Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe
Resource
win10v2004-20240412-en
General
-
Target
4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe
-
Size
3.0MB
-
MD5
2b58b1483d9593fdd4f7c349fae42c7e
-
SHA1
787dcd26c1583a11af44480a5b452809b91c0828
-
SHA256
4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0
-
SHA512
46d18f918afc982fc37ed092fe3f9d9504a075dba557bd896dddaaca68a1fbc628348855ad399e811fde1248b22813a69e8cd53eda4cdc35c8c4346b4bdad4a4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBHB/bSqz8:sxX7QnxrloE5dpUpsbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe -
Executes dropped EXE 2 IoCs
pid Process 2052 locxopti.exe 2636 devoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesQ8\\devoptiloc.exe" 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxJR\\boddevsys.exe" 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe 2052 locxopti.exe 2636 devoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2052 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 28 PID 2656 wrote to memory of 2052 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 28 PID 2656 wrote to memory of 2052 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 28 PID 2656 wrote to memory of 2052 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 28 PID 2656 wrote to memory of 2636 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 29 PID 2656 wrote to memory of 2636 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 29 PID 2656 wrote to memory of 2636 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 29 PID 2656 wrote to memory of 2636 2656 4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe"C:\Users\Admin\AppData\Local\Temp\4c03190d656a8ea9dd4ca83e2ed1d5b924f4bb6a4e3785644a3b0e8f59a665e0.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\FilesQ8\devoptiloc.exeC:\FilesQ8\devoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD594275da9d388bf559679d869758e1606
SHA13cf64d47a6039d1275f0f9bdd8043c37838f7789
SHA2565a202dcde0de9113a759922de64b491353db54836774e234f05420806ddf7673
SHA512c528dc1d4cea1601188815a33951bf4717972aae9e6de8c80b3582f516c239b60dfd3d08b0dd557ad35e15ff2adcf455c3bb5a93333ea27047c94cbbae5091e4
-
Filesize
1.2MB
MD5211f25780a949ecc47fe103d46655355
SHA19e61828760283cbf311ef63c6da4b54bc8e38bf4
SHA25603491075aed567421202b9da1912d5f0684570b8bfcfac389e16ecab234affe3
SHA512425b07a8bcade19beb7d3eb2c68a5c38fac85217de4e8894bab479305438f7596b76f74008bde826ec59080a7a764188687505f6ff96e044ff9027820a3b495c
-
Filesize
3.0MB
MD53fc8a6b137ea03457168df6b97d92cc9
SHA1c209c31344a543d41daf8a54eb99b82763f8a276
SHA25632c145479b74b3ed827fc7f68e339aec56a12a56ce9a4c4aa22bbb1dac2e5ee3
SHA5127cea10cdc49c2ade27d4a2277d46edf1ccf83adb6bb25fe3d77a70eb9369ff610290490e1e91a4c195646de10810c79fcf9cd1fe50d85d7e1935184839252711
-
Filesize
175B
MD5318f98591aea7b140648bfc6c985b864
SHA16527b946f31743e51f00f658f0e4da646e5c5ffe
SHA2561472a0c512483a5d9e2504511a5beb56c1fc0ed113c6d4de90a9cd3193e9996b
SHA512f95e46d6f86a15d62b86a3e73cd143ad6a02c2d780b21d16e9834b3c0d6b72c82beeb216c3d69703cf9435dad72b6b1c7ff8d57157c51f5359dd5f5dacc1fb3c
-
Filesize
207B
MD59f959a4d7dfca273e99971887ba049de
SHA15278ce9f291a32940fc68dea74700ec7c92d5dff
SHA2561f93a677f0865ee65bf811c07944f3d2e86a5e6b404aa5b8ae2db99de9e730f5
SHA512bc247946ff534e476eaac97126e3b230de097822a0595b0f7ce0acd6a8b58e89b0cdea05d96105a7442bdeb90e1754f8e1847d3c8f8d252e7c1aff48fd6db79a
-
Filesize
3.0MB
MD565becb135293e64bb61943a04d4b3adc
SHA11f19b70cb40195cab2533ef2ee20dee901fb92c6
SHA2569581732edc186ad1e289db9eaf8b56bd76ce7aea08ee10fb49b8a6551c99110d
SHA51277ded52b0ce42fbbccd522a517c31705932de32209e6910c942288562fcaef72db1635e71873a75b31373268e868a3d0ab97daf9e0fcdb2d5a1d823fe945b6fb