2
SHA51293df7237cae7684b41fc815f2ca54b29be2ad795fab01210dffe50b5bf66699e800619f894c2dc6f6dfd37c5fa3ef11e5573edf3b70d5d5d3f8fb89a9d8942ec
-
Filesize
2.6MB
MD59323200a888a0d72e89f9ac6db270af7
SHA1e23a32b7367662a57f3b8dd5b5ebe0015c483ce1
SHA256d8ed497f16c40dbcd1dd87b5cba7cb9069a5823569ef2135e45d3bebf1f0c6f4
SHA512857969e99b43925547fac149c8885b913f1e31d5adea80a03ff452839ee1c2af2b6b1be41e147f9bbfa33475ade127ab042cdcb08c892247bd19cfefd92ed768
-
Filesize
203B
MD5007413bf306a19d1e7b36ba6262ca67b
SHA1b8619df388a55b1ea42de4ceb751cd51c6a3f28b
SHA25676ab982846604a8b786deea072b9a4da04674ee63dc0046b77a3dc3156666958
SHA5124f6ef6ba1611ffa3502696c60ac7553edd6b3d53fb301c161c17bf727ce6f0bd15ca22df715a962e7159b9cf83d924877e566721fd012c27e9138631b6dec838
-
Filesize
171B
MD5767f4c05aff242bcbf797d5b637aed88
SHA1d0eed185d5f408f3ae78e25d1bf93c7877ff37fb
SHA256ef489b0a2a77ec5a2e18db34e4cd3c0076d85a6fefb6608289c4814b2c6c5b49
SHA51287c714630a24d7bf86a554d5ebf8e7412f18538bbbdf0f8fb9100743f21d16eae76facfec771ac0ce28b02d90ba15516d8df224f7d729897afb6d8020d885c0d
-
Filesize
2.6MB
MD5ded1530508efd00bef289877c006558e
SHA14549d94c729abe90881b128b4d2e5cb69597fbe9
SHA2566b4f6fc5ec003da3c6921d754ac4dd356d955f3b507935dd60555521babd9c5f
SHA512b76660be1e8d2a0b6791f524e351e9f5f736534e19ffc913fa9983f6c06d14f196c2a28a4a2186783b306ea5ddcbdc80f8f5521b34cffd8e7fd6265a952d82c0