Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe
Resource
win10v2004-20240419-en
General
-
Target
d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe
-
Size
3.1MB
-
MD5
178d410026d10d034a4f8799091895d7
-
SHA1
d7c9b21732118bde51829aace8e01fc5959e0481
-
SHA256
d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63
-
SHA512
d429d1f24050047e934dddfc31fcac5700eb318f6378df388e69076df47eeea2202222926223ec10afee6793bfa02360b344f9057f834967f71d655f0d240141
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB5B/bSqz8:sxX7QnxrloE5dpUpCbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe -
Executes dropped EXE 2 IoCs
pid Process 972 sysaopti.exe 1952 adobec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotFZ\\adobec.exe" d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxOX\\optidevloc.exe" d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe 972 sysaopti.exe 972 sysaopti.exe 1952 adobec.exe 1952 adobec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1784 wrote to memory of 972 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 93 PID 1784 wrote to memory of 972 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 93 PID 1784 wrote to memory of 972 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 93 PID 1784 wrote to memory of 1952 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 97 PID 1784 wrote to memory of 1952 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 97 PID 1784 wrote to memory of 1952 1784 d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe"C:\Users\Admin\AppData\Local\Temp\d050b35f2cb0ba23ec12c825c81470daba6679303524505516d99a33dcbebd63.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysaopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\UserDotFZ\adobec.exeC:\UserDotFZ\adobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5c0b763213a6ef2b2d6286f49bc7ccb67
SHA16cc83b57671efe2294be6cdd4318b015f76f2452
SHA25612f09ea4da55ce33a2dd96f47369a34fb979e6396d76e5a51e444b50502c844c
SHA5122f73455f19d8a76d5cd3d968fd4a43cb5ea38ac0dd5772ee1e190df55c7072e25f9ff1e5dc4f106aaddc05cead7c74201488eaa5400aa2c5498a90720b87fafd
-
Filesize
3.1MB
MD5a2960b4e921069ba6c4d3082ac487660
SHA1d43070c85047f6cb7cac7501b42881aa74436cd6
SHA25667b90c46e1313fce707c0bc79ee531f5205d58c5175bd3f631a54510d80ca84f
SHA512a1e862909ea96c096cecfc13352ada2699eaa02741f5c6925e32981aabef9f27f0b61186637a11f4bb60b416ef25639e409e0453cd433ece8c78c2d562261c7d
-
Filesize
3.1MB
MD541e7f474e947da1c211431975eb081bf
SHA172d05672135a099a5f4dcf8836b56b9ab6175236
SHA2567bea8fa884cc4580d86743f698ffa4f0eff0c4c24d0fb577c66517c2e73be0b4
SHA512ff16d4a1b683b39d2f66354a2defc3f668db2047eab99c03733457db1c878d814cbf3f30e0384e21f81d762a90390c60a95fe7e4db0014746da796011df59176
-
Filesize
206B
MD5cc53210b8d13e7a58c365abb4da3c4db
SHA1de1b2985deb62ad8c87f4bb7da64c5caccf232d4
SHA256cdec3fd5fb318b0b97fa9f0a2f12469b4e47d7b2a8e3353f2539fd268e82662b
SHA51222e2a5d62fae3ede6e85f63eaecd8d0790698f8f314b82b14b7fe37c524364e0bb882b5ef691a3168efe93229622fc0992cf203d06c4ecc760edc00dcb76a687
-
Filesize
174B
MD57050980f3965a5de53de5f7db8eab6f8
SHA191f8393b3d174b5b06d9bb4f9cf7c833ffc8d809
SHA256e50365391b9d41cd9c0274620eac3480c2395a2f4982b716c98058cfebe29263
SHA512b7b2bd5352510b0b9ff7e8cc1ff700a289cde4387062ebf7641c4316caaad2de49b9ea96a3626a488bd125e8b93c634a2f4d0827f2d6c8a3771e0c26eeb6a71e
-
Filesize
3.1MB
MD54ba64c1e44f9a53bd3497dd9b524af12
SHA1a7352fd917966c65914fe7ebd7f07428cf73df54
SHA256846985400438d0579b782d35e34816458e974e6c43fdc891b2db3ab2176a7f63
SHA51239e663e642b434c0b44aafc9f9ea2b1e77cb2596a0717955cf0e63891f5725b61bb69a4a9d70c8b3d5db10eef1bd23fc03d895cba3ef00beb8c8c9179c31e4ac