Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe
Resource
win10v2004-20240412-en
General
-
Target
76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe
-
Size
2.6MB
-
MD5
960350ec533c53da1133fb61ed4d55ed
-
SHA1
ee23eebfcee4a7d58b0859b3135b259a2ed1f38a
-
SHA256
76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad
-
SHA512
0916c0cc3811470ea8bfcc7d344dd8df1989f02caec353bc3e72135867db8e299def0fc7f535fe5a1a5b06484445a3095cf4780b48174482a9ac068de4b2dc03
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBJB/bS:sxX7QnxrloE5dpUpyb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 sysxbod.exe 2488 devoptisys.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeYN\\devoptisys.exe" 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax9G\\dobdevec.exe" 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe 2668 sysxbod.exe 2488 devoptisys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2668 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 28 PID 2992 wrote to memory of 2668 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 28 PID 2992 wrote to memory of 2668 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 28 PID 2992 wrote to memory of 2668 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 28 PID 2992 wrote to memory of 2488 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 29 PID 2992 wrote to memory of 2488 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 29 PID 2992 wrote to memory of 2488 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 29 PID 2992 wrote to memory of 2488 2992 76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe"C:\Users\Admin\AppData\Local\Temp\76e140da0ccc8813d6d715ffa5df61b69d447a559a510376ecacc66aab5885ad.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\AdobeYN\devoptisys.exeC:\AdobeYN\devoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD559692fda3162f2051ddbee19f0d47bf4
SHA1e9e18409844d08a21859d0825797bd8df7da6c3f
SHA256c7cc6f06bd8d1eb20eb41d49675d0c40543190e6de057ba5b90f3ac2ffc325b1
SHA512a8a7712089f70fc0ac33c057ec7454655a094f82263968d70e8ce2d2497f2197a86bc9d50f0e39750197193885df679f13f2b42561c499a1080b9acec831b0d3
-
Filesize
2.6MB
MD55171578c43f92d1c607d14e1ee709686
SHA18f93b5283f5b0026f781032d495c45dfdcda4b93
SHA25660c7fda485edc5ba427b51e835c93653b9ba513e1f3a4e6e2ac272740ce8d1ad
SHA51262df83ebf95a458dfacead4dfe5f870a71de59b264c9f9b6278702b8978602dc0b7608da5916a651639d91a83a74fcfea6d816e234299485a83ea753d0edf487
-
Filesize
2.6MB
MD5ada8b4ed93fca12436f2419cffbd20a5
SHA1872f751f3dcd92bd7c4ca816815d2aa5746bfbeb
SHA2563c21dd951d03c3e5c589b385dc959e4463cfe5db527230d910a00d774bf208bc
SHA512a2e71654d2858742cf1bddd5bafa943e7c8c82e7eb32abac40a45bac09a93294d7d570dc9a3109c831ffc983e6f6c0b9935bca12f34391cb8ab4e134cd0677e8
-
Filesize
173B
MD5d6dc43140bbb6c539f53154e14d327bd
SHA17685b971ed71fffd2c4a0bd45fc938ef563bffee
SHA256d2d287cbf60b518dddba9009bcc5d37c925e76811ae76bc0bc6d6ec8f37b6e18
SHA512b0a92f851e4d0fb4e4e3ba5892ea358b3484992bd48d39f5b5867cd916f66a148aabbb93b1b9ac84459ceb59c3df00e3cb50d140df57b6cca205a174a7296797
-
Filesize
205B
MD5d27311dab1c3e8d911e4adc825c77e94
SHA1050e960d678df5afb81ecab41888909035a55fc6
SHA2565bb5c43f4510a9644eb8ac2722848c1daa38b0cc140cd60ab5283fc25abf2654
SHA512eecb678da7253367bcd92b9893d7f45cd7fa556754ee05c939bd5ce15e83c74f3367fee5ccb4de17372d2c84c383810c57ccc3417f052ff887a2fb704dc46b52
-
Filesize
2.6MB
MD59e01552e30b3181c9b6528af0431cd9f
SHA1c355520562c9a31068145b470d78eacf3e1221f3
SHA25679dd8cf55e802c1b0793a59d38a8297c75dc03ec42ecca94469b23d767a2a849
SHA51257db7db7a5d37bf0b22bad8b8219c789b846967f879819ed6b4645d7b9c4ddf3050e0a321d4f885748ae39da2d659249d175541bd6598ecb1f8411198d269932