Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe
Resource
win10v2004-20240412-en
General
-
Target
38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe
-
Size
4.0MB
-
MD5
f3ef4aae8524b29016bc1f9ab18be990
-
SHA1
b7689fba3bd2c5e4f48e8b2f2cfe6ee96362984b
-
SHA256
38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb
-
SHA512
da947d4a6a28ceb0744fa102e2b6f4bad518f75e2420da8621030cfad12804a7a58839b404b71e8ea18f3fa914dae81c6fe11783796b5b545b1605cc24f78690
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBwB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpXbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe -
Executes dropped EXE 2 IoCs
pid Process 1664 sysdevdob.exe 1756 adobsys.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe2R\\adobsys.exe" 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidJX\\dobxec.exe" 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe 1664 sysdevdob.exe 1756 adobsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1664 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 28 PID 3028 wrote to memory of 1664 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 28 PID 3028 wrote to memory of 1664 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 28 PID 3028 wrote to memory of 1664 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 28 PID 3028 wrote to memory of 1756 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 29 PID 3028 wrote to memory of 1756 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 29 PID 3028 wrote to memory of 1756 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 29 PID 3028 wrote to memory of 1756 3028 38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe"C:\Users\Admin\AppData\Local\Temp\38495540ec25c6b42b58517e487a8f8296b5db1a381a8ecc0e091bbdd96f61bb.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevdob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Adobe2R\adobsys.exeC:\Adobe2R\adobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD55d26d4571cfff00898f67ab60ab56859
SHA14663052c626c4001f647e229dd06c1bea54b1e52
SHA256c727fb4488b0866b888899f589a088c20925402f82a84dae3c8be402a20712ed
SHA51253af449e20eca68097f455e36a87aa70b03f07bca49aeab88c0bd026b25d39635dc7129c1a14cf52db6e8fd7a9caa752a542d4b6bd9ff021c1071b8f216bae17
-
Filesize
168B
MD5111cb989ac964da8ec2c73486e7b446e
SHA171d284e866b4a4e23820a0678c1b634e376ae76c
SHA25614927d49184438050b39153990e3ddc674c2ad371e49cf81faaa8b331cadebae
SHA512ae360f4848d7cc16871b3368948aad58f67867741c5b3ca4d3906a053b057fca04299caee893747129714666019495e0d923d2945d84b0ea8eee0942ea7993c7
-
Filesize
200B
MD5a40c6bf45ca5d39f6f468e118767838f
SHA1aea51b24f5c8c083debe8efb38945b49e955d1fa
SHA2568ce61d94048817002cff89b1f26ce3779c7b5573ec7a964ac4a9e625d35b5641
SHA51296165b4bfa599003f2911be7ca1c4496b7a62b0283693f58fb9270576d3bcbb87205e352325b20e639a8377e8aaf4532106e9f4a5ff1e08d0dcf4dd084fad072
-
Filesize
4.0MB
MD5ff5b773b7cf83389477d79f6e2cf3bed
SHA13e1e623b77671676af63fed4aaba43bfdd3307e2
SHA25659daaa883fcf95c2f2de7063823359754712ba4d117616175b943673189d75fa
SHA5127c32594c5772d76b6fbf4c644dff9f555de255bb85bcf8a1e16c175347edd1a453d583d9bbdc832fb4b106c7554d71c37d9e408ab9fcb128740512e317452f2a
-
Filesize
4.0MB
MD5f2d4e1f7fa143b51ba678f8539b96135
SHA13f5aec4a0d649b358ceb5920e5ed689fb449f296
SHA25613403d94a4f98708623ed40c20e852dcf7c4bb9f395348f9029be18158d8bf6b
SHA512a1bf4e0e71304b4ba08abffe9a1d51b25c186e1ab3b1633840453d33fde2b6e2d34c201fcbd9c8dc72f31a60a0aecb630e06d3560a8f75fa30e50419a8ff3819