Overview
overview
10Static
static
10virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....00.exe
windows7-x64
10virussign....00.exe
windows10-2004-x64
10virussign....90.exe
windows7-x64
7virussign....90.exe
windows10-2004-x64
7virussign....40.exe
windows7-x64
7virussign....40.exe
windows10-2004-x64
7virussign....10.exe
windows7-x64
5virussign....10.exe
windows10-2004-x64
5virussign....60.exe
windows7-x64
7virussign....60.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
10virussign....c0.exe
windows10-2004-x64
10virussign....d0.exe
windows7-x64
7virussign....d0.exe
windows10-2004-x64
7virussign....b0.exe
windows7-x64
10virussign....b0.exe
windows10-2004-x64
10virussign....10.exe
windows7-x64
7virussign....10.exe
windows10-2004-x64
7virussign....e0.exe
windows7-x64
7virussign....e0.exe
windows10-2004-x64
7virussign....20.exe
windows7-x64
7virussign....20.exe
windows10-2004-x64
7virussign....c0.exe
windows7-x64
7virussign....c0.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 17:08
Behavioral task
behavioral1
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
virussign.com_b1d2087d1d88f80870106373da2011b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
virussign.com_b4a073dab1d51b27d63f81649310ab60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
virussign.com_b793dc2ed636fdaee1a701e05fde1640.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
virussign.com_ba1f70e629bc3e70fba35036be583ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
virussign.com_bcab6f30045483fd648d1924aba88b00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
virussign.com_bf4239be7de1ad8dddc78d1aff0d6090.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
virussign.com_c251643a9964695966b3f7a545401440.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
virussign.com_c3fa4d199e50171575cfa553fd205a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
virussign.com_c527d92958bc1247a6471765e5449c60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
virussign.com_c7d033cce29ec681f70bfb5f2ec867c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
virussign.com_ca6b0e41f6273b8c6a022729b7a7efd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
virussign.com_ccf2dfc7e36c604f207bf823231b57b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
virussign.com_cf449b9fd99f5da93cbb91c84e64e710.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
virussign.com_d2157a5e0405795aa865f9264e231ee0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
virussign.com_d4dd384ae38fed77098536c5b075c320.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
virussign.com_d7c1eea17ae01e04b622ede80b6732c0.exe
Resource
win10v2004-20241007-en
General
-
Target
virussign.com_c527d92958bc1247a6471765e5449c60.exe
-
Size
2.6MB
-
MD5
c527d92958bc1247a6471765e5449c60
-
SHA1
84fba87a0998698d3b6040dcfb83667a3eb2109b
-
SHA256
e9b4211e90f2c15e783c73a5998e3284b75b4afe70dae956e6dab0eb17732125
-
SHA512
1fdcac718581fa8fbdf15b3d3cdb0c2cf06f6a9a56facab47cf1841578264a1a6014cc51c07488939005852a569ae8c4c45b61b54e0b99d4d1f0bc78c1daa8da
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBXB/bSq:sxX7QnxrloE5dpUpUbV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe virussign.com_c527d92958bc1247a6471765e5449c60.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 sysabod.exe 2140 xdobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocHC\\xdobsys.exe" virussign.com_c527d92958bc1247a6471765e5449c60.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidQP\\bodxloc.exe" virussign.com_c527d92958bc1247a6471765e5449c60.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_c527d92958bc1247a6471765e5449c60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysabod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe 2600 sysabod.exe 2140 xdobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2600 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 31 PID 2460 wrote to memory of 2600 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 31 PID 2460 wrote to memory of 2600 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 31 PID 2460 wrote to memory of 2600 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 31 PID 2460 wrote to memory of 2140 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 32 PID 2460 wrote to memory of 2140 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 32 PID 2460 wrote to memory of 2140 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 32 PID 2460 wrote to memory of 2140 2460 virussign.com_c527d92958bc1247a6471765e5449c60.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_c527d92958bc1247a6471765e5449c60.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_c527d92958bc1247a6471765e5449c60.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\IntelprocHC\xdobsys.exeC:\IntelprocHC\xdobsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5d016b0ad254ae9664284c6bec29c5ba6
SHA17ae5e9559a1832a9fb2100c1032f300c8dc78e9e
SHA2567c02f64b740ff9995b503e0f1e0c8c01d837aa4bd8585709cf0f8dfe61831374
SHA512c22c1b33c86d3a40515e18681d66290f6976b7510b3d4fce432a93ed4220ed0ce1cc8d8f3ddbabfe38b8176b15e6f826172e59fc74b34f4e1ca4414306ea2430
-
Filesize
171B
MD59454bee31b3795e04256fcbd4e290042
SHA13e57545cf71bae5f685a5e0bd81a4772e91ef56f
SHA256d5a2b70eecaf935ff758e6e99ec2006a225839ea1df1721ac9fa609724f7c5bd
SHA512837cbcd73670b4024e286b81576ec85eb5c610780e92196f1c2ac29be09984b6ebbadef576dfc6742f9b6cfb279068c20f017b24884e17fce2237e6d1480d96b
-
Filesize
203B
MD52af94f48ff9dced27a3785d72af884de
SHA1101c9119bfde9d5c7b27717d3caa9a7c46d5ad6f
SHA256b336db40b6ed0dbe9bd11f7165592775b4f05b484dd75bb06096af29b785586f
SHA512d3c0c78dae55a5ed12f88309a4fed8746a30f2324ea0bdd4f153d88dfe86d52e09d7496854b4186f27203336fa150161ff5e51d3a77c62c61696a3fe38bd3555
-
Filesize
23KB
MD53802e70e50917db6adbff13a6824dce7
SHA11ec74804dcbb5eac9158cc01b922116000bd27f6
SHA256b81d5b38681149b114bf47a1e7fa43ddd85131b90d90958a3b1ff715a6be3573
SHA5122ae50667aa5c3bf216c71d67c60ef19a77841a00f44d71976aa8f97b9a6fd7f512a1183679559970fb5175722a27db103b3b44cbae08e134908cdae961b88b2b
-
Filesize
17KB
MD5b368be22b6f3efa4cb1810b4e2cb27d5
SHA196d9349871e2237380f6a6a964652272f27904cf
SHA2560ce0efd3c2aeed662f19833d3c79744b8359494af12b382b3e7777d0c7994675
SHA512af2f2195302b6a944a5992be11177f07c76f88b892b66482c2c157ae316974d20fe28185e8aebe84e480ad1d768f3116cf63f72f7876477c9534741de1d0a0c9
-
Filesize
2.6MB
MD5af030635e6a935a5cd827038223e0436
SHA1cdf2e653674b8e0b30982eeef4c79ed4a4740b7b
SHA25659b1b28f177d0f2a2292a8145696829ed61555696428519957e0533490dd5458
SHA5122505ef8f6e4b37049a46142aef04d3e11b51c745df5e919cf2f34f420c823d8ee3cdcc8801834ed0f45df09aa9e36438069e83f9e51b7d96223f91c45e80c6fa
-
Filesize
2.6MB
MD5ecaba78b402ab9183055cde8cbe5afe1
SHA1b5848862eb03291848694e0e25b836a06f64a2cc
SHA256ddb2a6fd6902091d5ffc7079620960ef778d007d0b1085b920d100c027f4b02c
SHA51272638e870004ed98301b88619a6d792237b62f7f7a09ab921934f1970e6848798a9e2f74f7f669b0d28e73010f7da03d3c8910d1f891f55e22d6b80b8ae9444c