Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe
Resource
win10v2004-20240226-en
General
-
Target
511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe
-
Size
3.9MB
-
MD5
034f9971c7cbc5676ec4f3dfb05a6d01
-
SHA1
a99ddf50dc838eafded0de79566ae76cc509e9d4
-
SHA256
511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799
-
SHA512
36b9a9ee34ae31c7561936d5a96206a69886fafe113bfff90091d7d49f3ba4cbf3ae958e8385b76006b0051a3526e67699bc611bc16fcbbf6d64d068677ae6df
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBBB/bSqz8:sxX7QnxrloE5dpUpGbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe -
Executes dropped EXE 2 IoCs
pid Process 1740 sysdevopti.exe 2896 devdobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesXR\\devdobloc.exe" 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxSJ\\optidevsys.exe" 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 1740 sysdevopti.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe 2896 devdobloc.exe 1740 sysdevopti.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1740 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 28 PID 2696 wrote to memory of 1740 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 28 PID 2696 wrote to memory of 1740 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 28 PID 2696 wrote to memory of 1740 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 28 PID 2696 wrote to memory of 2896 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 29 PID 2696 wrote to memory of 2896 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 29 PID 2696 wrote to memory of 2896 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 29 PID 2696 wrote to memory of 2896 2696 511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe"C:\Users\Admin\AppData\Local\Temp\511bc50788beade99e3c39824de61a43b4335dd209f5cbda96d6f52f2212e799.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\FilesXR\devdobloc.exeC:\FilesXR\devdobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5f7bb86862c2a4e2c6f00487c1de4ed1c
SHA15fa2da86785eebf4227179f1dcc9b25f3a5f117a
SHA25621c3c0de31708bcb01ae2b8009f1423405e93e69aad6f677db8bfb820d99b6cb
SHA512281e2d8df58dcd57cafba4e48bd607c97741a341574c0848723d698c7a1a7f7d68e1cfdd197577762010ecf69ee60b2d05493199dc93a599adbbbef2a3cd1fcb
-
Filesize
3.9MB
MD57882a5c704186ab9068b6c3697a2bf94
SHA10b8c2363ed21de25856b04af3057271abc5779ee
SHA2568795b211566f24f9572f504f63e7fb07709eabfd6a6a7e5ef9e8733b2ed99811
SHA512b31410e13d0544a509373ca6731232c5852a7d85c4ce4ba6bea49854a33b64a180ff46d7f6f0f8730462ffb5d1483325ca8214ed82c75a27ce25dd3434687092
-
Filesize
3.9MB
MD54d1d3c7415a54bcb2c00f199ff8e601a
SHA11c56cdf11d7db0c97659b7db48d2a9c397432168
SHA25674cb799436d018f830c1e9cd6d9a2964846dc68a06fe65a959d160d529a65bdb
SHA512d9fa2d4e0a78ba8032d3e08c010f89ab8f436e35a38de3af609aba6d5a29be0b3011b47c02da339de2aaed11c7e5f40c94319e87fffe690f3d5ae1767bf36ce3
-
Filesize
177B
MD5bf6655ec9ad54d76198e56e8c97d5088
SHA150f80625765a65f45e9b90b136218bbddc794571
SHA256a60b3326a812fdbf829bd11cd4e4c99de3fa28081244b492aee939d33bd194cc
SHA5123608169a2ff14da424af4dab8f58a184e9f8c7757a196e08dc80ddfc79388d32b7827f6824ef09f66bf214ca14bce3f99079f929da979a7434fb58be5860cc0e
-
Filesize
209B
MD5156c7ea6bb25a49ef56f260f7dd02da8
SHA114e9eb7f349c8742c0055dd721c8a1d5f29a2347
SHA2564700a2a7281b624352130f9ffd36fa36a7817f225dc21dc624007f1cc476f1ac
SHA512956f3f1a43e5aa2a483d97c35691032397fca416dc22eec1a5b439e6c83dbadc369e39842b3c8f19704c47fb8269db9f4586f31cb0025b80beadc3c3d7499fda
-
Filesize
3.9MB
MD5afbdfdced99295558996b549b563a4e0
SHA1feede770295b06728061b61818de431a78171630
SHA25622641ff3ed41ec8b58fd088fb19e934ab3b7735770dd8f700af62133050f7ef6
SHA512199661cc87887a731706b8e13abe5d01597878230c41a489f1ad87787bacc5bf6d70b8c994cda7d35902268d948edc1b19491c4d0653e7752c91a1264dc85008