Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe
-
Size
3.1MB
-
MD5
4bf9b3895f53d39ef73c56a9d31e5220
-
SHA1
3ae614c93f23e2fb305d00c060faa193c99d6d67
-
SHA256
e6a9e265fcf756c6cd0d50899d1ade8feea40933ee0f8c1f48625ff71b11da46
-
SHA512
3f6360088ec782760437dead352b4bb044475a5902557617ddc1f6d2c5dd099dc6acecf311a55acbdfdab0c35a7baddf301d3be9e3cb017218f69f9e6d9f524e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUpSbVz8eLFc
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe -
Executes dropped EXE 2 IoCs
pid Process 2196 locxbod.exe 2908 xoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotBR\\xoptiloc.exe" 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidVJ\\dobdevloc.exe" 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe 2196 locxbod.exe 2908 xoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2196 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 28 PID 1924 wrote to memory of 2196 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 28 PID 1924 wrote to memory of 2196 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 28 PID 1924 wrote to memory of 2196 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 28 PID 1924 wrote to memory of 2908 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 29 PID 1924 wrote to memory of 2908 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 29 PID 1924 wrote to memory of 2908 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 29 PID 1924 wrote to memory of 2908 1924 4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\4bf9b3895f53d39ef73c56a9d31e5220_NEAS.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\UserDotBR\xoptiloc.exeC:\UserDotBR\xoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5075336e329f25935a68b26028e1f8dc9
SHA1bacaca398da9cbe977cd112e48311930a522c041
SHA25601905f745378d129fbdc232bd08e222e080f763dbcc2ae62f7d21baae20241a3
SHA512089c681fb2622e89ca659dca26949fb005bf2eae2c247924d2f7a7c76f93aef27cd50a9675813fe99f7ce2b24b1338f490c716159cd5d1e9c000ffb9f5ed8610
-
Filesize
172B
MD5fc290eacf3f2291ad65f112e32454d83
SHA19eb7eadbcea8a35203475108077fdd714f7d7c5d
SHA256f084521778d0fd3412c65a5abf1f863aa241386cd621e29eb4f403a44ab3a352
SHA512e6bb8f3fa01f4a1608edb0e623615594763d11907a3dd7b7b5e392839a43b22d05ef1f6785f6fab39ae58cdcf299418006eaf2dd17375c650ed31f2e3af1a621
-
Filesize
204B
MD52385e1709353e4e0eef7a3d2de3d0abc
SHA19d08a127b835805a62e3056c8961221d69e58009
SHA2561810e9fb9b7abcdebe30135208671a984b3aee6e2b911e941851e9df480c5406
SHA512fb4b29dbfc9bf4b3db5f53bcf18667a1cadfbec35a19afb29ddd0697b9a6fe67ec314a1633735648cdc0bc0b3062c506dd44124a7e0b548297dbca3f603c4d24
-
Filesize
2.8MB
MD5f857b1641e05ad88b5f3578ad6428e72
SHA16b552e0d36150f0ef666356b5c0f88e7dd3ec3d0
SHA256cd7717b26319437b0b4041fc535e5bfd325f2dcbe54dc81bffa7dbfc1c1b1f4a
SHA5120b6ca3a3bb67c4e2de15047a30b80bae8bb20985c011f0621c245e30967f42cb102e6012fdc55877921989b65cdb7e5a787682a1c88d8db283a3ba0fc591b188
-
Filesize
3.1MB
MD51f5e91a65829245c6df16def3a290d84
SHA1c6260d544baf7b619750a8d9a7df03d2804e9bba
SHA256a3ff81b4f3ea941477d2021483b4c9e15a1dc32d16630e97b19dc8358093f114
SHA5126811173916354401f5bff24bb2ab41be774c49a622017056e00be1ba5a122f898095f1d61cee21c50089000411950104e46c5901f154461b121e3263b7c2bba6
-
Filesize
3.1MB
MD5fff1f668ce83dda87ec0823bd9eb725e
SHA12e40f0b51af09b8084d9087df27131613fcab4ca
SHA25676ee34ebd0cc57334480674cabf59f6b5cf76c1c9df3674e62b46091da8042e4
SHA512863502eab943793412986100abfbf1beb2e822dd738df28806ab63972cfdbcb4a55ed04f988cda54688c6fe346ad9eabc68574caf97509feb00e3036e2688990