Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe
Resource
win10v2004-20241007-en
General
-
Target
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe
-
Size
2.6MB
-
MD5
f5beed01e362e949e31811b8021784e5
-
SHA1
1ece4ea2e5c874d197ab369d5f7116fd25b8e82f
-
SHA256
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67
-
SHA512
beb7df35b9428e4ee5364af416eba2c044bbf8df8bf3a6e6f590c4bc05be382b926c86835109453a4bb7a711929c934c0c48ce395e8cfb86e6e25de91179ef5b
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBfB/bSy:sxX7QnxrloE5dpUp0b1
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe -
Executes dropped EXE 2 IoCs
Processes:
ecxbod.exexdobloc.exepid process 3660 ecxbod.exe 1112 xdobloc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotWI\\xdobloc.exe" d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax6J\\bodasys.exe" d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exeecxbod.exexdobloc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecxbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exeecxbod.exexdobloc.exepid process 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe 3660 ecxbod.exe 3660 ecxbod.exe 1112 xdobloc.exe 1112 xdobloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exedescription pid process target process PID 4044 wrote to memory of 3660 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecxbod.exe PID 4044 wrote to memory of 3660 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecxbod.exe PID 4044 wrote to memory of 3660 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe ecxbod.exe PID 4044 wrote to memory of 1112 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe xdobloc.exe PID 4044 wrote to memory of 1112 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe xdobloc.exe PID 4044 wrote to memory of 1112 4044 d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe xdobloc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe"C:\Users\Admin\AppData\Local\Temp\d16a7a2d4765c22a5b77f10d31b99dd2be9544387e528678551b2df520548a67.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\UserDotWI\xdobloc.exeC:\UserDotWI\xdobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5142c24be35aa531af28f3961997ec918
SHA128cdf6451feb1bf862347b7e2ca749842ef2a9cf
SHA2569c1de4971e66dc0790ca841db71bf0cd8ffdca9e89659f3eea67b8e333d973aa
SHA51229846ec85149a785b7d0864e8e0e7775a095dc2a3479c796114a431d06742235b7e714530220a4cb744d4275d31b8e6f6b255da97d3140e21d75e1e45a17229e
-
Filesize
2.6MB
MD5b93ef80a9bdc7387d969371ab98f5021
SHA15398b4e17cd5b16af5659f0744541a9ee2d6e71e
SHA256ca83947c716b8b06e956aac1bbde528e7a50e1c2c3fb4d578daa07d28ecd144d
SHA512ee0b9d5730cab3f4c9bf580b3fcd52d9ba1d1f354acfcc7c9d0be9faad51124c7b2d6907af732e331733e24a01bae7b230225e0bbc35ba0d1b530e9368670009
-
Filesize
2.6MB
MD593a67eecd6cba2296d87f26a4fdc6d9b
SHA1d9885b865c1ee09b0870efd6e5752488279b30ef
SHA2561e14268f600c7ca1adbca69db45525c0556f721ed649dda5393e2e5571fb152b
SHA5125d5ec24a4969daa9ff99dccf0be0f057fe17cbad0e21109eedce17b8e2beed4722344375d3e3d9ed21acb69b61963ff7d140f3ee767b5ae433073625b3962084
-
Filesize
202B
MD5643ef6457d9878008d51e8d73ce97333
SHA12e6586c220f72f0467af8aaad89d5afccb9e8e41
SHA25698cac3a484a46636a24707240b1d10e3054a431c97aca46720e959bff03f5ddb
SHA5128d211a6c4d2c001d4aebcf8c75df8b81d74cc12812d9c8eddbda1a7d224d422c6e5ec8408cea5832fb0fac20390b2f42284ca14319ab35edd802a24b00ca9fa6
-
Filesize
170B
MD506a5463f9e2cabfe6fd5d7d94a4efb23
SHA1ebf99f9bca150f0ccae028f03c8f83a4f410d7d0
SHA2568f6e018e64cc0975bf2fb4c703553f86f0ba84f0a702d8167b2cd49db21dce5b
SHA5120a1a1f148ddbcec4810dd41256ab75d0555c7825096270478d55c054724922f6881b5f674694ba2e11246a9cfae2f3be543446fdc318f1fc6c773d356b495958
-
Filesize
2.6MB
MD5ea870941d0da58a610a95f41a1e89fdf
SHA1cbff67cf81160c7beabf0f178ec06238c6d75cee
SHA256a183a7dbc4a2a38a42169d90938c728397c741bdc0ae9692c16fbc51c819ea18
SHA5125e12b6fab0b83926e539c396fe95af6bc832450bf09788dd74bfad762d31e3331dc267ffdb10a2120248d8aa84a4022acde3343719c4ccc1099ad80fc7755a1c