Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe
Resource
win10v2004-20241007-en
General
-
Target
7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe
-
Size
2.6MB
-
MD5
a2e3c966cc08cce0c578426b140170dc
-
SHA1
c7ae35599b9ed0c25019ec290723157d73da53de
-
SHA256
7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180
-
SHA512
0c049584d0c595472c7a7ff4ad53cab168c86a083ff6aa72dcaa1cf10b35f3791e6eef439cfc285bd1a9445e7750312c3078f8a97c40c5b58e070262f591df9d
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBrB/bSG:sxX7QnxrloE5dpUpIbH
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe -
Executes dropped EXE 2 IoCs
pid Process 2576 ecdevbod.exe 2816 devbodsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot7X\\devbodsys.exe" 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBYO\\dobaloc.exe" 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdevbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe 2576 ecdevbod.exe 2816 devbodsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2576 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 30 PID 2404 wrote to memory of 2576 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 30 PID 2404 wrote to memory of 2576 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 30 PID 2404 wrote to memory of 2576 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 30 PID 2404 wrote to memory of 2816 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 31 PID 2404 wrote to memory of 2816 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 31 PID 2404 wrote to memory of 2816 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 31 PID 2404 wrote to memory of 2816 2404 7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe"C:\Users\Admin\AppData\Local\Temp\7dfbba11451b29e5ec0a938d7152849e014ca31eefcf8b9c4851cd2aa66d7180.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\UserDot7X\devbodsys.exeC:\UserDot7X\devbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c8190a91500bb1d9caa61e3b11eaf128
SHA1ab7eb6ce00d2fb8ec932dee7fe6f72551ada8684
SHA2566396e1bd18ed0ea864d8f56b7885ef5813fe836854b68c3ebafb7d49b8580b1e
SHA512bc143ae225ca8cceb9e90f7dc6f36a8608eafed2d7e67396657444f3a004832c0c51921fe8c0487de4ca21430686dbc62c6a304de00cbbfb8c0e8dc538f5492b
-
Filesize
2.6MB
MD542b4863f39ae4044fba5de513c812b3a
SHA1d73a2352b52edd503d92cd82ecba945933af8c76
SHA256a8397d5cfd612914bfc1c0774986431de3739ff88d4484694500ce857887da51
SHA51279fabf31b33f5767e3dbe46153f8d2ff62120a7402d93b77eb24d9f43a4b13d04fe3e17abe8da586950b1d221c5bc60679ba3606e3c58cab734c9ec1ecc840cf
-
Filesize
2.6MB
MD5e16715d7745865e3a8a2858d5c52a949
SHA182689507a28cced822188b344a0b1dfc21ee0910
SHA256881b11cb337af7bc32eb74a7fdd1fe66094b8a0d52f86e0b3c98ac734677017f
SHA5126fcd232f6536ad45285b3aa8c1700d1051aa07f5fe3f110e068d12acadaf9cb24fc11cfb4ae437e9e3f7bdf4527fe0f9b3f1401620a82cc2388896c32f96b985
-
Filesize
173B
MD503b5d073508f10997371cd83e76e98ca
SHA19992a5f9b6025a8aa5dc83e1ae133d2fdd289726
SHA2567bc6a6896ce45242a3351a6232cbbc74de6ada499340c53e5a4892703c90a182
SHA512c49070b2eb5b5407c27cdf91b31e7cd1024e33b78eab84b36b4c5e6a5ac110d4f1fafbe592f35bfb9301c453db51ad7fefc1b26d5a3f7305c6e5fe2aaa6f8cbf
-
Filesize
205B
MD5abafc4854b399755fbd7639d81b24389
SHA148b175fe300b24c721ab83de2ffa8eda07c4b8fc
SHA256d1cd9e28df6ffcb824a20d3d77727d8774c7595f88e57289dfec87730de970e5
SHA5129e804f13f56d9527d546e446b9c138cefc987cebbbc2a47e64e32f61f1088e1c2b4a42041f128b53f05eaf2ebede347fbffb4dbb5b3b13420bbdd50a6fe7af6f
-
Filesize
2.6MB
MD5b5ff35b502f8cfbff2dcb40c673db53e
SHA11b6b94fd7e00a5484d0dd16efa28423443e98b77
SHA25664664be9de6f7eefd5f3eb629932f0bd5b5dc39f05a599a63f5a37e2e23ba4b2
SHA5128d9f7344162333aa7fb8b8e148f762cd7391d729baac617f2adc6f4d43578175b7217345ed7430a44c5133329e9757b181d0a21b0dbd9cbbed1d863213d7dda9